The use of IC stored value card in the application system of chain stores
With the development of society, business competition has become increasingly fierce. In order to cope with market competition, operators have adopted a variety of commercial means or measures such as VIP cards and consumption points. However, how to attract and retain customers and strengthen the management and control of each branch has become a concern for every operator. Tsinghua Universitys IC membership card management system for chain stores provides operators with advanced and reliable management tools.
II. Design Objective
Using IC in the help of safe and effective data, the powerful function of card as a carrier of safe and effective data POS machine constitutes a simple, convenient and easy-to-use chain store management system. Main design objectives.
Safe and convenient IC stored value card sales management, to ensure the security of IC card information.
Achieve flexible sales model to maximize the different needs of customers and improve the competitiveness of enterprises.
Support multiple communication methods to realize data transmission and exchange, realize statistical analysis, query, printing and other functions
Improve work efficiency and management level, eliminate duplicate work and save operation cost.
III. Program Composition
According to the analysis of business process of chain stores, the system mainly includes card issuance management, daily business processing and data transmission. IC card as electronic money of stored value, all operations are completed independently by the terminal, completely eliminating the dependence of the terminal on the network, with low requirements for network, low requirements for network timeliness and sensitivity. The structure flow is as follows.
IV. Realization of functions
POS Introduction: As an embedded product, with the growing popularity of various network-based applications, simple operation, practical functions, the use of security POS products are widely available in large numbers, according to the use of roughly divided into two types of handheld POS, POS terminals. They all provide users with a common application development platform. Through the preparation of different applications, easy and flexible program download and data transmission. There are various ways to connect to the network. Users can easily, conveniently, safely and efficiently build applications for various structures of IC cards.
1.Issuing and managing cards
Card issuance and management is completed at the chain headquarters. First is the pre-processing of cards: all cards are written into the enterprise control key in advance, and a unified key management is adopted to prevent illegal access and duplication of cards. At the same time, generate administrator cards, terminal operator cards and other operating authority cards for all levels of operating managers. Prevent illegal personnel from accessing the system and operating terminals. Ensure the safe operation of the system.
When issuing user cards (membership cards), the system first verifies the operators authority. After passing, the system generates an access key based on the control key and writes the predetermined amount and other information to the card. The system automatically records card issuance records and operation records.
Finish setting up various functions for POS. Writing applications and loading algorithms.
2. Daily business processing
Complete IC sales of stored value cards.
Whether door-to-door sales or other sales methods, the business process is roughly the same. First is the verification function:Start, the terminal first verify the legitimacy of the operator. When the customer presents the membership card for consumption, the terminal will verify the membership card. The verification process is: the terminal reads the user or operator ID access key in the card is generated by a specific algorithm pre-installed in the terminal and compares it with the card key read. The same verification passes.
After normal business processing is completed, the transaction stream is automatically written to the POS as well as to the users membership card. to transfer and query data.
3. Data transmission
According to the different situations of the chain stores, regularly or irregularly select different network methods of data transmission to achieve electronic exchange of various information with the chain stores.
The system provides a variety of connection methods, such as local area networks, public telephone information networks, data collection cards (terminals and when used alone) for data exchange. For example, transaction flow, family information, etc.
Through the management software, it is convenient to summarize and analyze the information and manage the incoming, outgoing, distribution and inventory of distribution centers and chain stores. Effective use of resources. Provide basis for leadership decision. Scientific analysis of consumer demand.
4. Expandable functions
According to the actual needs of users, the basic functions of the above system can be easily extended system functions, very convenient and simple. For example: with the help of IC to realize the electronic management of chain distribution; to realize the function of point of consumption. Only need to modify the POS internal application.
V. Security analysis
The system uses a unified key management to achieve secure management of keys. The key management system uses specific encryption algorithms for encryption to achieve the security of card information. The terminal adopts operation authority management to fully ensure that the terminal is not illegally accessed.
Mutual authentication between the card and the terminal device is direct, without intermediate links. Without dynamic link library authentication of the terminal device, mutual authentication is performed in the form of cipher text within the terminal, and the information is not exposed to ensure the safe operation of the system.
The reading of information in the card requires key verification, and each card has a specific encryption algorithm for reading and writing keys to ensure that the information in the card is not illegally read, and all operations are performed under the control key of the enterprise.