Current location - Music Encyclopedia - Chinese History - Development history of IC card
Development history of IC card
IC card definition

Integrated circuit.

[ 1]

IC card refers to an integrated circuit card, and the bus card we generally use is one of the IC cards. Generally, ordinary IC cards communicate with IC card readers through radio frequency technology.

There is a difference between IC card and magnetic card. IC card stores information through the integrated circuit in the card, and magnetic card records information through the magnetic force in the card.

The cost of IC card is generally higher than that of magnetic card, but its confidentiality is better.

IC card (integrated circuit card) is a new information tool after magnetic card.

IC cards are also called smart cards, smart cards, microcircuit cards or microchip cards in some countries and regions.

It embeds the microelectronic chip into the card base conforming to ISO78 16 standard and makes it into the form of a card. It is widely used in finance, transportation, social security and other fields.

IC card reader is a bridge between IC card and application system, which is called IFD(Interface Device) in ISO international standard.

The CPU of IFD is connected to the IC card through the interface circuit and communicates with it.

The interface circuit of IC card is an important part of IC card reader. According to different practical application systems, we can choose different IC card read-write chips such as parallel communication, half-duplex serial communication and I2C communication.

Introduction of contactless ic card contactless IC card, also known as radio frequency card, successfully solves the problems of passivity (no power supply in the card) and contactless, and is a major breakthrough in the field of electronic equipment.

It is mainly used in automatic toll collection systems of buses, ferries and subways, as well as access control management, identity authentication, electronic wallets and so on.

……

Principle of ic card: The basic principle of ic card is that the RF reader sends a set of electromagnetic waves with fixed frequency to the IC card, and there is an IC series resonant circuit in the card, whose frequency is the same as that emitted by the reader, so that the LC resonant circuit resonates under the excitation of electromagnetic waves and charges the capacitor; At the other end of this charge, a unidirectional electronic pump is connected to send the charge in the capacitor to another capacitor for storage. When the accumulated charge reaches 2V, this capacitor can be used as a power supply to provide working voltage for other circuits, send data in the card or receive data from the card reader.

[Edit this paragraph] Technical principle of contact IC card interface

IC card readers should be able to read and write IC cards conforming to ISO78 16 standards.

As the only communication channel between IFD IC card and CPU, the interface circuit of IC card must meet the following specific requirements to ensure the security and reliability of communication and data exchange.

1. 1 completes the identification operation of IC card insertion and exit.

The interface circuit of IC card has strict timing requirements for the identification of IC card insertion and exit, that is, the activation and release of the card.

If the corresponding requirements cannot be met, the IC card cannot operate normally; In severe cases, the IC card or IC card reader will be damaged.

(1) activation process

To start the operation of the card, the interface circuit should activate the circuits in the order shown in Figure 1:

◇RST is in L state;

◇ According to the selected card type, it is Class A or Class B for VCC power-on.

◇VPP rises to the idle state;

I/O of interface circuit should be in receiving state;

◇ Provide clock signals to the CLK of IC cards (Class A card 1 ~ 5 MHz, Class B card 1 ~ 4 MHz).

Add a clock signal to the CLK of the IC card at time t' a.

When the clock signal is applied to CLK (ta time is after t'a), the I/O line should be built in high impedance state Z within 200 clock cycles (ta).

After the clock is applied to CLK, RST is kept in the state L for at least 400 cycles (tb) to reset the card (tb is after t'a).

At time t'b, RST is placed in state H.

I/O should start within 400 ~ 40,000 clock cycles (tc) after the rising edge of RST signal (tc is after t'b).

When RST is in state H, if the response signal does not start within 40,000 clock cycles, the signal on RST will return to state L, and the IC card interface circuit will release the IC card, as shown in Figure 2.

(2) Release process

When the information exchange ends or fails (such as no card response or card removal), the interface circuit shall release the circuit in the order shown in Figure 2:

◇RST should be set to state l;

◇CLK should be set to state L (unless the clock has stopped at state L);

◇VPP should be released (if activated);

◇I/O should be set to state A (not specifically defined in A(TD time);

◇VCC should be released.

1.2 provides a stable power supply for the card through the contacts.

The interface circuit of IC card should be able to provide corresponding stable current to IC card within the voltage range specified in table 1.

1.3 provides a stable clock for the card through the contacts.

The IC card interface circuit provides a clock signal to the card.

When resetting the response, the actual frequency range of the clock signal should be in the following range: Class A card, the clock should be1~ 5 MHz; Class b card, the clock should be 1 ~ 4 MHz.

After reset, it is determined by F (clock frequency conversion factor) and D (bit rate adjustment factor) in the received ATR (reset response) signal.

During stable operation, the duty cycle of the clock signal should be 40% ~ 60% of the period.

When the frequency is switched from one value to another, care should be taken to ensure that there are no pulses shorter than 40% of the short period.

[Edit this paragraph] Classification of IC cards

① According to the communication mode between IC card and card reader, IC card can be divided into contact IC card and contactless IC card.

The contact IC card is physically connected with the card reader through eight metal contacts on the card surface to complete communication and data exchange.

The contactless IC card communicates with the card reader through wireless communication, and there is no need for direct physical connection with the card reader.

② Bika can be divided into memory card and smart card according to whether there is a microprocessor.

Memory cards only have memory chips and no microprocessors, and general telephone IC cards all belong to this category.

Smart cards are made by embedding a fingernail-sized LSI with a memory and a microprocessor chip into a plastic substrate.

The IC card of a bank usually refers to a smart card.

Smart card, also known as CPU (Central Processing Unit) card, has the functions of reading, writing and processing data, so it has outstanding advantages such as high security and offline operation.

The so-called offline operation is relative to online operation, and can be used on terminal equipment without networking.

Offline operation not only greatly reduces communication time, but also can be used in mobile toll collection points (such as public transportation) or places with poor communication.

③ According to the application fields, IC cards can be divided into financial cards and non-financial cards.

Financial cards are divided into credit cards and cash stored value cards; Non-financial cards refer to IC cards used in non-financial fields such as medical treatment, communication and transportation.

[Edit this paragraph] Advantages of IC card

The shape of ic card is similar to that of magnetic card, but the difference between IC card and magnetic card lies in the different media for storing data.

Magnetic card stores information through the change of magnetic field of magnetic stripe on the card, while ic card stores data information through EEPROM embedded in the card.

Therefore, compared with magnetic cards, ic cards have the following advantages:

① Large storage capacity.

The storage capacity of magnetic card is about 200 digital characters; The storage capacity of IC cards varies according to different models, ranging from hundreds of characters to millions of characters.

② Good security and confidentiality.

The information on the IC card can be read, modified and erased at will, but all of them need a password.

③CPU card has data processing capability.

When exchanging data with the card reader, the data can be encrypted and decrypted to ensure the accuracy and reliability of the exchanged data; Magnetic cards do not have this function.

④ Long service life.

[Edit this paragraph] The main technology of IC card

The core of IC card is integrated circuit chip, which is embedded in a small plastic card by using modern advanced microelectronics technology.

Its development and manufacturing technology is much more complicated than magnetic cards.

The main technologies of IC card include hardware technology, software technology and related business technology.

Hardware technology generally includes semiconductor technology, substrate technology, packaging technology, terminal technology and other parts technology; Software technology generally includes application software technology, communication technology, security technology and system control technology.

①EEPROM technology.

Electrically erasable programmable read-only memory is the core of IC card technology.

This technology increases transistor density, improves performance and capacity, and achieves the purpose of storing more data in the same area.

As a storage space for data or programs, EEPROM data can be stored for at least 10 years, and erased more than 65438+ million times.

EEPROM technology also provides great flexibility. By setting the unmodifiable flag bit, EEPROM cells can be converted into programmable read-only memory, read-only memory or unreadable secret storage cells.

Advanced technology makes the secure storage IC card get rapid development and application.

For example, it has been widely used in various toll collection systems (public telephones, electricity meters, highway toll collection, etc.). ) and access control.

CPU cards with EEPROM as the core are also widely used in mobile phones, banking departments, multi-application cards and high-security applications that require public key algorithms.

②RFID technology.

Radio frequency identification (RFID) technology is an identification method that uses electromagnetic waves to transmit signals, and the identified object itself should have devices for receiving and sending electromagnetic waves.

The communication frequency band used by RFID system is < < 135kHz or > 300 MHz ~ GHz.

Radio frequency identification IC card is an IC card that uses electromagnetic waves to communicate with terminals in a non-contact manner.

When using this card, it is not necessary to insert the card into a specific card reader slot.

Generally speaking, the communication distance varies from a few centimeters to 1 meter.

Radio frequency identification cards are widely used and have great development potential.

Radio frequency identification IC cards can be divided into active and passive types.

Active card means that the card needs to approach the card reader actively, and the user needs to shake the card above the card reader to complete the transaction; The passive card does not need to show the card, just walk through the range of the card reader and complete the transaction.

At present, the most advanced contactless IC card in the world adopts unique RFID technology.

It is expected that this technology will have great market potential.

③ Encryption technology.

The CPU card in IC card adopts special encryption technology, which can not only verify the correctness of information, but also check the legitimacy of both parties' identities, thus ensuring the security of information transmission.

This is achieved by mutually verifying the bank key stored in the IC card and the bank key stored in the black box of the card reader, thus ensuring that both the cardholder and the card reader have legal identities.

In a word, the advanced encryption technology not only has high security and strictness, but also has the advantages of flexibility, convenience and low cost.

In addition to the above technologies, there are new software and hardware technologies such as Java card technology, IC card ISO standardization technology, IC card biometric authentication technology and data compression technology.

Due to the increasingly high technical content and powerful functions of IC cards, the application fields of IC cards are constantly expanding in depth.

[Edit this paragraph] The main application of IC card

The development, research and application of IC card is a systematic project, involving many technical disciplines in computer, communication, network, software, card reading and writing equipment, application computer and other product fields.

Therefore, the global IC card industry is developing rapidly in the competition of technology, market and application.

IC card has become one of the hot products in the international electronic information industry. Besides being widely used in non-financial fields such as commerce, medical care, insurance, transportation, energy, communication, safety management, identity identification, etc. , also widely used in the financial field, with far-reaching influence.

Although IC card entered our country late, it developed rapidly with the strong support of * * *.

At the end of 1995, the National Gold Card Office organized and drafted the Master Plan for the Application of Non-bank Cards in the Gold Card Project to make a master plan for the application of IC cards in China.

In order to ensure the healthy development of ic cards, under the leadership of the State Council Golden Card Office, the Ministry of Information Industry, the Ministry of Public Security, the Ministry of Health, the State Administration for Industry and Commerce and other ministries and commissions have made development plans for IC cards in this industry.

① Application of IC card in banking system.

Bank cards are roughly divided into two categories: credit cards and stored-value cards.

Credit card, that is, debit card, has the function of micro-credit, that is, small overdraft can be made.

It requires cardholders to have a high degree of credibility, and overdraft money should be deposited in time.

Stored value cards, that is, debit cards, do not need to be filed, do not need guarantees, and cannot be overdrawn. They are generally used for small withdrawals or consumption.

At present, most bank cards issued by domestic commercial banks are debit cards.

According to statistics, the cash circulation in developed countries only accounts for 8% of the circulation strength. Basically, credit cards and various financial cards dominate the financial market.

China's cash flow is as high as more than 25%. The "extracorporeal circulation" of a large amount of cash provides the breeding ground for corruption and various economic crimes, which not only disrupts the economic order, but also seriously affects social stability and the value and reputation of RMB.

The wide application of electronic money or bank ic card is an effective way to solve the above problems.

At present, most bank cards are magnetic cards, and plastic cards have magnetic stripes and embossed characters.

The magnetic stripe records basic information such as account number and password, while the actual money is stored on the hard disk of the bank computer connected to the network.

Funds withdrawn or deposited by users are exchanged between different bank accounts.

The money consumed by users is carried forward and liquidated between banks and merchants.

This magnetic card needs to access the host account when it is used, so it can only be used in on-line processing time. Its speed and stability depend on the quality of communication lines, and it can't be used where the network can't reach.

The policy of developing gold card in China is "two cards are used together, magnetic card is in transition, and ic card is the main development".

The future development trend is bound to be that IC cards will gradually replace magnetic cards.

IC cards can be issued separately by banks or jointly by enterprises and institutions.

This co-branded card forms a special wallet account for the bank IC card.

For example, the special wallet for medical insurance is not allowed to consume or withdraw cash, and can only be used in designated hospitals and other places.

At present, co-branded cards mainly include insurance cards, tax cards, transportation cards and campus cards.

Because IC card is convenient and fast, it has been quite popular in developed countries.

During the Atlanta Olympic Games, ic card electronic wallets were widely used to pay for transportation, communication and taxes.

②IC card charging system.

Including the collection of various consumption resources such as electricity, water, gas and communication fees.

This system can improve management efficiency and reliability.

By charging in advance, we can increase the available funds of management departments, provide quality services for residents, and change the unreasonable situation of consuming resources first and charging later.

For users, IC card charging can avoid the harassment of toll collectors and the trouble of preparing cash change; At the same time, it is also beneficial for users to plan their consumption according to their own electricity, water and gas consumption.

③IC card medical insurance system.

With the reform of China's medical system, residents go to hospitals with IC cards issued by insurance companies, and medical expenses will be paid by insurance companies.

Medical IC card can not only pay medical expenses, but also store patients' medical records.

Patients can go to different hospitals, and doctors can quickly diagnose and treat them according to the medical record information in the card.

④ Public transport management system.

Passengers take the bus with prepaid IC cards issued by the bus management department. When they get on the bus, they just need to shake (the activity card) in front of the toll collector at the door, and the toll collector will automatically complete the charge.

This can effectively reduce boarding time, speed up vehicle turnover, improve management efficiency, and put an end to corruption and counterfeit money.

Others include traffic police management system, industrial and commercial management system, ic card electronic door lock, ic card tax management system, highway toll collection system and other IC card application systems.

With the development of semiconductor technology and large-scale integrated circuit chips, IC cards will also develop rapidly with the rapid development of computer technology and network technology.

Expanding the application field of IC card has become an inevitable demand of social development.

In the case of more fierce competition in the global IC industry market, IC cards will inevitably develop to a higher level.

For example, from contact IC card to non-contact IC card, from low storage capacity IC card to high storage capacity IC card, from single-function IC card to multi-function IC card, from single-system IC card to multi-system IC card, from non-banking system to banking system application, from civilian to military, from local area network to Internet, etc.

New technologies are constantly emerging, and there are many kinds of IC cards, which fully shows the strong vitality of IC cards.

In the next few years, IC cards will penetrate into people's lives more and more.

[Edit this paragraph ]IC card security

As a kind of electronic money, ic card records a lot of important information, and its security is very important. As the developer of IC card application system, it is necessary to provide reasonable and effective security measures for IC card system to ensure the data security of IC card and its application system.

The main ways to affect the security of IC cards and application systems are: using the lost or stolen IC cards of users to impersonate legitimate users to enter the application system and obtain illegal benefits; Using forged or blank cards to illegally copy data and enter the application system; Use IC card reading and writing equipment outside the system to modify the data on the legal card and change the operation level; In the process of IC card transaction, after the identity authentication is completed with the normal card, the IC card is replaced halfway, so that the data stored on the card is inconsistent with the system; In the reading and writing operation of IC card, the information flow exchanged between interface equipment and IC card is intercepted, modified or even inserted with illegal information, in order to gain illegal benefits or destroy the system.

Common security technologies include: identity authentication and validity confirmation of IC card, message authentication technology, data encryption communication technology, etc.

The adoption of these technologies can ensure the integrity, validity and authenticity of IC card data in the process of storage and transaction, thus effectively preventing illegal reading, writing and modification of IC cards.

Generally speaking, the security of IC cards includes physical security and logical security:

(1) personal safety

Physical security includes: the physical security of IC card itself, which usually refers to the ability to prevent stress, chemical, electrical and electrostatic effects to a certain extent; The ability to resist external physical attacks requires that IC cards should be able to prevent copying, tampering, forgery or interception.

Common measures include: adopting high-tech and expensive manufacturing technology to make it impossible to forge; In the process of manufacturing and distribution, all parameters are kept strictly confidential; When making, several protective layers are added outside the memory to prevent the content from being analyzed, that is, it is difficult to decipher; Install a monitoring program in the card to prevent the data bus and address bus of the processor or memory from being intercepted.

(b) logical security

Common logical security measures include: memory partition protection, which generally divides the data in IC card memory into three basic areas: public area, working area and confidential area; User authentication, also known as personal identity authentication, usually includes verifying the user's personal identification number, biometric authentication and handwritten signature.

The following only introduces one of the biometric technologies-fingerprint identification technology:

Fingerprint identification technology takes advantage of the uniqueness, immutability, unforgeability and portability of fingerprints and the advantages of IC card as personalized data carrier and mass storage, which not only realizes the real identity authentication of people, but also meets the requirements of various application systems for data carrier cards and offline. It is a way of combining software and hardware to ensure information security, reliability and practicality.

Use IC card to save key information such as fingerprint feature data, user information and private key. It is the most effective way to solve the bottleneck of network information security, and it is the most effective supplement to information security (software) authentication and key system.

It is not only a higher-level institutional innovation of IC card application, but also a time and again in the field of user real identity authentication.

The smart card reader verifies the validity of the card and then verifies the fingerprint identity. After double verification, the system is safe and reliable.

The fingerprint information can be stored in the IC card as needed, and the real identity authentication of the user and various applications of the IC card can be realized by comparing the input user's living fingerprint information with the fingerprint data in the card.

Fingerprint information can also be stored in a computer or network system, and it is very flexible to authenticate the real identity of the user by comparing the input user's living fingerprint information with the stored fingerprint information.

Fingerprint IC card authentication technology can be widely used in network communication, database management, authority setting, data access and key management in e-commerce and electronic payment.

Including computer systems, Internet, e-commerce systems, * * *, the identity authentication of administrators in enterprise LAN systems, the authorization management of employees in important systems and departments of finance, insurance and securities, the identity authentication of credit card users and insurance beneficiaries in stock exchanges, and the security industry.

[Edit this paragraph] Common IC card models

The following is a list of common IC card models for reference:

1Kbit non-logical encryption card, which can only read and write data and cannot be partitioned; Working voltage 5v10%; %; Data retention period: 100 year; Cyclic erasure 1 1,000,000 times; Mainly used in calling cards, prepaid water and electricity meters and other industries.

Temperature range: -25℃-70℃.