- 型号:
- IC卡
- 尺寸:
- 85.5*54*0.84(可定制)
- 材料:
- PVC,PET,PETG等
How does the chip (card) ensure security
Series of chips The (card) chip provides three ways to access the user storage area: standard, password, authentication and encryption. There are no restrictions on read and write access to the user storage area in the standard access mode. Read and write access to the user storage area in the password access mode requires Password verification: In authentication mode, users must be authenticated and must pass the password verification set in different user areas in order to correctly access the user data area. When accessing users in encryption verification mode, users must first be authenticated and then use the configuration area specific register after successful authentication. The updated data is used as a key for authentication again, and finally the user area can be accessed only after passing the password verification set in different user areas. In this way, the data transmitted under the bus is encrypted ciphertext.
The card has a built-in encryption algorithm. Both its authentication and encryption modes use this algorithm. In authentication and encryption modes, the security performance of card access is greatly enhanced and side-channel attacks are effectively restrained. In these two modes, the information that the host interacts with the card or chip (card) is different every time, so it is difficult for a third party to obtain valid data from the interactive information.
, The authentication and encryption process of the chip (card) chip
The host first reads out the chip (card) chip and calculates it according to the customized function () algorithm. The fixed parameters are known to the user while using the chip (card) chip. ) The algorithm inside the chip calculates and sends the initialization authentication parameters and the random number given by the party to the chip (card) chip. The chip (card) uses its own logic to calculate += and = at the same time. After receiving the verification authentication command, the chip (card) chip determines whether it is +=. If so, there is += (+) and uses + to update the authentication in the chip (card) chip. At the same time, it updates the same group of () inside the chip (card) chip. value. After receiving the updated information in the chip (card), the party determines whether it is equal to or not. If it passes, the authentication is all passed. to the serial interface.
, Common logical encryption memory cards:, , ,
These types of cards are encryption cards that use low-power technology and have security such as transmission code, production code, password, error counter, and fuse protection. Protective function. The storage space is divided into two major functional areas: setting area and application area. The application area can be divided into different partitions. Each area has its own independent security function. From the model point of view, the last digit of the serial number is the number of application partitions, and the middle digits of the partitions are, and the bit capacity is, respectively. Different application partitions have different partition passwords. It can be divided into two types: equal partition cards and unequal partition cards (their zones and fuse addresses are different. The second, third, and fourth application areas of the unequal partition card have no zone password error count, while the equal partition card has unequal partition cards. The performance is obviously more focused on the first area)