First, the characteristics of smart cards

Compared with the magnetic stripe card, the advantage of the smart card is not only the substantial increase of the storage capacity, the enhancement and expansion of the application function, but also the security mechanism provided by the CPU. In the security mechanism of financial ICs: authentication function, message authentication, transaction verification, electronic signature, secure message transmission, application independence, a complete set of key distribution system, key independence, advanced key Algorithm and complete key management system.

Since the CPU card can store the password and the encryption algorithm in the card, and in addition to the password verification method, the key can be authenticated by means of a random number and some algorithms, and the key is saved in the card, and reading is prohibited. These security mechanisms greatly increase the security of the card and system. In addition, the internal SAM module is used to help the POS and self-service terminal devices complete the key storage and algorithm implementation, and the security of the system is further improved. Therefore, the offline transaction must have a SAM module or a security chip. Ensure the safety of the system.

In the management of tellers, due to the unique design of the CPU card in the security control, the security of the financial terminal is controlled by the teller CPU card. The personal key and information of the teller are encrypted and stored in the CPU card, which cannot be stolen. In the middle, the key can be out of the card and the security level is the highest. Therefore, the promotion of the CPU card security control technology in terminal applications such as POS will greatly improve the security of the terminal application.

The security of smart cards is embodied in:

Secure storage: The unique software hardware structure of the smart card enhances the security of the storage key, and the key is stored in the card in cipher text. It is only allowed to be used when it meets the conditions, otherwise it cannot be read at all, thus eliminating the need. The possibility of leaking a key due to poor storage.

Safe use: Since the smart card has built-in signature authentication and encryption and decryption algorithms, the use of the key can be completed in the card, and each use of the key requires the verification of the password before it can be used, thus preventing the user from leaking the secret during use. The possibility of a key, while memory cards and magnetic cards cannot do this. In addition, the PIN password protection can be set on the smart card. If the wrong PIN code is input 3 times during the use, the IC card will be locked and the unlock code needs to be unlocked. If the wrong unlock code is input 3 times in succession, the IC card will be automatically invalidated. Can not be used anymore.

Security generation: A complete set of key generation and key decentralization systems is based on the fact that the key can be controlled within the card.

According to the security control principle of data confidentiality, data integrity and data identifiability in financial transactions, we believe that the use of smart card technology to introduce the concept of two-way authentication between smart cards in applications can make financial transactions secure. Get effective control and guarantee.

1. Data confidentiality: Sensitive data for user passwords needs to be encrypted and transmitted to prevent third parties other than the receiver from intercepting passwords.

2. Data integrity: Use the message authentication code to prevent illegal users from impersonating or maliciously impersonating, tampering and deleting the account, amount, transaction type, and host's response processing of financial transaction messages, and preventing data transmission. The loss and duplication of information ensures that the transaction message is complete.

3. Data identifiability: The operator electronically signs sensitive data, such as: trading account number, transaction amount, transaction time and date, transaction terminal number, transaction serial number, etc. for effective electronic signature, providing reliable identification for the bank host. means.

Second, the application of smart cards will solve some problems in the security control of the financial sector

1. Operator over-authority violation operation

In management, financial terminals for personal management generally use operator passwords to control transaction security. For the convenience of work, personal passwords are sometimes shared by colleagues. In this case, there may be operator violations.

Financial IC card is to make full use of the "smart" feature on its card, through security settings and storage of various keys and passwords, card and terminal authentication, transaction authentication, electronic signature, etc., as long as the use of IC card reading on the financial terminal The writing ability of the gold card keyboard, the operator's IC signature ability is increased during the transaction process, and the hidden danger of the ultra-privilege violation operation can be better solved.

2. Problems in the use of financial magnetic cards

The financial magnetic card itself has the problem of being easily copied. By reading the information on the magnetic card track, it is possible to copy a bank card that can be used on the self-service devices such as POS and ATM in the mall within a few minutes. The personal information and key recorded in the IC card can be securely protected by personal passwords, work keys, etc., and may not be illegally copied.

In addition, from the perspective of management, after the financial card is lost, the illegal cardholder can face the password without mistake and say "the password is wrong", change the environment and try the password again, and the IC card is in the In an offline environment, it is also possible to effectively control the number of times an illegal cardholder attempts a password.

From the point of view of the transaction process, although the bank can authenticate the cardholder according to the password, but for the cardholder, he can not identify the true validity of the bank, and the security control of the card transaction is concentrated on the personal password. Since the transaction message can be analyzed, that is to say, in some aspects, if the management control has a problem, the password of the cardholder is transparent. If the bank's internal staff is disadvantaged, he can analyze the POS or ATM transaction messages, analyze the user's funds, analyze the user's password, etc. to achieve the purpose of stealing the user card. If there is an illegal bank or illegal bank terminal device, the hacker can obtain the track information and personal password of the deceived cardholder, thereby achieving the purpose of illegally making the financial magnetic card and withdrawing it in the real environment of the bank, such as the 2001 Guangdong version of the "Gold Card Project". >In the second issue, the second fake cash machine financial fraud appeared in Taipei. This financial fraud defrauded the magnetic card by placing a mobile cash machine impersonating a private bank in a busy city such as Taipei Shilin. The track information and personal passwords illegally defrauded hundreds of NT$4 million.

Financial IC card is to make full use of the "smart" feature on its card, through the security settings and storage of various keys and passwords, card and terminal authentication, transaction authentication, electronic signature, etc., through the design of IC card two-way authentication to identify Banks and cards are authentic and valid, while password modification, verification, etc. are performed only on the card and do not need to be transmitted over the network.

3. Credit control

Interest income from credit card overdraft or debit card consumer credit is also an important source of income for the bank card business. However, the current level of personal credit in China is relatively different. Traditional magnetic card technology cannot pass the credit information of each cardholder to the transaction link of the special merchants to treat it differently, mainly by reducing the general credit line to control the risk, thus suppressing The credit consumption of most credit cardholders.

Compared with the ordinary magnetic strip credit card, since the balance and the allowed overdraft limit can be stored on the IC card chip, the customer has a certain credit consumption capability, making offline consumption possible, and avoiding the malicious overdraft phenomenon of the magnetic stripe card. . The IC card can be safely traded offline. The IC card stores the customer's basic information (such as name, certificate type, ID number), account balance, authorization amount, and customer's password PIN. During the transaction, the bank is automatically identified. The effectiveness of the IC card and the recording of the transaction process, without the need for complex manual authorization, simplifies the transaction process, and the security, speed and accuracy of the transaction are greatly improved. In addition, the transaction data can be exchanged with the bank by means of centralized communication, and the requirements for communication are greatly reduced, which is conducive to increasing the enthusiasm of the merchants to accept the bank card, thereby expanding the application field of the bank card and improving the use effect.

Compared with the previous payment methods, the financial smart card has its unique security features, so that the payment system can not be forged, the key will not be leaked, the transaction will not be tampered with, and the bank risk will be minimized. In short, if the IC card is used as a long-term investment of the bank, the return prospects are very attractive.

Third, the security design of smart card applications

The overall security of the financial IC card application system is controlled by the host, the network, and the terminal to fully utilize the security mechanism of the IC card.

On the one hand, the following issues need to be noted in application design:

1. The keys on the personal card are absolutely decentralized, ie the keys on each card are different.

2. Deposits and debits must use different keys. The deposit must be an online transaction process. The strict control is: the deposit key must not be stored in the terminal, because it is invalid to control the security through the application software. For engineers with usage rights, if the terminal has a deposit key, it can be equivalent to the bank's vault.

3. Two-way authentication is required between the terminal and the card. The terminal needs to check the validity of the IC card. An expired and blacklisted IC card should refuse to execute the transaction and lock the card function, and the card also needs the authentication terminal.

4. For financial IC card transactions, transaction details are provided on the card, terminal and financial IC card application system host for future audit.

On the other hand, POS and self-service terminal devices are not as easy to manage as real-time monitoring in the host and the private network inside the banking system. The application of the IC card can greatly improve the security control capability of the terminal device in financial transactions. Below we talk about the smart card security control in the terminal field in combination with the NEWLAND 8100 POS and NEWLAND 8800 card self-service terminals designed by New World Computer Co., Ltd.

Taking into account the unlimited development space of the smart card in the future, the Newland's NEWLAND 8800 card self-service device has IC card reading and writing, PSAM card, contactless smart card reading and writing module in hardware design, to meet the query, change the confidentiality, document printing, card recharge , IC card storage, circle, self-service payment and other self-service customer service needs, for banks, stock exchanges, telecommunications halls, campuses, gas stations, shopping malls, supermarkets and other places. Another well-designed IC boutique NEWLAND 8100 new POS terminal with dedicated security chip, self-destruct function, and receiving PSAM module, used to store the process key of financial transactions, with high confidentiality; The safety management of the implements and operators, specially designed the operator IC card holder to meet the application needs of the teller card, in the design of the application system, the design of the teller CPU card to store the personal information of the POS and the teller, and the check-in authentication The key is used to generate random numbers, encrypt transmission keys, etc., so as to achieve truly effective security control.

As the transaction for the check-in application key, the smart operator card is used to apply for the work key using the IC's private exchange key after the PIN of the operator card is passed, so that the transaction key is effectively controlled.

The added PSAM card control module is designed to effectively control offline transactions: such as the security of the debit key. Since the process of generating a random number by the cryptographic signature is controlled within the card, the transaction interface between the card and the outside world is single, and all transactions are controllable in terms of security. As long as the personalization process of the key is effectively controlled, its features will be non-embedable and non-replicable.

For user cards, if lost, there are no security issues. Because of the protection of the personal PIN, the POS machine or self-service card terminal needs to check the cardholder's personal PIN when processing the passbook transaction process. Since the illegal cardholder has no legal password, the password is entered 3 or 6 times in succession. After the IC card will automatically lock the card, and the illegal card holder's forced unlocking of the IC will only lead to the retirement of the IC card. In addition, NEWLAND 8100 POS and NEWLAND 8800 card self-service terminal devices manage the lost cards and stolen cards held by illegal cardholders through the blacklist of large-capacity space.

The authentication key and debit key used to control the user's IC card in the NEWLAND 8100 POS and NEWLAND 8800 card self-service terminals are stored on the security chip or the SAM card. During the transaction, the key operations for authentication or debit are in the process. The security chip or the SAM card is completed, thereby preventing the leakage of the key. The security chip also has a self-protecting self-destruct function to prevent illegal operations. For secure management of secure chip keys, the NEWLAND 8100 POS has designed a dedicated program area independent of the application software module for downloading and changing the secret chip key of the POS terminal without telling the application how to modify the key. At the same time, NEWLand 8100 POS terminal and NEWLAND 8800 card self-service terminal have secure power-off protection to ensure the security and reliability of transaction record storage.

Before the IC card transaction, the IC card can verify the legal validity of the POS terminal through the security chip or SAM card of the NEWLAND 8100 POS, and the POS verifies the legal validity of the IC card. Since the POS terminal cannot illegally generate an electronic signature of a valid IC card transaction, the merchant cannot modify the transaction data that has already been completed, and cannot forge the transaction data without the user IC card or the user's IC card transaction failure.

For the offline IC card change, check the balance, check the transaction details, with the support of the IC card and PSAM card, the transaction process control is carried out in the card.

Fourth, the industry status and application prospects

The bank's informatization construction is not only the acquisition of computers and the installation of networks. In fact, the smart card environment in the field of smart cards and end-end equipment is also an important part of informatization construction.

An IC card system that uses a portable card to store data information can replace the complicated work of many users. The data stored in the IC card makes it a substitute for things such as banknotes, identity authentication, passwords, etc. The convenience of combining multiple functions is an end user's inability to reject.

The IC card system is actually not new in the domestic market. As early as 1993, the construction of the "golden card project" began in China, and its main purpose was to realize the bank's smart card-type "electronic money" system. So far, the "Golden Card Project" has been quite effective. The financial card reading system has been widely adopted by various banking outlets and retail companies, and the application of the financial card itself has been received by individual consumers.

Due to the security features of smart cards, it will bring several changes to the banking business: 1. Secure offline transactions, without complicated manual authorization, simplify the transaction process, reduce communication requirements, and help improve merchants' card acceptance. Passion; 2. Improve the control level of credit risk, which is conducive to the development of the market and the promotion of bank card business; 3. The security system of smart card provides a strong guarantee for the security control of online consumption, online banking, online securities and other services. This has led to more business opportunities in online personal banking.

According to more optimistic estimates by the relevant departments, by 2003, about half of online transactions will use smart card technology to ensure security. Mobile phones have adopted smart cards. For the banking business, banks, retailers, and individual users are concerned about secure and reliable transaction confirmation. The initial reason for France to start switching from magnetic cards to smart cards was fraudulent disasters. The data of the smart card organization in May 1999 showed that the fraud rate in France since the use of smart cards in 10 years has dropped 10 times, from 0.18 in 1998 to 0.018 in 1999. During this period, the number of transactions was from 1.197 billion in 1998 to 3.137 billion in 1999, and now about 33 million smart cards are circulating in France. Switching to smart card technology will reduce card fraud, especially forgery fraud, while smart cards will also provide more opportunities for cardholder identity verification.

We look forward to the day when our wallet is no longer full of various cards, can use the same dual interface card (contact / contactless) smart card to start the car, enter the office through physical contact, use this card to secure Log in to your computer, use the wallet to buy cakes from the cafeteria, and use this card to prove your identity at the gym. Of course, all of the above are just some of the possibilities that smart cards bring to us in the new millennium. The broader application prospects require us all to work together. (Text / Fujian Newland Computer Co., Ltd. Lan Shuchun)

Pet Houses


Enclosed bed can be used as a cozy cave to hideaway, enhances privacy and make your pets feel warm and secure. Perfect hideaway and a quiet, private place to sleep.


GREEN MATERIAL: The pet condo is made of environmental material and washable clothes with No odor.


EASY TO ASSEMBLE: The pet house is simple to install, no glue or other installation tools are required, all instructions and parts are included. The design of the shape makes it look more exquisite. You can easily assemble it in a few minutes according to the installation drawings.


SPACIOUS SPACE: There is plenty of space for pets to rest and play.


Suitable for parks, camping, travel, homes and other places, carry the tent.


PERFECT GIFT: The unique pet house design and sturdy room structure, you can use as a gift to your friends and relatives who also love pets. The pet house will surely make your friend and his pet like it. If you have any quality problems, please contact us in time.


Pets are our family and friends, they need a warm and private place.


We are a Chinese pet products manufacturer, our company produces and sells various cat accessories and dog accessories, including Pet Toys , Pet Apparel And Accessories, Pet Collar And Leashes , Pet Beds And Accessories, Pet Cleaning And Grooming Products, Pet Bowls And Feeders , Pet Houses, and Pet Carriers And Travel Products, which are accepted OEM&ODM. Please don`t hesitate to contact me if you need anything.


Pet Houses,Indoor Dog House,Heated Dog House,Cardboard Cat House

Jilin LOYO Pet Products Co.,Ltd. , https://www.loyopetproducts.com