Latest
In the post-epidemic era, NFC is on the rise again
Nowadays, with the impact of the COVID-19 pandemic, contactless payment has become more and more popular. In addition, NFC plays a vital role in many fields including wearables, anti-counterfeiting verification, logistics, etc. ABI ...
Keywords: NFC
Publish Time:2022-02-10
The development of modern identity information authentication technology from the perspective of identity card reform
When it comes to proving “I am who I am”, the resident identity card (hereinafter referred to as the ID card) has become the only verification method for humans....
Keywords: ID card transformation identity information authentication technical fingerprint recognition
Publish Time:2019-04-12
The design of the third-generation ID card is revealed, full of technology! It can locate, bind cards, and pay with fingerprints
The design of the third-generation ID card is revealed, full of technology! It can locate, bind cards, and pay with fingerprints The ID cards that everyone uses now are basically second-generation ID cards, which currently only have the most basic function of ID cards, that is, identity verification. The third-generation ID card is currently under conceptual design, but there are still some questions about the third-generation ID card....
Keywords: ID card third generation technology
Publish Time:2019-04-09
Coil module package for contactless ID cards: Infineon offers complete solution with integrated chip and antenna
Coil module package for contactless ID cards: Infineon offers complete solution with integrated chip and antenna At the heart of electronic ID cards (eIDs) and passports is a robust and durable security solution. Security chips packaged in a "coil on module" (CoM) offer clear advantages in this regard....
Keywords: Infineon eID
Publish Time:2017-11-30
Analysis of the top ten application cases of smart card system
Smart card is a modern smart card system consisting of access control management system, attendance management system, patrol management system, consumption management system and parking management system....
Keywords: Smart Card System Card
Publish Time:2017-02-16
Review of innovative technologies and applications of foreign smart cards in 2013
Since the 1990s, the development of smart cards in my country has been more than 20 years, creating a lot of convenience for our lives. Today, smart card applications have penetrated into every aspect of our lives, and the traditional application market has almost reached saturation. How to promote innovation in smart card technology and applications has become a smart card......
Publish Time:2014-01-15
Analysis of the application examples of three intelligent video analysis technologies
1. Dynamic face capture device Dynamic face occlusion detection uses intelligent video analysis technology, namely face occlusion detection algorithm, to analyze and detect people's faces, automatically judge people's facial features, and automatically detect suspicious behaviors such as wearing sunglasses, lowering the brim of a hat or wearing a mask, and any other forms of intentional facial features....
Publish Time:2012-09-04
Contactless CPU smart card technology
Contactless CPU smart card technology IntroductionWith the continuous application of contactless logic encryption cards, the shortcomings of its technology have become increasingly exposed, making it difficult to meet the needs of higher security and more complex multi-applications. In 2008, a method to crack the password of Mifare Classic IC chip (i.e. M1 chip) was published on the Internet; German researcher Henrik Plotz (......
Publish Time:2011-11-23
Locking top secrets, security analysis of smart card encryption chips
1. Introduction: With the increasing rampant piracy and cracking in China, the interests of product developers have been seriously affected. It is becoming more and more important to protect the intellectual property rights of developers' products from a technical perspective. There are many encryption chips of various shapes and sizes on the market. Which encryption chips can play the role of encryption protection? The following......
Keywords: Smart card encryption chip security
Publish Time:2011-08-05
Smart card operating system encryption algorithm commands
Smart card operating system encryption algorithm commands   Cryptographic algorithm commands are very important for many applications. For example, they make it easier to use smart cards as encryption and decryption devices or for verifying digital signatures. Many smart card operating systems have their own set of commands to perform cryptographic algorithms. Because there is no standard for this type of functionality, there are commands such as ENCRYPT (......
Keywords: Smart card operating system encryption algorithm
Publish Time:2011-03-11
New Development of Contactless IC Card Technology in the Post-MI Era
  Since the security issues of Mifare I cards attracted domestic attention in 2009, the access control card system has made a qualitative leap in system and card encryption technology. CPU cards have gradually become mainstream, and the integration of mobile phones and smart cards has become a fashion driven by telecom operators. At the same time, relevant national departments have proposed......
Keywords: CPU card contactless IC card
Publish Time:2011-03-07
The application and development of cryptographic algorithms in smart cards
  In the past decade, the computing power on smart cards has developed rapidly, and public key-based smart cards have been widely used in various fields. In 2001, Borst summarized the various cryptographic algorithms used on smart cards and the attacks on these algorithms. Since then, there have been more and more attacks on cryptographic algorithms, among which the more famous ones are......
Keywords: Cryptographic algorithms smart cards
Publish Time:2011-02-14
A review of the development of cryptographic algorithms in smart card applications
  Abstract: In the past decade, the computing power on smart cards has developed rapidly, and public key-based smart cards have been widely used in various fields. In 2001, Borst summarized the various cryptographic algorithms used on smart cards and the attacks on these algorithms. In the past decade, the computing power on smart cards has developed rapidly......
Keywords: Smart card Cryptography RSA algorithm
Publish Time:2010-10-28
Single-sample face recognition technology based on mirror singular value decomposition
Single-sample face recognition technology based on mirror singular value decomposition   Abstract: There are many frontal face recognition methods. When there are sufficient training samples, they can achieve good recognition results. However, when dealing with single-sample face recognition problems, the effect is significantly reduced. In view of this situation, a single-sample face recognition method based on mirror singular value decomposition is proposed. By using mirror singular value decomposition, the single-sample face recognition method can achieve good recognition results....
Keywords: training samples mirror singular value decomposition posture
Publish Time:2010-10-23
Talk about the direction of access control system cracking technology and encryption technology
  Since the IC card encryption cracking problem was solved in 2009, the Ministry of Information Industry issued relevant information, prohibiting the use of IC cards as identification cards and billing cards in key departments and agencies in the future access control systems and one-card systems. Therefore, many access control manufacturers have changed their original designs. The main reason is that they have adopted CPU ......
Keywords: Access control system IC card cracking encryption
Publish Time:2010-10-14
Design of prison AB door anti-tailgating face recognition access control system
Design of prison AB door anti-tailgating face recognition access control system 1. System Overview With the advancement of prison monitoring management, the traditional monitoring management model faces the challenge of reform. On the one hand, the security situation is becoming increasingly severe; on the other hand, the organization is compressed and the staff is streamlined. The new situation has put forward new demands on security work. Under the unified arrangement of the prison, according to the technology......
Keywords: Prison AB door anti-tailing face recognition access control
Publish Time:2010-10-11
Design of access control management for confidential carriers and personnel based on RFID
Design of access control management for confidential carriers and personnel based on RFID 1. System Overview At present, more and more attention is paid to the management and monitoring of confidential carriers and important confidential documents, such as office portable computers, USB flash drives, mobile hard drives, digital cameras, video cameras, voice recorders and confidential documents. The management system for confidential carriers and important confidential documents adopts traditional barcode scanning and......
Keywords: Confidential carrier access control management RFID active card reader
Publish Time:2010-10-11
Access control: From fingerprint to face recognition technology in-depth interpretation
In order to further adapt to the requirements of high security, the access control system has also undergone changes in RFID card access control, fingerprint access control, iris recognition access control, and facial recognition access control systems. Introduction to fingerprint and face recognition 1. Fingerprint recognition access control Fingerprint access control system uses human biometric fingerprints to identify......
Keywords: Access control fingerprint face recognition technology security
Publish Time:2010-08-26
Identity recognition and automatic voice playback system based on DTMF
Identity recognition and automatic voice playback system based on DTMF 1 Introduction Since most radio stations use a fully transparent transmission method, as long as the frequency band is the same, the voice signal sent on the same frequency band can be received, so it is impossible to accurately identify whether the signal is useful. Radio stations with voice encryption function can avoid this situation, but in some fields or places that require high confidentiality, such as military......
Keywords: Dual-tone multi-frequency (DTMF) C8051F ISD4004 wireless identity recognition
Publish Time:2010-08-07
Integrating optical gesture recognition into thin LCDs
Researchers from MIT's Media Lab are using displays with embedded optical sensors as lens-free cameras to recognize hand gestures in front of the screen. The researchers are looking to develop a system that can be integrated into thin LCDs along with technologies like capacitive sensing, giving users......
Keywords: Optics Gesture Recognition LCD
Publish Time:2010-08-05

EEWorld
subscription
account

EEWorld
service
account

Automotive
development
circle

About Us Customer Service Contact Information Datasheet Sitemap LatestNews

Site relate: Video surveillance Smart Card Burglar alarm Smart Management processor sensor Other technologies Comprehensive Information Security Forum

Room 1530, 15th Floor, Building B, No. 18 Zhongguancun Street, Haidian District, Beijing Telephone: (010) 82350740 Postal Code: 100190

Copyright © 2005-2024 EEWORLD.com.cn, Inc. All rights reserved 京ICP证060456号 京ICP备10001474号-1 电信业务审批[2006]字第258号函 京公网安备 11010802033920号