The difference between IC card and ID card

At present, inductive IC cards and ID cards have been used in many management systems as the cost of production declines and the technology matures. The applications are becoming more and more widespread, and their superiority is becoming more and more acceptable to society. Many companies and companies have Developers of smart communities or buildings are required to apply for one-card projects. However, there are still many doubts and misunderstandings regarding the use of IC cards or the use of ID cards as a card issue. Here to talk about the two major differences between the two cards to help everyone out of the errors. First, the definition of IC card and ID card The IC card is called the Integrated Circuit Card, also called the Smart Card. Can read and write, large capacity, encryption, data records, reliable, more convenient to use, such as card systems, consumer systems, time and attendance systems, etc. Currently, there are PHILIPS Mifare series cards. ID card full name identification card (Identification Card), is a non-writable proximity card, with a fixed number, mainly SYRIS Taiwan's EM format, the United States HID, TI, MOTOROLA and other types of ID cards. Second, why IC card to do initialization (ie, encryption) work, and ID card do not use? 1. When the IC card is used, it must first pass through the unique two-way key authentication between the IC card and the read/write device before the related work can be performed, so that the entire system has a very high security guarantee. Therefore, the factory IC card must be initialized (ie, encrypted) in order to generate a non-decryptable one-card system key in the post-shipping IC card, so as to ensure the secure distribution mechanism of the card system. 2. After the IC card is initialized and encrypted, it is passed to the user, and the customer uses the IC card issuing system to generate a private key for each user card. In this way, it is ensured that user cards issued in other user systems cannot be used in the system, which ensures the specificity of the system and thus ensures the safe use mechanism of the system. 3, ID cards and magnetic cards, just use the "card number" only, in addition to the card card number, no security features, its "card number" is open and exposed. Therefore, the ID card is an "inductive magnetic card," which means that there is no need for initialization or initialization. 4. Why isn't the initialization process done by the user? This is because: A If the user initializes himself, he/she cannot prevent the cheating inside the user. Because when the user uses the card system, if an employee uses the socially purchased card to initialize it at will, he can freely issue a household card that can be used by the household and can even freely recharge the card. This will not only result in serious cheating consequences, but also This will lead to serious flaws in the use mechanism of the security of the card system. B In addition, if the user purchases a defective factory card and initializes it, and it cannot be used on the system, it will cause the system to use poor performance or defects, which will result in unclear liability for the accident. C. The initialization process is performed in the factory, mainly the basic needs of the IC card security key authentication mechanism, and is also the line of the IC card system integrator. Just like the urban public transportation IC cards, before the cards are handed over to the public transport system, the key of each card must be controlled by factory encryption. D. If the key card for initializing the authorization is lost due to lack of professional management by the user, the user and the manufacturer cannot use the card. Therefore, the initialization work is done by the manufacturer only to ensure safety, of course, can also be handled according to the actual situation of the user. Third, the comparison of IC card system and ID card system 1, security: The security of IC cards is much greater than that of ID cards. The card number in the ID card is read without any authority and is easy to copy. The reading and writing of the data recorded in the IC card requires corresponding password authentication, and even each zone in the card has a different password protection to fully protect the data security. The password for the IC card writing data and the password for reading out the data can be Different settings provide a good level of management to ensure system security. 2. Recordability: The ID card cannot write data, and its record content (card number) can only be written by the chip manufacturer once. The developer can only read the card number and use it, and cannot formulate a new number management system according to the actual needs of the system. The IC card can not only read a large amount of data by an authorized user, but also can authorize the user to write a large amount of data (such as a new card number, user's authority, user information, etc.), and the content recorded by the IC card can be erased repeatedly. 3, storage capacity: The ID card only records the card number; the IC card (such as the Philips mifare1 card) can record about 1000 characters of content. 4, offline and networking operation: Because there is no content in the ID card card, the card holder's authority and system function operation are completely dependent on the support of the computer network platform database. The IC card itself has recorded a large amount of user-related content (card numbers, user data, permissions, spending balances, and other large amounts of information), and can completely run off of the computer platform, to achieve the operating mode of automatic conversion between networking and offline, to achieve a wide range of use, Less wiring requirements. 5, card extension application: Because ID card has no record and no partition, it can only rely on network software to process information of each subsystem, which greatly increases the dependence on the network; if the user wants to increase the function point after the completion of the ID card system, additional wiring is required. This not only increases the difficulty of construction, but also increases unnecessary investment. Therefore, using an ID card as a system makes it difficult to expand the system and it is difficult to realize a true card. The IC card storage area itself is divided into 16 partitions, each partition has a different password, with multiple subsystems independent management functions, such as the first partition to achieve access control, the second partition to achieve consumption, the third partition to achieve employee attendance and so on. Fully implement the purpose of one card, and can achieve complete modular design. Even if users need to increase the function points, they do not need to re-wiring. They only need to add hardware and software modules, which facilitates the upgrade and expansion of the IC card system at any time and achieve a smooth upgrade. Reduce duplicate investment. 6, intelligent system maintenance and operation: For example, if a computer issues a new user ID card, it must manually download all ID card numbers to each ID card reader controller through the network of the ID card system. Otherwise, the ID card is used as an invalid card. Cannot be used; if you want to change user rights, you need to enter the ID card number with permission on each ID card controller. For another example, after the system is put into use, it is often necessary to add an ID card. In order to add a card or modify the permission of a card, it is necessary to input the card number on all the controllers available for the card. This greatly increases the workload and time for manual operation and maintenance. In addition, if more than a few card subsystems, or subsystems are slightly larger, the complexity of system maintenance management will be a geometric increase, will directly lead to the system can not run properly. With the IC card's one-card system, after the IC card is issued, the card itself is a data information carrier. Even if the communication network is disconnected, the read-write controller performs offline card reading and writing as usual. If you change the user rights, you can directly write the user's rights in the IC card. The newly added user can change the rights simply by modifying the card. There is no need to modify the controllers at all. From the technical mechanism, the manager is prevented from changing the controller everywhere. The issue of card use rights has achieved the goal of improving management efficiency and achieving intelligent management. 7, price: Although ID cards and ID card readers are cheaper than IC card cards and card readers, the price of the two systems is comparable to that of the entire card system (wiring cost, structure composition), and only the IC card system can run. It is stable and reliable, so the cost-effectiveness of IC card systems is much higher than that of ID card systems. In addition, considering that the current hardware environment of various implementing units is not very mature, system maintenance personnel are not very familiar with the reality of computer knowledge, it is impossible to establish or maintain a complete network system to support the 24-hour continuous network of ID card system. Operation. Therefore, the smart IC card one-card system that satisfies the need for networking and offline operation is the only choice for today's users. 8, the card industry has two conclusions: An ID card cannot be made into a card (as described above), and an ID card cannot be consumed unless it can accept its inadequacies (as described above): The biggest reason ID cards cannot be consumed is the “credit” problem. Because the ID card has no key security authentication mechanism and cannot write cards, the consumption data and amount can only be stored in the computer's database. The computer is managed by the property management personnel. There is absolutely room for cheating on reason and mechanism. In addition, catastrophic consequences will occur if consumer data crashes due to computer problems. Therefore, it is impossible for consumers to agree that the authoritativeness (ie, credit) of the ID card in management is too many money disputes to make the ID card consumption system unusable, especially in public systems such as the community management system. The IC card consumption system, because of its high reliability, can not be cracked in line with the ISO9001 international safety certification mechanism, but mainly because the "electronic wallet" that is, the IC card in the hands of the user, the amount of each consumption by the user "master" In the hands, so that the IC card consumption system is a very "credit" consumer system. Of course, in the networked state, the computer still has the same data as the user's IC card. For the system, this also implements dual-security data backup. 9. The "strange" phenomenon that IC cards use as ID cards: Some ID card devices and system vendors are forced to use IC cards for their strong advantages. They also claim that their systems use IC cards, but in fact they use only the IC card public area card numbers and do not change their ID cards. The system structure, but also does not have the IC card owned by the key authentication, read and write security mechanisms. Therefore, it is inferred from fact that it is still an ID card card system. Compared with the traditional ID card system, it is only a waste of resources, it is more deceptive, and it is also unable to have the advantages of the IC card system. Fourth, the conclusion The IC card can integrate complex key authentication and identity authentication logic and will replace the previous magnetic card and ID card (ie, inductive “magnetic card”). Due to the inherent keyless authentication, readable and non-writable ID card system, and the need to completely rely on network operation defects, it has been dissatisfied with the ever-increasing demand for smart cards of today's implementing agencies, and will inevitably only serve as a transitional product. The well-known magnetic cards are being phased out. The process of continuous elimination of ID cards is accompanied by the vigorous development of smart IC cards. At present, IC cards are in the mainstream, and ID cards should only be used in certain specific management systems. If the system only requires user identification to recommend the use of ID cards, this can reduce costs. If the system requires more functions, it is recommended that IC smart cards be used for a long time to benefit from a safe point of view.

Posted on