IC card definition
IC-integrated circuit, integrated circuit.
[1]
IC card refers to integrated circuit card, we generally use the bus card is a kind of IC card, generally common IC card using radio frequency technology to communicate with the IC card reader.
There is a difference between IC card and magnetic card, IC card is to store the information through the integrated circuit in the card, while magnetic card is to record the information through the magnetic force inside the card.
IC cards generally cost more than magnetic cards, but offer better confidentiality.
IC cards (Integrated Circuit Card) are another new type of information tool that emerged after magnetic cards.
IC card in some countries and regions also known as smart card (*** art card), intelligent card (intelligent card), microcircuit card (microcircuit card) or microchip card.
It is a microelectronic chip embedded in the card base in line with the ISO7816 standard, made in the form of a card; has been very widely used in many areas, including finance, transportation, social security and so on.
The IC card reader is the bridge between the IC card and the application system, which is called IFD (Interface Device) in the ISO international standard.
The CPU in the IFD connects and communicates with the IC card through an interface circuit.
IC card interface circuit is a critical part of the IC card reader, according to the actual application system, you can choose parallel communication, half-duplex serial communication and I2C communication and other different IC card reader chip.
Introduction to contactless IC card, also known as RF card, successfully solved the problem of passive (no power in the card) and contact-free, which is a major breakthrough in the field of electronic devices.
It is mainly used in automatic fare collection systems for public transportation, ferries, and subways, and is also applied in access control management, identification, and electronic wallets.
......
The principle of IC card: IC card work is the basic principle: radio frequency reader to the IC card to send a set of fixed-frequency electromagnetic waves, the card has an IC series resonance circuit, the frequency of which is the same as the frequency of the reader emitted, so that in the electromagnetic wave excitation, the LC co-resonance circuit produces *** vibration, so that the capacitor has a charge; at the other end of this charge, connected to a unidirectional conduction of the electronic pump, the charge in the capacitor to another capacitor storage, when the accumulated charge reaches 2V, this capacitor can be used as a power supply for other circuits to provide operating voltage, the card data to be emitted or to accept the data of the read-write.
[edit]Contact IC card interface technology principle
IC card reader to be able to read and write IC cards in line with the ISO7816 standard.
IC card interface circuit as the only channel of communication between the IC card and the CPU in the IFD, in order to ensure the safety and reliability of communication and data exchange, the electrical signals generated must meet the following specific requirements.
1.1 Completion of IC card insertion and withdrawal recognition operations
The IC card interface circuit has very strict timing requirements for IC card insertion and withdrawal recognition, i.e. card activation and release.
If the corresponding requirements can not be met, the IC card can not be operated normally; in serious cases, the IC card or IC card reader will be damaged.
(1) Activation process
In order to start the operation of the card, the interface circuit should activate the circuit in the order shown in Figure 1:
◇RST is in the L state;
◇The VCC is energized with the class A or B according to the type of the selected card,
◇VPP rises to the idle state;
◇I/O of the interface circuit should be placed in the receive state;
◇The I/O of the interface circuit should be placed in the receive state. be placed in the receive state;
◇The clock signal is provided to the CLK of the IC card (1~5MHz for Class A card and 1~4MHz for Class B card).
Add clock signal to CLK of IC card at time t'a.
The I/O line should be placed in the high resistance state Z within 200 clock cycles (ta) of the clock signal being added to CLK (ta time after t'a).
After the clock is added to CLK, hold RST in state L for at least 400 cycles (tb) to reset the card (tb after t'a).
At time t'b, RST is placed in state H.
Promise on the I/O begins 400 to 40,000 clock cycles (tc) after the rising edge of the signal on RST (tc after t'b).
With RST in state H, if the answer signal does not start within 40 000 clock cycles, the signal on RST returns to state L and the IC card interface circuitry generates a release to the IC card as shown in Figure 2.
(2) Release process
When the information exchange ends or fails (e.g., no card response or card removed), the interface circuit shall release the circuit according to the timing shown in FIG. 2:
◇RST shall be set to state L;
◇CLK shall be set to state L (unless the clock has stopped on state L);
◇VPP shall be released ( if it has been activated);
◇I/O shall be set to state A (not specifically defined at td time);
◇VCC shall be released.
1.2 Stabilized power supply to the card through contacts
The IC card interface circuit shall be able to supply a corresponding stabilized current to the IC card within the voltage range specified in Table 1.
1.3 Provide a stable clock to the card through the contacts
The IC card interface circuit provides a clock signal to the card.
The actual frequency range of the clock signal should be within the following ranges during the reset answer: for Class A cards, the clock should be between 1 and 5 MHz; for Class B cards, the clock should be between 1 and 4 MHz.
After the reset, it is determined by the F (Clock Frequency Transformation Factor) and D (Bit Rate Adjustment Factor) in the received ATR (Reset Answer) signal.
The operating period of the clock signal should be 40% to 60% of the period during stable operation.
Care should be taken to ensure that there are no pulses shorter than 40% of the short period when the frequency is switched from one value to another.
[edit]Classification of IC card
① According to the communication method between IC card and reader, IC card can be divided into two kinds of contact IC card and non-contact IC card.
The contact IC card is physically connected to the reader through eight metal contacts on the surface of the card to complete the communication and data exchange.
Contactless IC cards communicate with the reader through wireless communication, communication contactless IC cards do not need a direct physical connection with the reader.
② In accordance with whether the microprocessor, than the card can be divided into two kinds of memory cards and smart cards.
Memory cards contain only memory chips without a microprocessor, the general telephone IC card belongs to this category.
A smart card is made by embedding a fingernail-sized large-scale integrated circuit with a memory and microprocessor chip into a plastic substrate.
IC cards for banks are usually smart cards.
Smart cards are also known as CPU (Central Processing Unit) cards, which have data reading, writing, and processing functions, and thus have outstanding advantages such as high security and the ability to operate offline.
The so-called offline operation is relative to the online operation, it can be used in the terminal equipment not connected to the network.
Offline operation not only greatly reduces the communication time, but also can be used in mobile charging points (such as public **** traffic) or places where communication is not smooth.
③ According to the application field to divide, IC card can be divided into financial card and non-financial card two kinds.
Financial cards are also divided into credit cards and cash stored-value cards; non-financial cards are IC cards that are used in non-financial areas such as healthcare, communications, and transportation.
[edit]Advantages of IC cards
IC cards are similar in appearance to magnetic cards, and the difference between it and magnetic cards is that the media for data storage is different.
Magnetic card is through the card on the magnetic stripe of the magnetic field changes to store information, while the IC card is embedded in the card through the electro-erasure programmable read-only memory integrated circuit chip (EEPROM) to store data information.
Therefore, compared with magnetic cards, IC cards have the following advantages:
① Large storage capacity.
The storage capacity of the magnetic card is about 200 digital characters; IC card storage capacity varies according to the model, small hundreds of characters, large millions of characters.
② good security and confidentiality.
The information on the IC card can be read, modified, erased at will, but all need a password.
③ CPU card with data processing capabilities.
When exchanging data with the card reader, the data can be encrypted and decrypted to ensure the accuracy and reliability of the exchanged data; magnetic cards do not have this function.
④ Long service life.
[Editorial] IC card main technology
IC card core is an integrated circuit chip, is the use of modern advanced microelectronics technology, the large-scale integrated circuit chip embedded in a small plastic card.
Its development and manufacturing technology is much more complex than magnetic cards.
The main technology of IC card includes hardware technology, software technology and related business technology.
Hardware technology generally includes semiconductor technology, substrate technology, packaging technology, terminal technology and other parts and components technology, etc.; and software technology generally includes application software technology, communication technology, security technology and system control technology.
① EEPROM technology.
Electrically Erasable Programmable Read Only Memory (EEPROM) is the core of IC card technology.
This technology allows the transistor density to increase, improving performance and increasing capacity to achieve the purpose of storing a larger amount of data on the same area.
As a storage space for data or programs, EEPROM data can be kept for at least 10 years and erased more than 100,000 times.
EEPROM technology also offers a great deal of flexibility, with the ability to transform an EEPROM cell into a programmable read-only memory, read-only memory, or a non-readable, confidential memory cell by setting unmodifiable flag bits.
The advanced nature of this technology has led to the rapid development and adoption of IC cards with secure memory.
For example, it has been widely used in various charging systems (public telephones, electricity meters, highway tolls, etc.) and access control.
EEPROM-based CPU cards are also widely used in cell phones, banking sector, multi-application cards, and high-security applications requiring public **** key algorithms.
② RFID technology.
Radio Frequency Identification RFID (Radio Frequency Identification) technology is a method of identification that uses electromagnetic waves for signal transmission, and the object to be identified should itself have an electromagnetic wave receiving and transmitting device.
RFID systems use a range of communication bands <135kHz or > 300MHz ~ GHz level.
An RFID IC card is an IC card that uses electromagnetic waves and non-contacts to communicate with a terminal.
When using this card, it is not necessary to insert the card into a specific reader slot.
Typically, the communication distance is in the range of a few centimeters to 1 meter.
RFID cards are more commonly used and have greater potential for growth.
There are active and passive RFID IC cards.
The active card means that the card needs to be actively close to the reader, the user needs to shake the card over the reader before completing the transaction; passive card does not need to show the card, as long as it walks through the scope of the card reader, you can complete the transaction.
Currently the world's most advanced contactless IC card on the use of unique RFID technology.
It is expected that such technology will have great market potential.
③ Encryption technology.
The CPU card in the IC card adopts special encryption technology, which can not only verify the correctness of the information, but also check the legitimacy of the identities of the two communicating parties to ensure the security of information transmission.
This is achieved through the IC card stored in the bank key and the card reader cum black box stored in the bank key of the mutual checks, thus ensuring that the cardholder itself and the card reader both have a legitimate identity.
In short, the use of advanced encryption technology not only has a high degree of security and rigor, but also has the advantages of flexibility and convenience, low cost and so on.
In addition to the above technologies, there are Java card technology, IC card ISO standardization technology, IC card biometric authentication technology and data compression technology and other software and hardware new technologies.
As the technical content of IC card is getting higher and higher, the function is getting stronger and stronger, so that the application field of IC card is constantly expanding in the deep direction.
[Edit paragraph] IC card applications
IC card development, research and application is a systematic project involving computers, communications, networks, software, card reading and writing equipment, application of machines and other products in a variety of fields of various technical disciplines.
Therefore, the global IC card industry is rapidly developing in the competition of technology, market and application.
IC card has been one of the hot products of today's international electronic information industry, in addition to being widely used in non-financial fields such as commerce, healthcare, insurance, transportation, energy, communications, security management, identification, etc., the application in the financial field is also becoming more and more widespread, and the impact is very far-reaching.
Although IC cards entered our country relatively late, they have developed rapidly under the strong support of ***.
At the end of 1995, the National Golden Card Office for the overall planning of the national IC card application, the organization formulated (Golden Card Project non-bank card application master plan).
In order to ensure the healthy development of IC cards, under the leadership of the State Council's Golden Card Office, various ministries and commissions, such as the Ministry of Information Industry, the Ministry of Public Security, the Ministry of Health, and the State Administration for Industry and Commerce, have formulated development plans for IC cards in their own industries.
① IC card applications in the banking system.
Bank cards are broadly divided into two categories: credit cards and stored value cards.
Credit cards, i.e., credit cards, have a micro-credit function, i.e., they can be overdrawn in small amounts.
It requires the cardholder to have a high degree of creditworthiness, and the overdraft should be deposited in a timely manner.
Stored-value cards, that is, debit cards, do not need to build a file, do not need to guarantee, can not overdraft, generally used for small withdrawals or consumption.
At present, most of the bank cards issued by domestic commercial banks are debit cards.
According to statistics, the circulation of banknotes in developed countries accounts for only 8% of the circulation strength, basically credit cards and a variety of financial cards dominate the financial market.
While the circulation of cash in our country is as high as 25% or more, a large amount of cash "out of body circulation" for the breeding of corruption and all kinds of economic crime provides the survival of the soil, not only disrupting the economic order, but also a serious impact on the stability of the community and the value of the RMB and credibility.
The universal application of electronic money or bank IC card is an effective way to solve the above problems.
Most of the current bank cards are still magnetic cards, with magnetic stripes and letterpress characters on the plastic cards.
The magnetic stripe records basic information such as account numbers and passwords, while the actual money is stored on the hard disk of the bank's computer, which is connected to the network.
The money withdrawn or deposited by the user is transferred between different bank accounts.
The money spent by the user is transferred and cleared between the bank and the merchant.
This magnetic card requires access to the host account, so it can only be used during online processing time, and its speed and stability depends on the quality of the communication line, and it cannot be used in places where the network is not accessible.
China's development of gold card policy is "two cards and the use of magnetic cards, the transition, the development of IC card-based".
The future development trend will be the gradual replacement of magnetic cards with IC cards.
IC card can be issued by the bank alone, but also with the cooperation of enterprises and institutions to issue co-branded cards.
This co-branded card forms a special wallet account for the bank's IC card.
For example, the special wallet for medical insurance shall not be consumed, shall not be withdrawn in cash, and can only be used in designated hospitals and other places.
Currently, co-branded cards mainly include insurance cards, tax cards, transportation cards, campus cards, and many others.
Because IC cards are both convenient and fast, they have become quite popular in developed countries.
During the Atlanta Olympics, a large number of IC card e-wallets were used to pay for transportation, communications, taxes and other expenses.
② IC card charging system.
It includes the collection of various consumer resource fees such as electricity, water, gas, and communication fees.
This type of system can improve management efficiency and reliability.
By charging in advance, it can increase the available funds for management, provide quality services to residents, and change the unreasonable situation of charging for resources before consumption.
For users, IC card charging can eliminate the harassment of charging staff entering the house and the trouble of preparing cash change; at the same time, it is also conducive to users to plan consumption according to their own electricity, water and gas consumption.
③ IC card health insurance system.
With the reform of China's medical system, residents holding IC cards issued by insurance companies to hospitals, medical expenses will be paid by the insurance company.
In addition to the medical IC card has the function of payment of medical expenses, the card can also store the patient's medical history.
Patients can go to different hospitals to see a doctor, and the doctor can quickly diagnose and treat them based on the information in the card's medical history.
④ Public transportation management system.
Passengers holding prepaid IC cards issued by the public transportation management department take the bus, and when they get on the bus, they only need to shake in front of the charging machine at the entrance of the car (active card), and the charging machine automatically completes the charging.
In this way, it can effectively reduce the boarding and alighting time, accelerate the speed of vehicle turnover, improve management efficiency, and put an end to the phenomenon of embezzlement and counterfeit money.
Other, there are traffic police management system, industrial and commercial management system, IC card electronic door locks, IC card tax management system, highway toll system and other IC card application system.
IC card with the development of semiconductor technology, large-scale integrated circuit chips and produce, but also with the rapid development of computer technology, network technology and other rapid development and growth.
Continuously expanding the application of IC cards has become an inevitable demand for social development.
In the global IC industry market competition is more intense, IC card is bound to a higher level of direction.
Such as from the contact type IC card to the non-contact type IC card transfer, from the low storage capacity of the IC card to the development of high storage capacity, from the single-function IC card to the multi-function IC card transformation, from the single system IC card to the transformation of the multi-system IC card, from the non-banking system to the banking system applications, from the civilian to the military, from the local area network to the Internet migration and so on.
New technologies continue to emerge, IC card varieties, which fully illustrates the strong vitality of the IC card.
In the next few years, IC cards will increasingly penetrate into people's lives.
[edit]IC card security
As an electronic currency IC card, which records a large amount of important information, security is very important, as the IC card application system developers must provide reasonable and effective security measures for the IC card system to ensure that the IC card and its application system data security.
The main ways to affect the security of IC cards and application systems are: using the user's lost or stolen IC card, posing as a legitimate user to enter the application system, to obtain illegal benefits; using a forged or blank card to illegally copy the data, access to the application system; the use of IC card reading and writing equipment outside the system, to modify the data on the legitimate card to change the level of operation, etc.; in the process of the IC card transaction, with a normal In the process of IC card transaction, after completing the identity authentication with the normal card, change the IC card halfway, so that the data stored on the card is inconsistent with the system; in the IC card reading and writing operation, the information flow exchanged during the communication between the interface device and the IC card is intercepted, modified, or even inserted with illegal information to obtain illegal benefits or damage the system.
Commonly used security technologies are: identity authentication and IC card legitimacy confirmation, message authentication technology, data encryption communication technology.
These technologies can ensure the integrity, validity and authenticity of IC card data in the storage and transaction process, thus effectively preventing illegal reading, writing and modification of IC cards.
In general, the security of the IC card includes physical security and logical security in two aspects:
(a) Physical security
Physical security includes: the physical characteristics of the IC card itself on the security, usually refers to a certain degree of stress, chemical, electrical, electrostatic effect of the ability to guard against; the ability to resist external physical attacks, the requirements of the IC card should be able to prevent copying, The IC card should be able to prevent copying, tampering, counterfeiting, or interception.
Measures often used are: the use of high-tech and expensive manufacturing process, so that can not be forged; in the manufacturing and distribution process, all parameters are strictly confidential; the production of a number of protective layers outside the memory to prevent the analysis of the content, that is, it is difficult to decipher; the installation of monitoring procedures in the card to prevent the processor or memory data bus and address bus interception.
(B) Logical security
Commonly used logical security measures are: memory partition protection, the general IC card memory data is divided into three basic zones: the public area, the work area and the confidentiality of the area; user identification, user identification, also known as the personal identification, generally have to verify the user's personal identification of the PIN, biometrics, handwritten signature.
The following is only one of the biometrics - fingerprint identification technology:
Fingerprint identification technology is the use of fingerprints unique, unchanging, can not be forged, portable, etc. and IC card as a personalized data carrier and high-capacity memory advantages, both the character of a real identity. Fingerprint recognition technology is a reliable and practical way to ensure information security by combining software and hardware, which realizes the real identity authentication of one person and meets the needs of various application systems for card-based and offline data carriers.
Using IC cards to save fingerprint feature data, user information, private key and other key information, through the fingerprint identification authentication of the real identity of the cardholder, the most effective means to solve the bottleneck of network information security, is the most effective complement to the information security (software) authentication, the key system.
Both the IC card application is a higher level of systematic innovation, but also the user's real identity authentication in the field of a *.
Smart card reader to verify the validity of the card, after the fingerprint identity verification, through double verification to ensure that the system is safe and reliable.
Fingerprint information can be stored in the IC card according to the need, through the input of the user's live fingerprint information and the card fingerprint data for comparison, to achieve the authentication of the user's real identity and the various applications of the IC card.
Fingerprint information can also be stored in the computer or network system, through the input of the user's live fingerprint information and stored fingerprint information for comparison, to realize the authentication of the user's real identity, with great flexibility.
Fingerprint IC card identification technology can be widely used in network communication, database management, e-commerce and electronic payment in the permission setting, data access, key management.
Including computer systems, the Internet, e-commerce systems, ***, corporate LAN systems in the identity of the administrator authentication, as well as financial, insurance, securities and other industries important system and department staff authorization management, stock exchanges, credit card users, insurance beneficiaries of the identity of the authentication, as well as the security industry and other applications.
[Edit] Common IC card models
The following is a list of common IC card models for reference:
1Kbit non-logical encryption card, no partition can only read, write data operations; operating voltage 5V ± 10%; data retention period: 100 years; cycle erase 1,000,000 times; mainly used in telephone cards, prepaid utility meters and other industries. It is mainly used in telephone card, prepaid utility meter and other industries.
Temperature range: -25℃-70℃.
Temperature range: -25℃-70℃.