Brief Analysis of Smart Card and COS Technology

<

An IC card, also called an integrated circuit card, is a special integrated circuit chip embedded in a plastic substrate and packaged into a card.

Depending on the type of embedded chip, IC cards can be divided into different types, including memory cards, logical encryption cards, smart cards, and so on. Different cards cost differently and their functions are different.

The memory card, the integrated circuit in the card is an electrically erasable programmable read only memory EEPROM, which has only data storage function and no data processing capability; the memory card itself does not provide hardware encryption function, and can only store data encrypted by the system. It is easy to be cracked.

The logic encryption card, the integrated circuit in the card includes an encryption logic circuit and an electrically erasable programmable read only memory EEPROM. The encryption logic circuit protects the security of the data in the card and the card to a certain extent, but only a low level of protection cannot prevent Malicious attack.

CPU card, only the IC card with a microprocessor is a smart card in the strict sense. The integrated circuit in the card includes a central processing unit CPU, an electrically erasable programmable read only memory EEPROM, a random access memory RAM, and a read only memory ROM of a COS (Chip Operating System). A smart card is equivalent to a microcomputer without a monitor and keyboard.

The most basic uses of smart cards can be summarized as: identity authentication, data carriers, payment tools. With the development of technology and the popularity of applications, the use of smart cards will be more extensive, such as embedded modules for some devices, and can be used as special modules for some occasions.

Smart cards are information security products, which are characterized by small size and portability; security is good, and stored information is difficult to read illegally. Relatively speaking, a floppy disk is also an information carrier. It is bulky and vulnerable in terms of portability. It is obviously different in terms of security. It is easy for others to read the information without even getting it. It is also possible to obtain information on the disk by means of hacking or the like through the network. The information stored in the smart card can only be read by the security control of the COS, and some information is not allowed to be read at any time.

The smart card is composed of two parts: hardware and software. The hardware part of the smart card is an integrated circuit. The external form of the integrated circuit is a chip. The internal components are integrated components of various functions, including CPU, RAM, EEPROM, ROM, etc., different. The chip has different hardware configurations and different functions. The software part of the smart card is COS. COS is the interactive interface between the user's application and the card. It is the master dispatcher of the hardware components in the card. It is the security guard of the card and is the basis for realizing all relevant international standards. COS usually has its own security system, and its security performance is usually an important technical indicator to measure COS.

The functions of COS include: transmission management, file management, security system, and command interpretation. This is an internal mechanism. In terms of external use, it is just a smart card with contacts.

The development of COS first solves the transmission management problem, that is, the I/O problem. The smart card passes the contact point (the contactless card exchanges data with the read/write device through the field, and the international standard is 14443) and the data exchanged by the read/write device. Is the realization of the international standard ISO7816-3.

Then there is file management, there is an access mechanism for all types of files to store user data, both efficient and secure. The COS security system is an important part of COS. It is based on the cryptographic algorithm. It controls the user's permissions through cryptographic algorithms and under what circumstances external operations are allowed on the smart card. Command interpretation is the implementation of commands and smart card-specific commands in industry specifications. A command is sometimes a combination of multiple functions. The command interpretation part must explain the command and control the implementation of various functions according to the permission.

The judgment of COS, on the one hand, is to see the realization of the function, whether it has implemented the prescribed instructions according to the standards or norms of the application industry, and whether there are hidden dangers in terms of functions. Another aspect is to look at security. Security is an important aspect of smart cards. If there are obvious security holes, COS fails. A good COS also has a higher operating efficiency.

Security is a key part of COS. COS creates a security system that transfers control of this system to customers in a secure manner without leaving any backdoors. Customers will use this security system to protect user data. Once the security control is handed over, the developers of COS are just like others, and there is no other way to operate the data on the smart card by legal authority. Then the difficulty of COS development is this security system that provides customers with access. If someone can find a breakthrough and gain unauthorized access to the data in the smart card, the COS fails.

The application of cryptography is an inevitable problem in the field of smart cards. The cryptographic algorithm is not all of information security, but it is definitely one of the important foundations of information security. Without a secure cryptographic algorithm, there will be no information security. The use of cryptography can protect the confidentiality, integrity, certifiability, and non-repudiation of data. The so-called password is an algorithm that uses a specific key to transform the user data called plaintext. The process of this transformation is called encryption. The encrypted data is unrecognizable, called ciphertext, only in legal cases. The ciphertext is reverse-transformed by a specified algorithm with a specific key to recover the plaintext. The process of the inverse transform is called decryption. In modern cryptography, the algorithm is public, and it is the key that needs to be kept secret.

Confidentiality means that information is stored and transmitted in a password, and unauthorized persons cannot understand anything. The legally authorized person must have the corresponding key, and the key can be obtained by the cryptographic operation.

Integrity means that the parts of the password information are interrelated and have non-tamperable features, which are achieved through protocols or verifications in the cryptographic application. If the password information is tampered with, the problem will be found in the process of decryption verification, and it is known that the ciphertext is already unreliable.

The certifiability means that after the information received by the user, the source of the information can be confirmed.

Page 1 of 2

Higher strength Mesh Tarps is one kind of Knitted polyethylene tarps, when produce these tarps all edges with PP rope in hem and four corners reinforced by plastic.It will be rustproof aluminum eyelet in 1m (1 yard or 3 feet) interval. Four corner reinforced by plastic triangle and each piece folded into a plastic bag with customer's label inserted. The PE industry mesh tarps usually used for construction Fence Screen,it is popular for construction fence screen, privacy fence screen, outdoor privacy screen, privacy fence screen. For each construction site, it can prevent tools from falling and protect workers'safety. Ideal choice of sunshade shed, amusement facility shade shed, greenhouse shade shed, cowshed and so on .

Mesh Tarps

Poly Mesh Tarp,Mesh Shade Tarps,Black Mesh Tarp,Heavy Duty Mesh Tarp

Shandong Lufan Technical Textiles Co.,LTD , https://www.lufantarps.com