With the large-scale advancement of the national gold card project, the application of smart card information media has made breakthroughs in various fields. In addition to the great achievements in the banking system, a large number of application projects in other fields have also been put into use. However, through years of practice, it has been found that there are some problems in the use of smart cards. Through the collection of a large number of technical data, the analysis of actual use, and the actual operation of the equipment, it is found that there are many unfavorable factors affecting the operation of various systems. Among them, the most critical factor affecting the success or failure of the system is the choice of electronic media, which directly affects the overall design, reliability, life, cost, read and write equipment complexity, maintenance workload, maintenance costs. Damage and errors in electronic media, reading and writing equipment can cause many disputes and damage the interests of cardholders.
In this paper, the electronic media used in intelligent buildings, such as contact IC cards and contactless IC cards, list their problems and recommend a new electronic media-TM card that can overcome their shortcomings. It is especially suitable for intelligent building environment. It is superior to the former two in terms of safety, reliability, protection against rain, moisture, dust and dust, anti-aircraft interference, and durability.
The application of electronic media directly affects the cost, reliability, failure rate, malicious damage rate, and ease of operation and maintenance of the reading and writing device. Therefore, the high reliability guaranteed by the TM card is the necessary basis and condition for the successful promotion of various application systems, which is unmatched by other systems. In summary, the TM card has the following characteristics:
1. The TM card reading and writing device can cause the sealing structure of all electronic components. It is not necessary to slot the card, water, moisture and dust can not enter, there is no mechanical movement and contact friction, and the possibility of failure is greatly reduced.
 2. No wearing parts, low maintenance costs.
 3. Touch operation, not afraid of high frequency interference.
 4. The head is seamless and not afraid of vandalism.
 5. The cost of the head is low, only 1/3 of the contact IC card read/write head, and 110 of the non-contact IC card read/write head. To accomplish the same function, the TM card reading and writing device has the lowest cost.
 6. The life of the head is 100 times that of the contact IC card reader, 10 times that of the non-contact IC card reader. The device does not need to replace the head for life.
Thanks to the excellent performance and quality of the TM card, it can be applied to almost all gold card applications. It can be applied to almost all applications where magnetic cards, IC cards and proximity cards can be used. It can achieve high stability and is suitable for all kinds of bad. surroundings.
Second, TM card performance characteristics
TM is the abbreviation of Touch Memory, TM card is also called iB card, iB is the abbreviation of iButton, so some people call it smart button. The TM was used in the 1990s, the size is equivalent to a button size, the outer casing is made of completely sealed stainless steel, much like a button battery, thickness is 1mm, 3.1mm, 5.89mm; several diameters are: 3.5mm, 5mm, 16.30mm. Like an IC card, data can be stored internally. It can be mounted on a key ring, ring, watch or plastic sheet for easy carrying.
The TM card is a high-tech product developed on the basis of smart IC cards. It can be safely and reliably used for more than ten years, adopts single bus communication, does not need to read and write equipment output power, and the connection with the reading and writing device is only the two poles of the outer casing; it has perfect verification, fault tolerance, high speed data transmission, security, data storage function. . The TM card can overcome the shortcomings of the general IC card being easy to damage, the lock card, the reading and writing equipment is complex, susceptible to interference, and poor in waterproof, moisture-proof and dust-proof. It is the most suitable for carrying and frequently used in long-term harsh environments. The electronic media that is most suitable for China's national conditions is especially suitable for complex intelligent building environments.
In the application system, we recommend the following TM card specifications:
1. Each TM has a ROM area with the world's unique, unreversible number.
2. Three data partitions, each with 384 bits or 48 bytes of storage space.
3. Each partition has an ID set by the user, ie the identity flag 64bit.
4. Each partition has a 64bit password set by the issuing unit. The internal data can be read and written only if the password is correct. Otherwise, the output is only a random number, and the authenticity cannot be judged.
5. The number of readings and writings is as high as 1.5 billion times.
6. Stainless steel casing with 110N pressure resistance, 500g impact resistance, working temperature -40 ° C ~ +70 ° C.
Third, the key technical problems and technical difficulties in the development of TM card application system
Key technical issues include the following:
 1.TM card reading and writing technology
The TM card realizes single-line communication through a multiplexer, and the retired data line, the address line, the control line, and the power line are all converted into a single line by the multiplexer. When the host with the TM card reader is powered on, the TM card is touched by the probe of the reader, and the TM card is switched to the host through the 50K and 50K impedance switches in the figure, and the low-level signal on the single bus continues. The time is long or short to represent the digital logic 1 or 0, respectively. Since the impedance transformation is relatively high, the contact resistance between the TM card and the probe does not affect the discrimination of the digital signal.
 2.TM card electronic door lock and control system security solution
Security has become the most important issue in the development and development of TM card technology. If you can't prevent accidental data corruption and grammar data access, all the advantages of TM card are meaningless.
At present, the manufacturing technology of the TM chip is sufficient to ensure the possibility of accidentally damaging any data. Therefore, the difficulty of security is focused on preventing illegal access to data on the card. The illegal way of harvesting is nothing more than the following three categories:
(1) Forged TM card
 (2) fraudulent use, misappropriation of other people's TM card or privately disassembled, modified IB card reading and writing equipment.
 (3) Intercept or modify the residential stream exchanged between the TM card and external communication.
In response to the above three aspects, the project has taken the following two aspects of security measures:
1) Physical security measures - safety measures in design and manufacturing.
a. The design and manufacturing technology and equipment of the TM card are extremely complicated and extremely difficult. We have established close relationships with patent manufacturers and we are authorized to be the only embarrassing developer in the Asia Pacific region. Therefore, the devices used will be processed according to specific instructions and programs. All parameters of the TM card in the manufacturing and distribution process are absolutely confidential. The whole process is strictly responsible for the division of labor according to the process. No one has mastered the whole process to prevent internal workers from committing crimes.
b. There are three independent encryption areas inside the TM card. Each area has a 64bit identification number (ID number) set by the user, and there is a 64bit password set by the issuing unit. Only the passwords of the individual areas are independent. If it is reinitialized, the original residence in the card will be erased and disappeared. These three encrypted secure storage areas can be independently applied to prevent illegal analysis or modification of the contents of the memory.
c. TM has a unique factory-generated 64bit code number (8-bit family code + 48-bit serial number + 8-bit CRC check code), thus ensuring the absolute uniqueness and traceability of the TM card. It is impossible to forge and copy two identical TM cards.
2) Logical security measures - the identity confirmation of the main batch cardholder and the encryption settings of the storage area access conditions.
a. Personal Identification Number (PIN) verification method: The cardholder can use the TM reading and writing device to input the user-set identification number and password password to the TM card. The TM card will be compared with the pre-stored in the card, only the input is correct. Only have access to read and write.
b. Biometrics: Human biometrics are highly individual, the biological characteristics of any two people may not be identical, and human biometrics such as fingerprints, hand images, speech, blood, etc., are Unable to forge. Therefore, biometrics have high reliability and security for identity verification. However, this method requires trapped storage capacity and more expensive equipment. The TM door lock technology is combined with fingerprint and image sound recognition technology only in special access paths such as vaults, cultural relics, and arsenals.
c. Storage area protection: that is, the access conditions of the storage area are set in advance, and access to the corresponding storage area is allowed only when the access conditions are met.
d. Communication security and confidentiality: When the TM card is in use, it must communicate with other devices. How to prevent interception of information in the communication channel, or change the content of the information, source or destination, or change the order of the group, or steal the information that has been sent or stored again. Various authentication algorithms can be used to ensure the correctness of the information and to ensure that the residence is not illegally modified. The date and time of the time can be additionally sent in the sent information stream to enhance the time identification, thereby ensuring the validity of the residence; the identification of the sender and the receiver can be strengthened to ensure the authenticity of the residence; In the process, the use of advanced cryptography and a complete cryptosystem, the management of the key is carried out in the whole process of the generation, transmission, transmission, use and destruction of the key.
Recently, a new cryptographic TM card with integrated security has been introduced, which actually includes a dedicated cryptographic microprocessor that provides a viable security solution. It has been used in the microfinance TM card system. Security has always become an increasingly important TM specification, and TM cards based on cryptographic microprocessors will have a very broad development prospect.
 3. About one card multi-use technology
TM card is not only used for hotel and restaurant entrance control, door lock management, but also for non-cash consumption of catering, entertainment, etc., as well as authorized operation of card, positioning security, employee attendance, staff dining, etc. Kind of function. The key to solving the multi-use of one card is the standardization and standardization. Uniform data formats should be identified and a uniform data interface specification developed. The problem of multi-card use is actually the problem of studying multi-function TM cards. People have long hoped that TM cards in various fields, such as guest cards, driver cards, medical cards, telephone cards, bus cards, bank cards, pay TV cards, data cards, and identity cards, can all be integrated on one card. The reason why it is difficult to achieve is mainly due to the lack of uniform specifications at home and abroad, resulting in poor compatibility, information can not be shared, and cross-industry and cross-regional use is greatly limited. The only way to break through this dilemma is for the International Organization for Standardization to develop uniform standards as soon as possible, and domestic authorities will strengthen standardized management as soon as possible. During the project development process, we also made some basic work and suggestions in this regard.
Fourth, the application of TM multi-function card in intelligent buildings
The TM card is used in intelligent buildings and can be used in many aspects. Only the main application subsystems are illustrated.
 1. Entrance and exit control subsystem
A modern intelligent building, the security access control system is an essential set of equipment. The access control system should cover the elevator entrance and exit management of each floor, the entrance and exit management of the fire exit, and the entrance and exit management of the yard to ensure the safety and reliability of the personnel entering and leaving the building and the safety of the property, equipment and parking vehicles in the building, and at the same time realize the function of one card multi-purpose.
TM multi-function smart card door lock and management system is an important facility for monitoring the entrance and exit of the building. It can manage the personnel entering and leaving the building in different levels, sub-regions and time-phases to ensure important places, important offices, computer rooms, fire exits, Each floor elevator leads to the entrance and exit of the corridor and the entrance and exit of the yard for access control.
After configuring the system, if the user wants to enter the specified and limited area of ​​the building, he must take out his own TM smart card that meets the password authority and time limit, touch the probe of the TM card lock, and the TM card lock also records the personal information of the user. And entry time for query, statistics, analysis, printing. There are many features to adopt such a system:
 (1) Each user holds the world's unique numbered, encrypted TM smart card, which must not be copied forfeit, so it is extremely secure. These cards can be cancelled at any time through the system. Once the card is lost, it can be disabled without having to re-lock the lock as with a mechanical lock or replace the owner's key. Similarly, the TM card held by the person leaving the unit can be easily cancelled or recycled for reuse.
 (2) You can use the program to preset or set the privilege and time of any person or group of people holding the TM card to start the elevator into a certain area in real time through the 485 serial network. Some people can be in the specified time period (such as working hours). ) Enter some rooms on some floors, while others can only enter other rooms on other floors.
This way you can control who can go to the building. You can also set a person to enter a designated door or group of doors several times a day in a week, so that you can control the number of times a person enters. , time period and activity area, access information can be collected and displayed in real time through the network, and all access points can be monitored in real time through the network. The system alarms when an illegal card is used.
(3)TM multi-function smart card door lock has some special advantages compared with general magnetic card lock, contact IC card lock and non-contact induction card lock.
A]TM card shape is similar to button battery, packaged in stainless steel casing, not afraid of bending, impact, not afraid of wear, not afraid of rain, moisture, not afraid of oil, dust, not afraid of electromagnetic interference, high and low temperature resistance (-40―±800C Therefore, it is most suitable for applications where it is carried around, frequently operated, and the working environment is complicated;
B]TM card door lock is also fully sealed structure, no need for card slot, no moisture, dust entering, no possibility of blocking debris, no mechanical wear, the highest reliability among all electronic locks, the lowest failure rate, life The longest, the most convenient to operate, use, install and maintain;
C]TM card can be mounted on plastic handle, electric board, PVC card, or with ring and electronic watch, it is very convenient to carry;
D]TM card only needs to be touched on the probe of the door lock to open the door and complete the data read and write transmission; TM card door lock adopts single bus protocol, which requires low reading and writing equipment and less equipment investment.
E]TM card is a multi-function smart card that can really realize one card at present. There are multiple independent storage partitions in the card. Each partition has a separate password and identification code to perform different functions. In addition to the entrance and exit control, the system can be used for property management at the same time with a small amount of equipment. The various fees are settled separately and do not affect each other. Cardholders can also carry out non-cash consumption in places such as restaurants, shopping malls and other places in the building. The internal TM staff card can also be used as an ID card, a meal permit, and a time card for personnel management.
Therefore, the TM card not only has the advantages of convenient and reliable operation of the induction card, but also has the advantages of low cost of the contact type IC card and no electromagnetic radiation, and the TM card is the most excellent electronic information medium today.
 (4) All cardholders' access to the building entrance control area can be recorded in the TM card lock. The TM capture card can be transferred to the computer to provide detailed records for the management personnel. Statistics, analysis, and printing reports through the printer.
The functions and features of the WT-Lockwell access control system introduced by Chinachem Turk are as follows:
* Adopting the current international cost-effective TM card controller, no need to slot the card, no wear (moisture proof, anti-ash, anti-electromagnetic interference)
* PC-WIN-software, easy to manage access control;
* Modular structure, can establish 1 ~ 1024 door control system, users can expand when needed;
* It can manage hundreds of people to tens of thousands of people (cards), and can double as an attendance system;
* Connected to the network up to 1200 meters, and can be expanded according to user requirements
* It can be connected with building automation system (elevator, fire, burglar alarm) TV monitoring, hotel MIS, etc.
* Record the card number and time of entering and leaving the door, and print it;
* Allow one card to open multiple doors, which can limit the time when the card opens;
* You can inquire, count, and analyze incoming and outgoing information at any time;
* It can be used in a full-featured, wide-applied in-line electronically controlled door lock, or a TM card luxury type hotel electronic door lock or a popular office electronic door lock or door frame lock tongue.
The system is suitable for intelligent building, office building, important passages, fire exits, elevator entrances and exits, equipment rooms, machine rooms, or access control and fire door automatic control of the confidential departments.
 2. Security Patrol System
For smart buildings, their security requirements are high. To this end, we should deploy a security patrol system for the building, which is to ensure that security guards can patrol the patrol points in the building in a sequence of pre-randomly scheduled routes during evening and holiday breaks. At the same time protect the safety of the patrol. When the security guards start to patrol, they must confirm the set patrol route and reach each patrol point in sequence within the specified time zone. If there is an unexpected situation on the way, the wireless communication intercom can be called with the security control room. Contact the duty officer. If there is no accident, return to the security center after the patrol is finished. The computer system software prints the patrol status collected in the handheld electronic patrol with the printer, and lists the patrol date and the patrol point in detail in Chinese. Location, time and lack of patrol information to check whether the security guards are inspecting each required patrol point to ensure the safety of the building. The patrol information can be stored in the computer for inquiries at any time and for attendance records.
The security patrol system introduced by Huatuo Tektronix consists of a handheld TM electronic patrol, a TM patrol button for patrol points, a TM card reader, a microcomputer, a printer, and a patrol system software.
The system uses a wireless patrol system (such as a user's need, can also use a wired network system), each patrol point does not need an external connection, that is, it does not have to be connected to the monitoring security center in real time. Use the wireless walkie-talkie to contact the security duty room during an accident on the way to the patrol, or use the alarm button to alert you. After the patrol is over, return to the security duty room. The patrol system software will collect the patrol information collected by the handheld electronic patrol, including the patrol point location, the patrol time and the missing patrol data, and store it in the microcomputer. Statistics, analysis, printing, and attendance records.
The patrol button for each patrol can be installed 1.5 meters above the ground on the wall. The patrol, the button, the card reader and other equipment are sealed and sealed, which can be waterproof, moisture-proof, dust-proof, oil-proof and electromagnetic interference. It does not use the card or the card-swapping method (no mistakes caused by the wear of the connector). The equipment itself is sturdy and durable, easy to use and maintain, and free of electromagnetic radiation pollution.
Hair extension keratin glue granules can be applied with fusion iron connector, hair extension iron, pre-bonding hair, good for hair extension or nail extension, the abundant quantity is enough for you to use and replace.
Strong keratin granule beads have nice viscosity, they have strong adhesion effect, there is no carbonation in continuous use, aging resistance, less wire drawing, no odor, safe for you to use
these granule beads are made from quality EVA, which are safe for use on the hair, they can melt and flow at high temperatures of 270 to 340 degrees Fahrenheit, you can use our product to create various hair styles
Hot melt glue stick suitable for Human Hair Works well in all temperatures.Can be used with Hair Extension Glue Gun & pre-bonding Hair Extension.
hot glue sticks fits most of glue guns on the market. It's also incredibly durable, flexible and long lasting. Good flexibility and luster, durability for daily gluing .
Hot fusion extensions tools are good for bonding heat-sensitive materials, not only can be applied for grafted wig, but also for nail extension, manual, accessories, shoes, wood products, ceramics, toys, cardboard boxes and more
Solid Glue,Italian Keratin Glue Grains,Keratin Glue Granule Bead,Hot Melt Glue Stick For Hair Extension
Xuchang Le Yi De Import And Export Trade Co., Ltd. , https://www.lileaderbeauty.com