Bank CPU Card Application

0 Preface

Various types of magnetic cards, such as business card sizes, are almost everywhere in today's life. These cards are made of plastic and are the same size except for the relevant professionals. People pay little attention to the principle of magnetic cards and the data security of magnetic cards. Although people are using bank cards, many people are unable to use bank cards correctly, so that their bank accounts are stolen from cash. There are two reasons for the loss of cash:

On the one hand, the bank card users do not understand the relevant technical characteristics of the existing magnetic card, on the other hand, the magnetic card technology used by the bank card is not safe enough. This paper believes that the magnetic card technology is mainly backward. In order to provide users with higher data security, this paper suggests that banks should use CPU cards to replace existing magnetic cards and eliminate magnetic cards in the banking system.

1 line card application principle

The bank magnetic card is made of a liquid magnetic material or a magnetic strip as an information carrier, and the liquid magnetic material is coated on a card (such as a passbook) or a magnetic strip having a width of 6 to 14 mm is pressed onto the card. The difference between the bank magnetic card and the various member magnetic cards in daily life is that the magnetic resistance of the magnetic strip applied or affixed on the top is different. The bank magnetic card uses a high diamagnetic material. The ordinary magnetic card uses a general diamagnetic material, and the others have no difference. There are 3 tracks on the magnetic card. According to the ISO 7811/2 standard, the first track can store 76 alphanumeric characters and is read-only after being first magnetically written: the second track can store 37 numeric characters and is also read-only; Three tracks can store 104 numeric characters. It is readable and writable. Bank cards are used to record information such as book balances. The position of the three tracks on the card is strictly defined in the international standard ISO 007811/5. Information can be stored on all three tracks, such as ICBC with 1.3 tracks and Construction Bank with 2.3 tracks. In view of the versatility of the magnetic card, criminals can use a few ordinary membership cards to copy the bank card to the ATM to withdraw money. As a result, there have been many criminal acts of installing equipment on the cash machine to steal information from others. Only the user's account is stored on the bank's magnetic card. The user's password is stored in the central database of the banking system. The means of criminals is to install a fake automatic withdrawal device on the cash dispenser. After the user inserts the card into the machine, the card number can be read and saved, and the entered password can also be saved. The criminals can then use the saved information to copy the user's account and use the password to extract cash. This shows that the data security of the magnetic card is really poor, and it is imperative to improve the existing bank card.

2 CPU card application principle

The CPU card is also called a smart card. The integrated circuit in the card has a microprocessor CPU. Memory unit (including random access memory RAM. program memory ROM (nASH). User data memory EEPROM) and chip operating system COS. A CPU card with a COS is equivalent to a microcomputer. It not only has data storage function, but also has functions such as command processing and data security protection. Because the chip itself has computing power. Program storage capabilities and operating system, so part of the application can be executed on the card during application development. The other part is executed on the computer, so that the developed application system is more secure and reliable. First of all, the execution program on the card is written by the chip vendor, and the general personnel cannot change it. This can make the card not be copied, which increases the security of the card. In addition, each chip has a unique hardware number, if the hardware information of the chip is applied to the system application. Can greatly improve the security of the application system. Most of the currently used software dogs use this technology for software copyright protection. Only the dongle is plugged into the computer's USB port, and the CPU card is a passive card driven by electromagnetic waves. It is identical in appearance to the bus IC card used daily. The chip used by the CPU card is more than the chip used by the IC card. For advanced. The chips in the CPU card have computing power. Program storage capacity. Operating system and data storage capacity, while the chips used in IC cards only have data storage capabilities. However, whether it is a CPU card or an IC card, the electromagnetic wave is driven by a certain frequency to supply energy to the chip for calculation and processing operations.

3 CPU bank card solution

In view of the characteristics of the CPU card, the bank should use the following aspects to improve the business processing method when using the CPU card for transaction processing. First, the banking process is divided into two parts: one is the card identification part, and the other part is the bank accounting processing part. Card identification can be achieved by combining the banking system calculation with the card's own calculation. Card identification can make full use of the CPU card's own resources. It can effectively improve the security of card use, and the combination plan can perform the function planning of each component of the CPU card.

In this way, the card identity authentication program can be stored in the program storage area of ​​the CPU card. Under the action of the external command, the program on the card can use the CPU (central processing unit) of the card for the authentication calculation. The chip's data memory can store the chip CPU operation results and user accounts. Information such as account balance, last trading time, etc.

In addition, each chip of the CPU card has a unique serial number after shipment. Just like each motherboard has a unique number. The card identification can start the identity authentication program stored on the CPU card through the card reader on the bank terminal, and the identity authentication program can calculate a card identification code by using the chip serial number and the account and balance information stored on the card. The card identification code calculated by the CPU card can be saved in the data area of ​​the CPU card for comparison with the bank terminal. The bank terminal can query the chip serial number of the card from the central database according to the account number on the card. Information such as account balance, and then use the terminal to calculate another card ID. Compare the two card IDs. If the two card IDs are the same, it indicates that the card used is a CPU card issued by the bank, and then the next account processing can be performed. If the two card IDs are inconsistent, it means that the card used is illegal or the card is damaged and cannot be used. The banking system will refuse to process the account (that is, it cannot handle the business).

Note: The bank can write the card CPU authentication program to the program area of ​​the chip through a dedicated device. When performing card identity authentication, the machine of the bank terminal issues an instruction to perform identity authentication to the CPU card. At this time, the authentication program on the card uses the hardware information on the card and the stored data information, and the CPU (central processing unit) on the CPU card. The card identification code is calculated. At the same time, the bank terminal uses the account information on the card to query the central database. If the relevant information is queried in the central database, the bank terminal uses the queried information to perform card identity authentication. Another card identification code is calculated. Finally, the bank terminal system compares the two card identification codes. If the identity of the same description card is correct, the system can accept the business; if it is not the same, the card identity is incorrect, and the system cannot accept the business. At the time of accounting processing, the information such as the account balance, processing network, time, and the like are written into the central database, and the data is written into the data memory of the CPU card, and the data can be used in the next card authentication.

4 Conclusion

Compared with the current bank magnetic card solution, the bank CPU card application solution proposed in this paper adds a card identity authentication link to the bank CPU card application solution.

Card authentication is calculated by the card CPU and terminal distribution calculation. Since the identity authentication in the card uses the unique hardware information such as chip hardware information and account, a specific card identity authentication program is also written on the chip, and the CPU card is copied and calculated on the card according to the original authentication program. The card authentication code cannot be the same as the authentication code calculated by the terminal system, and the copied CPU card cannot pass the card identity authentication. That is, the copied CPU card cannot be used. Therefore, the scheme has high data security.

Oil Kettle


Food grade SS304 oil kettle with leak proof design to prevent spillage. Some items with slender spout ,which can easily to pour ,and stream control. Different size for you to choose, and is suitable for storage of various liquids and use in kitchen or dinner table.

Silver and color painting items is available, welcome to talk with us for any question and inquiry.

Welcome to contact us for more details about it and our factory, if you want to visit our factory,please feel free to talk with us. Will be glad to hear from you.





Material:SS304

Finishing: Satin polishing ,Mirror Polishing ,Color painting

Logo: Laser logo, Etching logo, Silk printing logo, Embossed logo, Decal logo

MOQ : 2000 PCS

Packaging : White box, Mail box or Customized package

Sample Time : 7~10 days

Lead Time :60 days after have the deposit

Payment: T/T ,L/C or others

Payment term: 30% deposit before production and 70 % balance against the copy B/L


stainless steel oil kettledifferent size oil kettle oil can





FAQ:


1:How can I get the sample?

We can provide the sample for customers to check the quality.

Please kindly provide the delivery info for calculate the sample cost. If you have DHL /TNT/UPS/FEDEX account, please also kindly provide it to us.

You can do the payment of sample via T/T and PayPal.

2:How about the sample time?

Usually the sample time is 7~10 days after have the sample cost.


3:How long will it take for mass production?

Usually 45~60 days after have the deposit.


4:Can we have our logo or company name to be printed on your products or the package?

Welcome OEM.


5:what certificate can you provide?

CE,CB,GS,FDA,LFGB,ROHS are available here.


6:How can we get your monthly new products announcement?

Please join our mailing lists.




Our Service


Excellent quality

OEM packaging and product

Good service

Rich experience save your time and money


Oil Kettle

Oil Kettle,Olive Oil Kettle,Coconut Oil Kettle,Good Health Avocado Oil Kettle

Jiangmen Wellway Houseware Co.,Ltd , https://www.wellwayhouseware.com