Many news reports access control cards are easy to copy. In fact, this is true. Both access control system providers and properties that use access control systems want to know what kind of access cards wont be copied. Our answer is - CPU cards!
Which card is the most secure, the CPU card!
CPU cards have three types of memory in the card: ROM, RAM and EEPROM. ROM is solidified with the program memory of the card operating system (COS), which is accessed by COS and securely controls the data stored on the card. RAM is equivalent to the card memory used by the CPU for temporary storage of program variables. eEPROM is mainly used to store some application data.
CPU card has good anti-copy, anti-counterfeit, anti-tampering security, respectively from: transmission password, hierarchical key, read-write separation control, mutual authentication, ensure the use, automatic encryption of information, detailed description as follows.
①Transmission password: CPU the card has a transmission password specifically for transportation, which is jointly determined by the issuing organization and the manufacturer. When the card is stolen in the middle of the card, without the transmission password is not possible for the CPU to establish any data and applications on the card, to ensure the security of the transmission of
② Grading key: There should be a key for reading and writing information in the card. The issuer uses the master key to generate a different special key for each card to facilitate the preservation of the key. The key of one card is deciphered or leaked, which neither affects other cards nor the security of the master control key of the issuing institution.
③ Read-write separate control: The information read-write in the CPU card is controlled in different ways, which facilitates the issuance and use of large social security card facilities and actually promotes the play of business enterprise cards.
④ Mutual authentication to ensure use: Confirmation of the cardholders effective identity is achieved through the card password (PIN), external authentication of the card to the facility, and internal authentication of the card through the facility.
⑤ Automatic encryption of information: The residence and the transmission of read-write information within the card are formed by encryption algorithms and cannot be forged or tampered with.
The above proves that the CPU card is equivalent to a microcomputer, while the CPU card has a computing function, so it can perform more complex encryption/decryption operations, COS security technology is also included, which is why the CPU the card provides double security. CPU cards are very difficult to forge and are currently a very secure type of card, the storage capacity can be small or large, and you can choose to support single application according to your needs CPU card or multi-application CPU card as needed. These performance CPU card become one of the important development direction of IC card at present.