ID card and IC card concept and difference analysis

What is the IC card? What is the ID card? Difference between IC card and ID card <br> <br> Currently, induction IC / ID card technology matures and production costs fall, it has been used in many management systems, With more and more applications, its superiority has become more and more acceptable to the society. Many companies, companies, smart communities, or building developers have to go for a one-card project. However, for IC cards, they still use ID cards as a card issue. There are still great doubts and misunderstandings. Here to talk about the two major differences between the two cards to help everyone out of the errors.

First, the IC card and ID card define the IC card integrated circuit card (IntegratedCircuitCard), also known as smart card (SmartCard). Can read and write, large capacity, encryption, data records and reliable, more convenient to use, such as card systems, consumer systems, time and attendance systems, etc. Currently, there are mainly PHILIPS Mifare series cards. ID card full name identification card (IdentificationCard), is a non-writable proximity card, with a fixed number, mainly Taiwan SYRIS's EM format, the United States HID, TI, MOTOROLA and other types of ID cards.

Second, why IC card to do initialization (ie, encryption) work, and ID card do not use?

1. When the IC card is used, it must first pass through the unique two-way key authentication between the IC card and the read-write device before it can perform the relevant work, so that the entire system has a very high security guarantee. Therefore, the factory IC card must be initialized (ie, encrypted) in order to generate a non-decryptable one-card system key in the post-shipping IC card, so as to ensure the secure distribution mechanism of the card system.

2. After the IC card is initialized and encrypted, it is passed to the user, and the customer uses the IC card issuing system to generate a private key for each user card. In this way, it is ensured that user cards issued in other user systems cannot be used in the system, ensuring the specificity of the system, thereby ensuring the safe use mechanism of the system.

3, ID cards and magnetic cards, just use the "card number" only, in addition to the card card number, no security features, its "card number" is open and exposed. Therefore, the ID card is an "inductive magnetic card," which means that there is no need for initialization or initialization.

4. Why does the initialization process not be done by the user himself? This is because: If A is initialized by the user himself, he cannot guard against cheating inside the user. Because when the user uses the card system, if an employee uses the socially purchased card to initialize it at will, he can freely issue a household card that can be used by the household and can even freely recharge the card. This will not only result in serious cheating consequences, but also This will lead to serious flaws in the use mechanism of the security of the card system. B. In addition, if the user purchases a defective factory card and initializes it, and it cannot be used on the system, the system performance will be poor or flawed. This will result in unclear liability for the accident. The initialization process of C is performed at the manufacturer, which is mainly the basic requirement of the IC card security key authentication mechanism, and is also the profile of the IC card system integrator. Just like the urban public transportation IC cards, before the cards are handed over to the public transport system, the key of each card must be controlled by factory encryption. D. If the key card for initializing the authorization is lost due to lack of professional management by the user, the user and the manufacturer cannot use the card. Therefore, the initialization work is done by the manufacturer only to have security protection, of course, can also be handled according to the actual situation of the user.

Third, the comparison of IC card system and ID card system 1. Security: The security of IC card is much larger than ID card. The card number in the ID card is read without any authority and is easy to copy.

The reading and writing of the data recorded in the IC card requires corresponding password authentication, and even each zone in the card has a different password protection to fully protect the data security. The password for the IC card writing data and the password for reading out the data can be Different settings provide a good level of management to ensure system security.

2. Recordability: The ID card cannot write data. Its record content (card number) can only be written by the chip manufacturer once. The developer can only read the card number and use it. It is impossible to formulate new number management according to the actual needs of the system. system.

The IC card can not only read a large amount of data by an authorized user, but also can authorize the user to write a large amount of data (such as a new card number, user's authority, user information, etc.), and the content recorded by the IC card can be erased repeatedly.

3, storage capacity: ID card only records the card number; and IC card (such as Philipsmifare1 card) can record about 1000 characters of content.

4. Offline and Networking Operation: Since there is no content in the ID card, the card holder's authority and system function operation are completely dependent on the support of the computer network platform database. The IC card itself has recorded a large amount of user-related content (card numbers, user data, permissions, consumption balance, and other large amounts of information), and it can completely run off the computer platform, and realize the operation mode of automatic conversion between networking and offline, and can achieve large-scale use. Less wiring requirements.

5. One-card extension application: Because ID card has no record and no partition, it can only rely on network software to process the information of each subsystem, which greatly increases the dependence on the network; if the ID card system is completed, the user wants to increase the function point. It requires additional cabling, which not only increases the difficulty of construction, but also increases unnecessary investment. Therefore, using an ID card as a system makes it difficult to expand the system and it is difficult to realize a true card. The IC card storage area itself is divided into 16 partitions, each partition has a different password, with multiple subsystems independent management functions, such as the first partition to achieve access control, the second partition to achieve consumption, the third partition to achieve employee attendance and so on. Fully implement the purpose of one card, and can achieve complete modular design. Even if users need to increase the function points, they do not need to re-wiring. They only need to add hardware and software modules, which facilitates the upgrade and expansion of the IC card system at any time and achieve a smooth upgrade. Reduce duplicate investment.

6, intelligent system maintenance and operation: For example: the computer issued a new user ID card, you must pass the ID card system network, manually download all ID card numbers to each ID card reader controller In the middle, otherwise the ID card can not be used as an invalid card; if you want to change the user rights, you need to enter the authorized ID card number on each ID card controller. For another example, after the system is put into use, it is often necessary to add an ID card. In order to add a card or modify the permission of a certain card, it is necessary to input the card number on all the controllers available for the card. This greatly increases the workload and time for manual operation and maintenance. In addition, if more than a few card subsystems, or subsystems are slightly larger, the complexity of system maintenance management will be a geometric increase, will directly lead to the system can not run properly. With the IC card's one-card system, after the IC card is issued, the card itself is a data information carrier. Even if the communication network is disconnected, the read-write controller performs offline card reading and writing as usual. If you change the user rights, you can directly write the user's rights in the IC card. The newly added user can change the rights simply by modifying the card. There is no need to modify the controllers at all. From the technical mechanism, the manager is prevented from changing the controller everywhere. The issue of card use rights has achieved the goal of improving management efficiency and achieving intelligent management.

7, cost-effective: Although the ID card and ID card reader is cheaper than IC card cards and card readers, but from the point of view of the entire card system (wiring cost, structure composition), the price of the two systems is comparable, and only the IC Card system operation can be stable and reliable, so the cost-effectiveness of IC card system is much higher than ID card system.

In addition, considering that the current hardware environment of various implementing units is not very mature, and system maintenance personnel are not familiar with computer knowledge, it is impossible to establish or maintain a complete network system to support the 24-hour continuous network of ID card system. Operation. Therefore, the smart IC card one-card system that satisfies the need for networking and offline operation is the only choice for today's users.

8. The card industry has two conclusions: ID card cannot be made into a card (as mentioned above), ID card cannot be consumed unless it can accept its deficiency (as described below):

The biggest reason why ID cards cannot be used for consumption is the "credit" problem. Because the ID card has no key security authentication mechanism and cannot write cards, the consumption data and amount can only be stored in the database of the computer. The computer is managed by the property management personnel. There is a complete cheating space in terms of reason and mechanism. In addition, catastrophic consequences will occur if consumer data crashes due to computer problems.

Therefore, it is impossible for consumers to agree that the authoritativeness (ie, credit) of the ID card in the management. Too many money disputes can only make the ID card consumption system unusable, especially in public systems, such as the community management system. The IC card consumption system, because of its high reliability, can not be cracked in line with the ISO9001 international safety certification mechanism, but mainly because the "electronic wallet" that is, the IC card in the hands of the user, the amount of each consumption by the user "master" In the hands, so that the IC card consumption system is a very "credit" consumer system. Of course, in the networked state, the computer still has the same data as the user's IC card. For the system, this is also a dual-security data backup.

IV. Conclusion The IC card can integrate complex key authentication and identity authentication logic and will replace the previous magnetic card and ID card (ie, inductive “magnetic card”).

Due to the inherent keyless authentication, readable and non-writable ID card system, and the need to completely rely on network operation defects, it has been dissatisfied with the ever-increasing demand for smart cards of today's implementing agencies, and will inevitably only serve as a transitional product. The well-known magnetic cards are being phased out. The process of continuous elimination of ID cards is accompanied by the vigorous development of smart IC cards! Currently, IC cards are in the mainstream, and ID cards should only be used in some specific management systems.

Zinc alloy lock, is the appearance of a simple, beautiful, light locks for bags, luggage, low price, exquisite appearance, occupied the padlock of a country. Home travel, essential supplies in the world more widely.US293US244US503US505US063US253


Our service

QC process. We apply 100% inspection to ensure that every lock customer gets would function well.

We are licensed distributer of TSA locks.


We accept big orders, but small orders are welcome as well. With daily production


capacity of 30K-40K pcs,we can ensure the on-time delivery for the customized orders.


Besides, we regularly keep 5K-10K stock for almost all designs, so there will be no problem


if you want to order in small quantity. We accept OEM orders with MOQ of 1K sets. Honor:


Zinc Alloy Luggage Combination padlock

Zinc Padlock,Zinc Alloy Padlock,Zinc Luggage Padlock,Zinc Combination Padlock

Shengping Safety Protection Locks Manufacturer , https://www.chinajiuzhou.com