Saturday, December 18, 2010
Weak current College】 【IC card and ID card of the difference between】.
IC card full integrated circuit card (IntegratedCircuitCard), also known as a smart card (SmartCard). You can read and write, large capacity, with encryption, data record is reliable, easy to use, such as one-card system, consumer systems, mainly in the PHILIPS Mifare series cards.
ID card name identification card (IdentificationCard), is not written to the induction card with a fixed number of mainly Taiwan SYRIS EM format, United States HID, TI, MOTOROLA and other ID cards.
First, why IC card to do initialization (which is encrypted), and ID card no?
1, IC card in use, you must first IC card and read-write device-specific bi-directional key authentication before they can be related to work, so that the entire system has very high security.
Therefore, it is essential that Wang Lung company factory Initializes the IC card (which is encrypted), aimed at the factory of IC card is cracked within generated a key card system, to ensure that the card system security release mechanism.
2, IC card initialize encryption, to users, customer IC card issuance systems, cards will generate its own system of private keys.
This ensures that the other user system release user card cannot be used in the system to ensure that the specificity of the system, thus ensuring the safe use of the system.
3, ID card and magnetic card, just use "card number", in addition to the card in the card, no secrecy on the pavement outside, their "card number" is open and bare. So says ID cards is "inductive magnetic card"; far need or do not need to initialize.
4. why don't the initialization process by the users themselves? this is because:
1) if the user's own initialization, you cannot prevent users from internal staff cheating. Because the user is using a card system, if employees used the community bought cards randomly initialized, it can release into households households card can be used, or even liberty to card recharge consumption, not only will lead to serious consequences of cheating, will also result in a cartoon system security using mechanism of serious vulnerabilities.
2) in addition, if users buy low-grade factory card initialize itself, and cannot be used on your system, you will enable the system to use performance bad or paralysis, this will cause accidents.
3) initialization process performed in the factory, mainly IC card security key authentication mechanism of basic needs, and also the IC card system integrators of etiquette. Just like the city public transport IC card, the card in to the public transport system, each card keys are to be factory-encryption control.
4) if the user lacks professional management in case of missing the key card used to initialize the authorization, users and manufacturers will be unable to fill with the card. Therefore, the work done by the manufacturer is initialized, the only security guarantee.
Second, the IC card system and the ID card system comparison
1. Security:
IC card security is much larger than the ID card. ID card card number read no permissions at all, is easy to clone.
IC card recorded data read, write, will require the appropriate password authentication, even a card for each zone has a different password protection, comprehensive protection for data security, IC card write data password and read out the data of a password can be set to different, provides a good classification management, ensuring system security.
2, can be recorded:
ID card is not written to the data, the content of its records (card number) only by chip production plant of write-once, the developer can only read the card number, cannot be based on the actual system of the need to develop new number management system.
IC card can be read by authorized users, and a large amount of data may also be made by authorized users to write large amounts of data (such as the new card number, user permissions, user information, etc.), IC card repeatedly recorded contents can be erased.
3. storage capacity:
ID card just record the card number; and IC card (such as Philipsmifare1 card) can record approximately 1000 characters.
4, offline and online operation:
Because of the ID card no content, so the card holder's permission, system function operation to be fully dependent on computer network platform database support.
And IC card itself has documented numerous user-related content (card number, user data, permissions, consumption balance and so a lot of information) that can be run from the computer platform for networking and offline automatically converted, to achieve widespread use, less cabling needs.
5-card expansion application:
ID card because no record, no partitions, can only rely on network software to handle the various subsystems of information, this greatly increased reliance on networks; if you ID card system is completed, the user wishes to increase the function points, you will need additional wiring, this not only increases the difficulty of engineering construction, but also increased the unnecessary investment. So, using the ID card to do system, system expansion is difficult, difficult to achieve a real card.
And IC card store itself is divided into 16 partitions, each partition has a different password, have more than one subsystem independent management features, such as the first partition for access control, the second partition for consumption, the third partition for employee time and attendance, and so on, the full realization of a cartoon, and can be fully modular design, the user even if you want to increase the function points, you no longer need to wiring, simply increase the hardware and software modules, this allows the IC card system later at any time upgrade extensions, smooth upgrade, reduce duplication of investment.
For example: Shenzhen China vanke Joon Park community has establishedThe ID card system, but because of the ID card system of these drawbacks, the system cannot be put into everyday use, and thus can only be set aside, the system completely changed after using IC card system.
6, intelligent systems maintenance and operations:
For example: computer released a new user ID card, you must pass the ID card system network, all with artificial way ID card number one downloaded to the ID card reader controllers, or the ID card is treated as invalid card cannot be used; if you want to change user permissions, you will need in each ID card controller has permissions on the input ID card number.
Also for example: in a system put into use new ID cards often, each new card or change a card, it is necessary in the card is available on all of the controllers to enter the card number, this greatly increases the manual and the maintenance of effort and time; in addition, if more than a few smart card subsystem, or subsystem slightly larger, system maintenance and administration of complexity is exponential growth, will lead directly to the system cannot function properly.
With IC card card system, IC card issuance, card itself is a data carrier, even if the communication network, read-write controller as usual for offline reading and writing cards run; if change user permissions, user rights directly written in IC card released, add new users to change the permissions you can simply modify the card, completely do not need to be modified for individual controllers, from a technical mechanism avoids managers everywhere change controller card usage rights issues, reaching out to improve management efficiency, intelligent management of purpose.
Price: 7,
Although the ID card and ID card reader a IC card card and reader is cheap, but from the entire card system components (wiring costs, structure, composition), two system prices fairly, and only the IC card system running to stable, reliable, and IC card system price/performance ratio are much higher than the ID card system.
In addition, considering that today's community hardware environment is not very mature, system maintenance personnel on computer knowledge are not very familiar reality, it is not possible to establish or maintain a comprehensive network system, to support the ID card system of 24-hour continuous network operation. Therefore, meet each other online and offline operation of intelligent IC card system, is the only option for today's users.
8, card industry has two findings: ID card is not possible to make a cartoon (described above), ID card is not possible to do consumer:
ID cards will not be able to do the maximum consumption due to the "credit". Because ID card no key security authentication mechanisms, and cannot write card, so the consumption data and the amount can all exist in the database of the computer, while the computer is on property management personnel to manage, from reason and mechanisms exist to cheat on completely, in addition, in case of space due to computer problems and lead to consumer data crash, catastrophic consequences.
Therefore, in order to enable consumers to recognize community management of ID card of authoritative (that is, credit) is impossible, too much money dispute only the ID card system cannot be used.
And IC card consumption system because of its high reliability, is not compromised in line with the ISO9001 international security authentication mechanisms, mainly because of the "electronic purse" IC card is at the user's hand, each expense amount consists of a user with the ability to "master" in their hands, so that the IC card consumption system is very "consumer credit" System. Of course, networking, PC also keeps and user IC card in consistent data on the system, this is achieved with double-safe data.
9, IC card as ID card with the phenomenon of "strange":
Some ID card device, system vendors, under pressure from the powerful advantage of IC card, also declared that it system available for IC card, and use the same ID card, only the IC card public area of the card number does not change its ID card system structure, much less have the IC cards have key authentication, the security mechanism to read and write. Therefore inferred from its nature remains the ID card system, and the traditional ID card system is more than just a waste of resources, and more cheat nature, equally unable to have the IC card system.
III. conclusions
IC card can integrate complex key certification and authentication logic that will replace the previous card, ID card (i.e. induction "magnetic card").
Because of the ID card system inherently non-key authentication, readable and writable, you rely entirely on the defects in the operation of the network, so it is no longer relevant to today's residential property on the smart card's growing demands, only as a transitional product will be as well known as the phase-out of magnetic cards.
ID card has been eliminated, with the inevitable smart card IC card flourish in the process!
Labels:
[:]
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment