IC card
Dual interface card
IC card
产品说明:
CPU card: 
     Compared with MIFARE1 card, CPU card uses strong and stable safety controller, enhanced card security. Non-contact CPU card under the existing technical conditions are not forged; certification process, using SM1 algorithm, making key does not appear in clear text on the line every time it is sent through an encrypted random number, and because there is a random number of participants to ensure that each different content delivery, to ensure the legitimacy of the transaction content. Therefore, the use of non-contact CPU card can eliminate counterfeit cards, fake terminals, counterfeit trade, and ultimately ensure the security of transactions. 
CPU card access control reader: 
    Built-in cryptographic module SAM, the user can use the SAM authentication module to store all kinds of application key, when read by a CPU card reader access control process, using internal authentication, card legality certification - internal authentication, holding cards are certified --PIN legality verification, to ensure the legitimacy of identification. 
    A comprehensive key management system 
     By CPU card security access key management system, the end user can generate by CPU card key management processes and management of various types of CPU card application key generated by the key management system and key to complete the initialization of the CPU card users used work to ensure unauthorized users can not break through the key way to attack the access control system. 
     2 good compatibility 
     Products fully into account and third party access controller access control reader manufacturers technical compatibility, support for multiple output formats (including Wiegand26Bit, Wiegand32Bit, Wiegand34Bit, Wiegand37Bit), support more flexible voltage range (9-12V). With a number of mainstream manufacturers access controller successful docking. 
    3 flexible docking mode 
     For CPU card issuer is the same side, the same side to provide the reader assistant, third-party companies access control management software can not be modified under any premise, to achieve the CPU card information docking; while Tongfang mention complete secondary development interface, third-party companies can meet the access control management software secondary development, with the CPU card issuer is realized on the same side of a predetermined area of the card write card operations, third-party companies to achieve docking with flexible access control products. 
    4 smooth upgrade, protection of investments 
     The system provides a variety of operating mode, providing an interface for the customer's existing systems, can achieve seamless and smooth upgrade the new system with the original system; customers can own the actual situation existing or new systems, choose to use the CPU card security access control docking mode. Construction on the system effectively meet high availability and flexibility requirements. 
    5 simple to implement, easy to use 
     System installation, commissioning simple, late very simple and convenient operation and maintenance, providing reliable performance and a high degree of safety. 
 
Features CPU card 
Chips and COS security technology for the CPU card provides a double security guarantee, lower CPU card that comes with the operating system on the computer network system requirements, enabling offline operation; while the memory card must be used under the complete network environment. 
A card can achieve a real sense of multiple applications, each application are independent and controlled by their key management systems. 
Between storage capacity, can provide 1K-64K bytes of data storage 
Long life, data storage time of up to ten years 
The main function of the CPU card 
Authentication: The legal status of the cardholder, card terminals, and card-party certification to do 
Payment and settlement tools: e-wallet and e-books means of payment, to avoid carrying large amounts of cash and change for the inconvenience, improve transaction efficiency 
Security Module: encryption using the corresponding key, decryption, and transaction processing, thereby completing the user authentication and the security card. 
Data carrier: CPU card can be used as security personal files or important data carrier, the data can be stored for at least 10 years. 




Contactless IC card Description: 
4442 contact cards, contactless cards 4428, 5542 contactless cards, contactless cards 5528 
1. IC card, also known as "IC card", the IC as a standard serial EEPROM. Smart cards, the English name "Integrated Circuit Card" or "Smart card", Frenchman Roland Moreno was invented in 1974, will have storage, encryption and data processing capabilities and integrated circuit chip packages in the same size as a credit card-sized plastic film base , and they constitute the IC card. 
2. IC card division encrypted memory card and memory card encryption 
Non-encrypted memory cards: card IC as a standard serial EEPROM. 
Plus password storage card: Card IC for serial EEPROM with encryption logic. 
EEPROM: Electricity is one of the available methods to erase its contents all at once, in accordance with byte erase, then re-write storage circuit. 
Compare 3. IC cards and other cards 
Since the IC card using today's most advanced semiconductor manufacturing technology and information security technology, IC card relative to other types of card has the following characteristics: 
⑴ storage capacity: its internal RAM, ROM, EEPROM, and other memory storage capacity to megabytes to store text, sound, graphics, images, and other information. 
⑵ small size, light weight, strong anti-jamming capability, easy to carry and easy to use. 
⑶ safe: IC card implementation of its security policies from several aspects of hardware and software, you can control access to the characteristics of different regions within the card. Encryption IC card itself has a secure password, if you attempt to illegally access the data on the card self-destruction, can no longer be read. 
⑷ less demanding on the network: security IC card so that it reduces the reliability of real-time computer network, the sensitivity requirements in the application environment, is in line with current conditions conducive to the use of low quality in the network environment. 
(B) characteristics 
Depending on the chip and the same manufacturers of different chip manufacturers, IC card has its own specific characteristics (see related information), but in terms of its characteristics, the following points. Now compared with the card. 
1 storage capacity: 
Card can only store a few hundred bytes maximum, magnetic stripe can do as a passive storage intermediary. While IC card can store 1M bytes, and storage areas can be split, with different levels of access. 
2 cryptographically 
No card control circuit, and therefore its internal data reading and writing can not safely control the order and reading technique is mechanical, and the IC card reading and writing control circuit for its internal data, erasing control reading technique is stochastic . 
3 network dependencies: 
When you use the card to ensure that a strong real-time between the terminal and the host, once the host or network failure will cause the entire system to a standstill, while the IC card can store large amounts of data, but also by the logic circuit control, the use of all the operations of all by terminal independently, completely out of the terminal dependence on the network. 
4 life: 
Magnetic short life, usually between the months of their life to a year, while the IC card is not man-made damage to the life span of a decade or more. 
5 Immunity: 
Card in anti-magnetic, anti-static, waterproof, etc. are poor, and can not mess wipe magnetic stripe, and IC cards are strong in these areas, but the chip should be kept clean. 
6 security properties: 
Card is easy to forge, and IC card itself has a strong logic encryption, making counterfeiting rate is almost zero. 
7. IC card reader equipment simple and reliable than magnetic card reader equipment, are cheap, easy to promote, easy maintenance. 
Three .IC card storage structure: 
Different IC card chip different from its storage structure, now simply describes the general situation: 
IC card with a considerable storage area in this region can be divided into a single unit, each of which is a unit of data is stored in each cell, a cell may be specified for a data store, and may be randomly storage some IC card is divided into different regions, each region has its unique nature, but on its way to store each region are similar. 
Pro! Welcome to Shenzhen Technology Co., Ltd. CRE Henderson ordered the latest domestic and international smart card. World, CRE technology services hundreds of large shopping malls and dozens of prestigious universities abroad. With the company's industry-leading advantages, CRE Technology Design dozens of top designers free for you to carefully build a variety of fashionable and unique personality, elegant chic smart cards. Now if you consult any information about smart cards through customer service, can enjoy multiple smart card concessions. Our selection of the finest quality environmentally friendly materials and various domestic and international new smart card chip-based materials, through sixteen layers of strict production process Seiko secret agents of smart cards. Our responsibility is to let you ordered is not just a smart card, but a work of art. Now consulting smart card, enjoy free design, free one distinguished service. 
     Select the Shenzhen Science and Technology CRE Henderson assure you: the new fabrication equipment, imported Heidelberg printing presses, the new white PVC material printed, imported chip factory direct supplier of domestic and foreign production, all-copper coil, so read more stable frequency ! 58 chip quality testing, thousands of small cities and abroad accessible supply! 
     You happy to CRE Technology: improving plant management system and contract review system. Experience and high-quality management personnel, technical management talents fully. Corporate culture and implementing strict requirements, the company culture standing. Mature fabrication process, the top card technology, methodical assembly line, a variety of automatic precision fabrication equipment will make you an eye-opener, a worthwhile trip!

{返回}
收缩