Tuesday, February 22, 2011
【 Weak current College 】 intelligent IC card system
0 introduction
The rapid development of information technology, profoundly changing people's mindset, lifestyle, lifestyle, changing the entire community.
1 origin of intelligent community
The intelligent construction the earliest produced in 1954, the United States Hart Ford city renovation of an old financial Tower, and on the building's air-conditioning, elevators, lighting, security, and other equipment used to monitor and control your computer, providing customers with voice communication, word processing, e-mail, and information and other information services, known as the world's first intelligent building. Subsequently, the rise of intelligent building boom. In China, the intelligent construction generally considered is the use of system integration, computer technology, communications technology, information technology and organic combination of architectural art, through the device of automatic monitoring, information resource management and on the consumer's information service and the optimal combination of architecture, the investment reasonable and appropriate to the information society require and have a safe, efficient, comfortable, convenient and flexible features of buildings.
Intelligent buildings generally consists of intelligent building (applies to government buildings and commercial buildings) and housing (applies to residential community). Intelligent community can graphically understood to intelligent building down, broke and dispersed, is IT technology to homes of penetration. Intelligent community and intelligent building, service objects and objectives vary, intelligent community in pursuit of a high-tech products for the residential areas provide a highly secure, comfortable and convenient services and 21st century network information. And the current increasing number, scale and more, features increasingly demanding large-scale residential district, there is an urgent need for the community of intelligent, high-tech means to establish a comfortable, safe and convenient for the main goals of smart Park, enhance the Park service goals and features that enhance people's quality of life.
2IC card introduction
IC card (smartCard) as an information storage and delivery media, in modern society are increasingly widely used. IC card or integrated circuit card, also often called a smart card (SmartCard). Will have storage, password checking, or encryption and other data processing capabilities of the integrated circuit chip embedded in the plastic substrate, will become the General common to the IC card.
According to the structure of IC card, that card is inserted in the IC and external circuit, such as IC cards can generally be divided into four categories: memory card, logic encryption card, CPU card or microprocessor cards, contactless IC card.
Because the IC card capacity, privacy is good (memory card), and magnetic cards, barcodes and other cards have a greater advantage than:
(1) a good read and write performance IC card is integrated circuit card, which eliminates the need for reciprocating machinery action to complete many times a machine a conversation between the card, the cards are applied in a more easy.
(2) good security in IC card uses the logic circuit design, IC manufacturing process and access control with password technology so that it can effectively prevent the card data unauthorized read and tampered with.
(3) large-capacity data storage capacity IC card has a large capacity of data storage capacity. Data in IC card is partition storage, in practice, different district store different content to different areas of read requests have different permissions. This is exactly what it is applied to the "one card". Several card storage capacity as shown in table 1.
3 intelligent IC card system
Intelligent IC card refers to one IC card can be in various community IC card subsystem use the subsystem of data, coexist in a single IC card, do not disturb each other, each subsystem also shared some of the data.
IC card possesses this function is and its structure. IC card generally four stores.
(1) open to the public (not private) store. Contains the public information, such as release identifier, the cardholder's account number, etc.
(2) external unreadable store. Storage is used for internal decision making, such as PIN values. The value is in the cards issued to individuals of written, users enter a correct PIN value, allows you to enter a new PIN values be modified, but in any case, are not allowed to be stored in the card's PIN values passed to the outside world. In the storage area can hold the key.
(3) secure store. Contains the book balance, allows the card to use the service type and limits, etc. Dangchika people to enter the correct PIN values that allow reading the store data, and applications written to the data.
(4) records of the district. Contains the details of each transaction is called a log that can be used by the query. In addition to the memory card, in other IC card also has logic circuits or microprocessor, provide safe and reliable service.
IC card application is wide, has a lot of new people to the area to be developed. Generally speaking, the intelligent IC card including IC card toll collection system, IC card parking lot management system management system, IC card entrance guard system, IC card system, property management company's internal systems, etc.
4-card system issues involved
4.1 "real-time full networking" or "offline" environmental problems
IC cards and large capacity storage capacity can make IC card application system into offline mode, important information such as passwords, amount, etc. are available on the card. Networking is the information in the database, IC card up to the identification of the role in the determination of the identity system to database query relevant information.
Important information on the IC card card, IC card has high reliability. The "real-time" system-wide networking, network security, reliability, toDemand is very high.
Can follow two methods, the combination of that information into the IC card is placed in the database. In system design, real-time full networking, i.e. on each business operation and host database communication, or by a certain time period information updates on the database.
4.2 blacklist feature
Blacklist is used to be a legitimate card system, but for various reasons and became the system of illegal card card list list. Legitimate card becomes illegal card may be the true owner of the card, this card is lost, or the card is operational system attackers.
IC card application system must have to provide the functionality of the blacklist, black list where a problem. There are two ways of storing blacklist:
Drop database in online mode, the blacklist can be placed in the database. Systems for each business operation and host database communication to view your current card is in the blacklist. This method is truly a blacklist, but undoubtedly also increased the burden on the network.
Into the lower computer this way will respond quickly, but also related to timely update of slave blacklist and lower computer capacity. In practice, the general use of the queue, the following bit machine store 1000 blacklist, when the 1001 a card loss reporting, blacklist of the first to be deleted. This obviously does not provide a truly complete blacklist functionality. As the system of long-term, blacklist will become longer and longer, this is a problem that needs to be considered. But in practice this may be feasible.
4.3 system security issues
Card system to have a high level of security, in real time or after the implementation of the safety of the settlement, minimize system operators and system users. From a certain perspective, system security issues directly related to the success of the system.
In General, the system might be following the attack in several ways:
(1) through the IC card. Scammers through theft or picking up the consumption of IC card, or forged out fake IC cards for consumption.
(2) illegal user terminals, users, or a managed card, communication lines, and other ways to enter the system; or the user beyond the permissions using the system, steal or modify data, the system for electronic fraud.
(3) through the network monitoring and modifying data. Due to the consumption point and Central Administration must pass to the network, which gives an intruder over a network system offers the potential for attack.
The main technical safety measures include: outline of key and password management; press different subsystem security needs of a variety of password protection: implementation supports micro-payment application of user consumption balance bottom account; the use of small consumption limit control risk management, etc. In practice, to a variety of security measures and to maximize the security of the system. The following describes encryption and password management.
Settlement Center database encryption management due to user's consumption record will be rolled up to the settlement Center database, for security reasons, some of the database involves funds table key field is encrypted for protection.
Transmission encryption management subsystem and clearing center all of the data exchanged is encrypted, including the subsystem to settlement center of consumer records and settlement centers to subsystems of blacklist.
User authentication on the system of regular user and system administrator for authentication to prevent unauthorized user access and use the system, so as to maximize the protection of the interests of users. Common user authentication by the various subsystems of the reader. The user is in the IC card encryption of user passwords, only the system card reader can read, even if an attacker has purchased the same reader cannot access the user's password.
5. concluding remarks
Intelligent community building's overall objective is in advanced computer technology, communications technology, control technology and IC card technology, based on the use of system integration, and gradually establish a communication with the Community internal households and households, household and community centres, household and external social interaction of multimedia information system for household provides a safe, comfortable, convenient and energy-saving, efficient environment for a family of intelligent, sustainable development, 21st century style of the intelligent community. To achieve these, the most important work is in a residential area, within the IC card system. Application of smart card technology for intelligent communities have a strong role in promoting, can significantly improve the living standards of the owners of the property management automation more mature.
The realization of the intelligent community will give developers and property management agencies have significant opportunities for development, to promote and enhance the development and property management, capture business opportunities, increased operating income, but also to establish and consolidate the company's brand, promote real estate sales. In short, from the social development of the situation, real estate agents and property companies on sale selling points and long-term development plans, must the construction and development of the intelligence community. Intelligent community building is a general trend.
Labels:
[:]
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment