Technical Background
Since the cracking of Mifare 1 card algorithm attracted wide attention from social media in February 2009, the security of contactless IC cards has become one of the hottest topics in the smart card industry. The cracked security algorithm of Mifare 1 card chip is the most widely used security algorithm of contactless IC cards in the world! It is conceivable that if this scientific research result is used maliciously, most access control systems will lose their meaning of existence, and other IC cards using this technology, such as campus cards and corporate cards used by college students, will also face huge security risks.
The Ministry of Industry and Information Technology of China also issued relevant documents in response to this incident, requiring all regions to conduct investigations and response work on the use of Mifare 1 cards. The schematic diagram of M1 card cracking is shown in Figure 1. The use of domestically produced CPU cards and CPU card one-card systems with independent intellectual property rights can effectively solve the serious security risks of the current traditional one-card system based on Mifare 1 logical encryption cards. See Figure 2.
Figure 1 Schematic
diagram of M1 card cracking Figure 2 M1 card cracking method and hazards
User situation
The China Science and Technology Museum is the only national comprehensive science and technology museum in my country. It is a large-scale science popularization infrastructure for implementing the strategy of rejuvenating the country through science, education and talents, and improving the scientific literacy of the whole people. The first phase of the project was completed and opened on September 22, 1988, the second phase of the project was completed and opened on April 29, 2000, and the new museum was completed and opened on September 16, 2009.
The user requires the construction of a one-card system throughout the museum, including security access control system, consumption system, attendance system, conference check-in system, personnel visitor management, parking lot management, self-service system and other applications. To provide intelligent one-card services for the staff and visitors of the science and technology museum, considering the serious safety risks of M1 cards, the user requires the construction of an enterprise one-card system for the entire museum based on contactless CPU card technology, using contactless CPU cards as the carrier for identity recognition and transaction payment.
System Goal
Tongfang Enterprise One Card System is built with the world's most advanced contactless CPU card technology as the core, enterprise LAN as the supporting platform, and popular network structure, communication mode and development tools to achieve the functions of "one card for multiple uses" and "one card for all uses" within the enterprise.
Tongfang series products
Employees of the new China Science and Technology Museum can use an authorized CPU card to realize "one-card" services such as consumption, access control, attendance, comprehensive query, and personnel entry and exit through the software functions and hardware supporting equipment of the one-card system; external visitors can use a CPU card to realize various types of consumption within the company, and the system can also be expanded to conference check-in, medical, book borrowing and other systems; it can also be connected with the company's HR system, OA system, finance, building automation system and other systems to interact and share data information, providing corporate managers with basic data for various comprehensive queries and comprehensive analyses.
System composition
[page]
The system includes the card center platform, transaction applications, identity applications, and self-service applications, which are composed of key management module, card initialization module, center management module, card management module, consumption management module, consumption POS module, transaction settlement, access control management module, attendance management system, conference sign-in system, Web comprehensive query module, self-service machine module, etc.
One-card center platform system: It is the core layer of the One-card system, consisting of various modules such as the One-card center database, identity management, transaction settlement management, and system management. It mainly manages various application subsystems and hardware terminals of the One-card system, and manages business flows and data flows.
All-in-one card application subsystem: It is the application service layer of the all-in-one card, providing various application function management of the all-in-one card, including card management, comprehensive query, consumption, access control, attendance, meeting sign-in, visitor management, vehicle access monitoring, elevator control and other subsystems. Through various POS machines and card reading devices, the card information of the cardholder is collected and read and written, and through computer terminals, various cardholder information is managed to provide various card-related services for the cardholder.
Third-party application interface: The one-card system provides standardized interfaces and open communication protocols to facilitate third-party application subsystems (such as personnel management systems, OA office systems, building automation IBMS systems, etc.) to access the one-card center platform through a unified application interface to achieve data sharing and data exchange.
Main functions of the system
1. Card Center Platform
The One Card Center Platform is the data center, security control center, card management center, and clearing and accounting center of the entire system.
Settlement management: storage and processing of all transaction and management data; system security control including application authorization and device authorization management; blacklist management; clearing account management; account management, etc.
Card management:
Provides management functions such as unified issuance, loss reporting, card replacement, card exchange, card return and account cancellation of CPU cards.
2. Application subsystem
Security access control management
The access control management system consists of safe, reliable and easy-to-use smart card door locks, CPU card door control readers, controllers and management software, which can be used in both networked and non-networked environments. The smart card door lock system can set employee access rights according to each employee's department, administrative level and actual needs. Unauthorized personnel cannot open the door lock or pass through. The door opening records are processed and analyzed to obtain personnel access information; the system will issue real-time alarm information in the event of illegal intrusion, door lock damage, etc. Fire linkage can be realized, and linkage real-time monitoring can be realized.
[page]
The access control management system uses a CPU card security access control reader, uses SAM and CPU card security authentication, establishes a complete and strict key management system, and fully utilizes the security features of the CPU card. After the key is injected into the SAM card, it cannot be read from the outside. Insert the SAM card into the card reader and writer device, and perform two-way verification through the SAM card and the CPU card. The verification message is calculated by random factors. The same card is swiped on a device, and each time it is swiped, it is different, completely eliminating the appearance of "fake cards".
· Personnel visitor management system
The visitor system client is deployed at the guard management window at the entrance and exit of the office building. The system consists of management software, card issuer, first and second generation ID card reading equipment, digital camera, etc., and communicates with the identity authentication server of the card center. After obtaining a temporary access card, visitors can pass within the permitted range.
According to the actual needs of the company, visitor management can be connected with the existing access control system and elevator control system to enable the visitee to swipe the card at the doorman for confirmation (safer and more reliable), and automatically authorize the activity area for the visitor card issued by the guest (up to the visitor's authority). After the visit, the card can be swiped at the doorman to automatically complete the card return and cancellation.
Attendance management system
The attendance management system is based on the data of employees swiping cards at the access control or attendance machine using CPU cards, and is processed by the background attendance management module to fully realize the automation of employee attendance management. The system can flexibly set the working hours and shifts, formulate different attendance systems, and can quickly and accurately calculate the employees' working hours and off-duty times based on the employees' card swiping records, and generate the attendance reports required by users. After the summary results are processed, the employee's salary can be directly calculated.
Parking lot management system
The parking lot management system is similar to a general access control system. Employees can enter and exit the parking lot automatically with valid cards, and visitors can obtain a temporary access card at the ticket gate before entering the parking lot. The system collects data on vehicles entering and leaving the parking lot in real time, and can query the parking lot status at any time and generate various reports at any time. The parking lot management system can be divided into two categories: free parking and paid parking.
Consumption management system
The CPU card consumption management system can realize consumption management such as dining for employees within the enterprise, shopping within the enterprise or park, etc. The system can authorize and set consumption functions and operators such as canteens and canteens, establish consumption items and accounts, and employees consume with cards. The system performs security authentication on the card and encrypts and stores consumption information. The consumption information is sent to the back-end center system in real time or at regular intervals as the basis for unified settlement and account management.
Online patrol management system
The system can set the patrol route and time of security guards according to management needs. The security guards on duty must trigger the designated patrol points within the specified time. A series of induction cards representing different points are installed on the patrol route. When patrolling at each point, the patrol personnel use a handheld patrol machine to read the card and record the card number and time representing the point at the same time. After the patrol is completed, the patrol machine transmits the data to the background system through the communication line for processing, so that the patrol situation (personnel, location, time, event, etc.) can be recorded and evaluated.
Self-service inquiry system
Provides query of all transaction and management information (such as account information, transaction information, card service information, etc.) of the enterprise card system. The query content can be set by position, and people in different positions can query different information.
3. Third-party interface
The enterprise/park one-card system will provide interfaces with existing information systems such as financial statistics, personnel and salary systems, library management, medical management systems, and intelligent building automation systems to achieve integration with existing information resources and protect existing investments.
System Advantages
Compared with the traditional enterprise card based on Mifare 1 logical encryption card, Tongfang CPU card enterprise card has the following advantages:
1. Security access control system based on CPU card technology
The access control management system uses a CPU card security access control reader with state-owned independent intellectual property rights. The CPU card security access control reader has a built-in PSAM card slot and SAM module. It stores various application keys by issuing PSAM cards or using SAM authentication modules. Through internal/external authentication methods, the transaction cards and terminal devices are mutually authenticated to ensure the legitimacy of the transaction medium.
Adopting the security authentication of SAM and CPU card, a complete and strict key management system is established, which fully utilizes the security features of CPU card and completely solves the security loopholes of Mifare 1 logic encryption card, thus ensuring the security of the entire access control security system.
2. Key management and initialization are led by the user
In the information system with CPU card as the application carrier, key management is the basis for the safe operation of the whole system. The main task of the key management system is to generate, issue and update keys, which is directly related to the security of the whole system. Customers can generate and manage various application keys by themselves through the key management module of Tongfang CPU Card Enterprise Card, and complete the initialization of the card by themselves, which ensures that customers have the initiative of key management and card issuance.
3. The terminal device supports SAM card slot and authentication
The terminal devices in Tongfang CPU Card Enterprise Card can be divided into several categories: one is consumption, the second is recharge, and the third is identity authentication. The PSAM card embedded in the consumer terminal only deducts the key for money. The recharge terminal needs to go online to the hardware encryption machine to obtain the recharge key. The identity type can be made according to the actual situation. Identity PSAM cards can be issued. After placing this type of PSAM card in the access control card reader, the card content can be read correctly to ensure the high security of reading and writing CPU card information.
4. Strictly follow the transaction standards and specifications of CPU cards
Tongfang CPU Card Enterprise Card will adopt the financial CPU card transaction standard specification of the People's Bank of China, and authenticate with the financial encryption machine in the background during the financial transaction process of the CPU card. The key and algorithm for calculating the transaction authentication code will be stored in the financial encryption machine. When clearing and settling the end-of-day transaction flow, it is necessary to connect with the hardware encryption machine in real time to verify the TAC code of the transaction flow to ensure the accuracy and security of the transaction record.
5. Stability and scalability of software platform architecture
Tongfang CPU Card Enterprise Card System adopts J2EE to simplify the architecture of complex issues related to the development, deployment and management of enterprise solutions, and provides a middle-layer integrated framework with high availability, high reliability and scalability to meet application requirements.
The card system integrates the most popular three-tier architecture, dividing the entire business application into: presentation layer (UI), business logic layer (BLL), and data access layer (DAL). It is convenient for system expansion and distributed application. The platform is developed using JAVA language, adopts the framework structure of Struts + Spring + Hibernate, and the database uses Oracle 10g large database. It fully meets the stability and scalability construction needs of large and medium-sized enterprises with more than 10,000 employees.
Previous article:Application of Finger Vein Authentication Technology in Access Control System
Next article:Research and design of an electronic tag reading terminal
- Popular Resources
- Popular amplifiers
- Mir T527 series core board, high-performance vehicle video surveillance, departmental standard all-in-one solution
- Akamai Expands Control Over Media Platforms with New Video Workflow Capabilities
- Tsinghua Unigroup launches the world's first open architecture security chip E450R, which has obtained the National Security Level 2 Certification
- Pickering exhibits a variety of modular signal switches and simulation solutions at the Defense Electronics Show
- Parker Hannifin Launches Service Master COMPACT Measuring Device for Field Monitoring and Diagnostics
- Connection and distance: A new trend in security cameras - Wi-Fi HaLow brings longer transmission distance and lower power consumption
- Smartway made a strong appearance at the 2023 CPSE Expo with a number of blockbuster products
- Dual-wheel drive, Intellifusion launches 12TOPS edge vision SoC
- Toyota receives Japanese administrative guidance due to information leakage case involving 2.41 million pieces of user data
- Innolux's intelligent steer-by-wire solution makes cars smarter and safer
- 8051 MCU - Parity Check
- How to efficiently balance the sensitivity of tactile sensing interfaces
- What should I do if the servo motor shakes? What causes the servo motor to shake quickly?
- 【Brushless Motor】Analysis of three-phase BLDC motor and sharing of two popular development boards
- Midea Industrial Technology's subsidiaries Clou Electronics and Hekang New Energy jointly appeared at the Munich Battery Energy Storage Exhibition and Solar Energy Exhibition
- Guoxin Sichen | Application of ferroelectric memory PB85RS2MC in power battery management, with a capacity of 2M
- Analysis of common faults of frequency converter
- In a head-on competition with Qualcomm, what kind of cockpit products has Intel come up with?
- Dalian Rongke's all-vanadium liquid flow battery energy storage equipment industrialization project has entered the sprint stage before production
- Allegro MicroSystems Introduces Advanced Magnetic and Inductive Position Sensing Solutions at Electronica 2024
- Car key in the left hand, liveness detection radar in the right hand, UWB is imperative for cars!
- After a decade of rapid development, domestic CIS has entered the market
- Aegis Dagger Battery + Thor EM-i Super Hybrid, Geely New Energy has thrown out two "king bombs"
- A brief discussion on functional safety - fault, error, and failure
- In the smart car 2.0 cycle, these core industry chains are facing major opportunities!
- The United States and Japan are developing new batteries. CATL faces challenges? How should China's new energy battery industry respond?
- Murata launches high-precision 6-axis inertial sensor for automobiles
- Ford patents pre-charge alarm to help save costs and respond to emergencies
- New real-time microcontroller system from Texas Instruments enables smarter processing in automotive and industrial applications
- Xianyu low-cost wireless digital microphone disassembly (Jerry solution)
- [Perf-V Review] + Solidification of Hummingbird Soft Core
- Read the good book "Electronic Engineer Self-study Handbook" + my impression
- Three-port network
- RSL10 drives ink screen
- GoKit Case Study: Gizwits IoT Development Platform’s Pet House Transformed into an Air Quality Detector
- Embedded licensing: why not and why not?
- I found a 1963 "Electron Tube Handbook"
- How to extract the effective value of fundamental wave and each harmonic in MATLAB?
- Analysts predict Bluetooth location services will grow at a CAGR of 32% by 2025