Overview and application status of IC card access control
IC card access control overview
System Overview: The IC card is used as the carrier to realize identity recognition and access control.
System composition:
Input device: card, access control read head Control part: door control Execution part: electric lock, gate, gate, etc. access control device Other: card issuer, door open button, running network environment, and related accessories
Inductive IC card access control system has various functions such as access control, real-time monitoring, security burglar alarm, etc. It is mainly convenient for internal personnel to enter and exit, to prevent outsiders from entering and leaving at will, which facilitates internal management and enhances internal security. Provide users with a safe and efficient working and living environment.
IC card access control status
The access control system is based on the integrated wiring system and uses the computer network as a bridge to realize the communication and management automation in function.
As an advanced security and management tool, the access control system has been widely used in government, enterprises, military, financial, park and other fields with its own advantages - active control instead of passive monitoring.
IC card security
Card Security - Challenge
At present, most of the access control cards used in the existing access control systems belong to logical encryption cards or read-only cards (such as M1 cards, ID cards, HID cards).
The "safety door" event of the M1 card - the cracking and copying of the M1 card, as an important carrier of the identification system of the access control system, the security of the IC card faces great challenges.
"Notice on Dealing with Serious Security Vulnerabilities in Some IC Cards"
The security of the card has caused the relevant departments of the Chinese government to attach great importance to it and demand that countermeasures be taken as soon as possible.
Card Security - Logical Encryption Card
The contactless IC card can be divided into a logical encryption card and a CPU card.
The contactless logical encryption card (typically representing the M1 card) is controlled by the encryption logic module, and the external processing command is completely passively received. The verification value of the protection module is fixed, and the transmission data is mostly plaintext, which is prone to security risks. .
Card security - CPU card
The contactless IC card can be divided into a logical encryption card and a CPU card.
CPU card internal structure (Huicong security network with map)
The non-contact CPU card integrated circuit includes CPU, RAM, ROM, EEPROM, and the operating system COS solidified in the ROM. It can authenticate the card according to a certain encryption algorithm, can perform ciphertext data transmission, and greatly improve the card. Security.
Card security - comparison between the two
CPU card advantages and opportunities
The CPU card adopts the ISO14443 communication protocol, and the energy supply of the card is relatively stable. The card can be authenticated according to a certain encryption algorithm, and the ciphertext data can be transmitted, which greatly improves the security of the card.
The CPU card uses a powerful and stable security controller to enhance the security of the card, instead of contacting the transmission interface and meeting the requirements of fast transactions.
The large-capacity storage space of the CPU card can meet the expansion requirements of the system.
The CPU card is a true smart card, like an ultra-small computer. It has the advantages of large amount of information, high security of anti-counterfeiting, offline operation, and multi-functional development. CPU cards can be widely used in areas such as identification and financial transactions.
Tongfang CPU card access control advantages and characteristics
Tongfang CPU card access control advantage
Tongfang Co., Ltd. Smart Card Company has been working together with Tsinghua University since 2000 to research and develop the industrialization and industrialization of the CPU card, CPU card reading and writing device, CPU card COS system development and CPU card key management system of Tongfang's independent domestic intellectual property rights. . At the same time, in order to cope with the current M1 card cracking problem, Tongfang Co., Ltd. launched the same-party CPU card security access control series products in line with the national password authority's national secret algorithm at the end of 2008, and simultaneously introduced the original ID card or contactless logic encryption card access control. The system is upgraded to a more secure and reliable non-contact CPU card retrofit solution.
Tongfang CPU card access control features
The same non-contact CPU card access control system uses a dynamic password, and is a single-use, that is, the same non-contact CPU card, each time the authentication password of the card is different, with an independent CPU processor and chip operating system, can be more Flexibility to support a variety of different application needs, more secure design of transaction processes, such as key management, transaction processes, PSAM cards and card personalization.
Tongfang CPU card access control system upgrade program
Access control system CPU card upgrade program
1. Replace the access control card reader and use the access control card reader that supports the CPU card.
Second, the card issuance subsystem in the original system is modified, and the card reader is replaced so that it can send a CPU card. Since the software platforms of each access control manufacturer are different, this needs to be completed by the original access control system manufacturer.
Third, if it is difficult to directly transform the card issuing system software, a new CPU card issuance subsystem can be developed to interface with the back-end database of the original system to implement CPU card issuance.
CPU card access control industry opportunities
In summary, the Mifare algorithm has been cracked to give us the alarm of the security of the access control products and the entire security industry. At present, domestic government agencies, military systems, military systems, classified units, public security systems, and national key departments have replaced the original ID card or logical encryption card access control system with a more secure CPU card access control product, which is very urgent. In order to continuously improve the level of IC card information security work in China, effectively prevent criminals from using illegal means to attack and destroy, and ensure that national interests are not lost.
Felt Board,Aluminium Frame Board,Aluminum Composite Board,Aluminum Frame Notice Board
Dongguan Aoxing Audio Visual Equipment CO.,Ltd , https://www.aoxingaudio.com