The difference between ID card and IC card
The ID card is a THRC12/13 read-only contactless card. It is powered by a card reader and reads the unique card number stored in the chip EEPROM. The card number is written once before the card is sealed and cannot be changed after sealing the card. Passive contact free and is the two most prominent characteristics of the chip, the RF interface circuit is the key core technology, from the reader receives the RF energy, generating power and clock chip, and the phase shift keying and loading modulation technology to realize wireless communication card and card reading device between. Contactless ID card has many advantages, such as convenient operation, fast and reliable, and has been widely used.
(1) the main features of ID cards:
The carrier frequency is 125KHZ (THRC12) or 13.56MHZ (THRC13), and the modulation of the data transmitted to the reader by the card is the load amplitude modulation;
The data encoding in the card is BPSK phase shift keying with strong anti-interference ability;
The data transfer rate to the card reader is 3.9kbps (THRC12) or 6.62kbps (THRC13);
Data storage using EEPROM, data storage for more than 10 years, data storage capacity of 64, including manufacturers, distributors and user code;
The card number can not be changed before it is written into the card. It definitely ensures the uniqueness and security of the card number;
In addition to the standard card shape, the THRC13 chip can also be packaged into chips and other shapes according to the application requirements.
(two) the working principle of ID card:
The system is composed of a card, a reader and a background controller. The working process is as follows:
The card reader transmits the carrier signal through the antenna;
The card into the card reader to read the work area, the resonant circuit is composed of inductance and capacitance in the card receiving card reader transmitted carrier signal, RF interface module card chip which signals generate power supply voltage, the reset signal and the system clock, the chip "activation";
The chip read control module modulates the data in the memory by phase modulation coding, then modulates it on the carrier, and sends it back to the reader through the card antenna;
The card reader demodulates, decodes and sends the received card back signal to the background computer. The background computer makes corresponding treatment and control for different applications according to the legality of the card number.
(three) the type of ID card:
ID thick card: thickness 1.8mm, standard card size, is the most economical radio frequency IC card, with ID number, with a portable hole, screen printing LOGO text information;
Standard thin card: 0.8mm thickness, the size of the standard card, can offset printing, screen printing, print photos;
Non standard thin card: 1.05mm thickness, the size of the standard card can offset printing, screen printing, print photos;
(four) application scope of ID card:
Compared with contact IC card, contactless ID card without plug card, to avoid the fault caused by bad mechanical contact, which has the advantages of convenient operation, fast and reliable, long life and other advantages, especially suitable for high traffic situations. Typical application: canteen field of RFID system, patrol system, attendance system, access control system, business card system etc..
The non-contact ID card can be applied to the identification and control of THRC12/13 addressing, such as security, access control, attendance, etc., but also can be extended to the exhibition, parks, hotels, restaurants and other public places of the tickets, discount cards etc.. As well as the production process, postal parcels, aviation, rail transport, product packaging, transportation and other departments of logistics, electronic labels, security signs, one-time tickets and many other fields. Although it is only a read-only card, but the use of background computer control management, even involving fees management problems can also be applied in a certain range, such as canteen, dining, charging management. According to specific application, the cardholder's personal data into computer, database and configuration software, through the use of the card reader will read the card sent to a computer, called out from the cardholder database of personal information, and then operate according to the specific application, so the application scope is very broad.
What is the difference between ID card and IC card?
First, IC card and ID card definition
The full name of the IC card IC card (Integrated Circuit Card), also known as smart card (Smart Card). Read and write, the capacity is large, the encryption function, data record and reliable, more convenient to use, such as smart card system, consumption system, mainly PHILIPS series Mifare card.
ID card full name identification card (Identification Card), is a can not write the induction card, including fixed numbers, mainly in Taiwan SYRIS EM format, the United States HID, TI, MOTOROLA and other ID cards
Two, why IC cards do initialization (ie encryption) work, and ID card does not use
1. IC card is in use, you must first through the IC card read-write device with unique bidirectional key authentication, to carry out related work, so that the whole system has high security. So, it must initialize the factory on the IC card (i.e. encryption), the purpose is the key card system IC card produced in the factory after unhackable, to ensure the safe payment mechanism card system.
2. IC card initialization encryption, to users, customers through the IC card issuing system, the private key of each user card to generate its own system. This ensures that the other users in the system of issuing card users can use the system to ensure the specificity of the system, so as to ensure the safe use of the system mechanism.
3.ID card and magnetic card, only use the card number, card number only, in addition to outside, without any security function, the "card" is open, exposed. So ID card is the "magnetic induction", it simply does not need or do not need initialization problem.
4. why isn't the initialization process done by the user?:
1) if the user cannot initialize, preventing users from insider cheating. Because users in the use of smart card system, if employees use social bought card random initialization can be issued to residents to use the household card, or even to random card consumption, which will not only cause serious consequences of cheating also, safety card system will lead to serious vulnerabilities use mechanism.
2) in addition, if the user buy inferior factory card, initialize itself, and can not use on the system, will make the system performance is bad or paralyzed, this will cause the accident responsibility is unclear
3) initialization process in the implementation of the manufacturers, mainly is the basic need of IC card security key authentication mechanism, and IC card system integrators norm. As the city public transportation IC card, these cards to the public transport system, each card key to encrypt the factory control.
4) if the user lacks professional management and in case of losing the key card used to initialize the authorization, the user and the manufacturer will not be able to use the card. Therefore, the initialization work is done by the manufacturer, and then there is security
Three, the comparison of IC card system and ID card system
IC card security than ID card.ID card card number without any permissions to read, easy to imitate the.IC card data read and write the corresponding password authentication is required, even in different region of each card password protection, full protection of data security, IC card data read and write data password password can be set to different hierarchical management provides a good way to ensure the security of the system.
ID cannot write data to the recording content (number) only by a write once chip manufacturing plant, the developers can only read the card to use, not for new numbers management system according to the actual needs of the system.
The IC card can not only read a large amount of data by authorized users, but also by authorized users to write large amounts of data (such as card number, user permissions, user information, etc.), IC card records can be repeatedly erased.
3. storage capacity:
ID cards only record card numbers, while IC cards (such as Philips Mifare1 cards) can record about 1000 characters
4. offline and networked operation:
Due to the absence of content in the ID card, the permissions of the card holder and the operation of the system function depend entirely on the support of the computer network platform database
The IC card itself has recorded a large number of user related content (card number, user information, authority, balance and other large consumer information), can run from the computer platform, realize the network operation mode and offline automatic conversion, to achieve the use of a wide range, less wiring requirements.
5. card extended application:
ID card because there is no record, no partition, can only rely on the software to deal with the network information system, which greatly increased reliance on the network; if the ID card system is completed, the user wants to increase functionality, requires additional wiring, which not only increases the difficulty of construction, but also increase the unnecessary investment therefore, make use of ID card system, it is difficult for system expansion, it is difficult to achieve a real card.
The IC card storage area itself is divided into 16 partitions, each partition has a different password, with multiple independent sub-systems management functions, such as the first district to achieve access control, to achieve second partition third partition consumption, realize the staff attendance and so on. The purpose of the full realization of the card, and can be completely modular design, even if the user to increase the function also, no wiring, simply increase the hardware and software modules, after the IC card system easy to upgrade at any time, to achieve a smooth upgrade, reduce duplication of investment.
For example: a district has set up a ID card system, but because of the ID card system of the above shortcomings, the system can not be put into daily use, so the system can only be completely void, and then change to IC card system
6. maintenance and operation of intelligent system:
For example: computer users released a new ID card, ID card system must through the network, using artificial way to all ID number one download to the ID card controller, or ID card is invalid and cannot be used as a card; if you want to change the user permissions required in each ID card input authority ID card controller.
For example: often the new ID card to the system is put into use, each new card or modify the permissions of a card, the card must be available on all the controller to enter the card number, which increases the workload