introduction
The original intention of the essay is to promote the IC card technology in the construction field, but ignores the application purpose of "IC" and has the suspicion of selling products. The author believes that the IC card technology is now outdated and puts forward the idea that "IC" has no card. I am looking forward to correcting.
First, the definition
The IC card (Integrated Circuit Card) is another new type of information tool that emerged after the magnetic card. In some countries and regions, IC cards are also called smart cards, smart cards, microcircuit cards or microchip cards. It is a card form in which a microelectronic chip is embedded in a card base conforming to the ISO 7816 standard. The above definitions only reflect the physical medium used, from a purely technical point of view, and are currently commonly accepted in the field of IC card production.
This paper expands the concept and definition of "IC" from the perspective of application purposes, and proposes similar definitions such as identity certificate, inspection certificate, or identity check. It is "IC". Its material form is not limited to the form of the surface of the "card" or the integrated circuit (IC), which is the technology used to record information or encryption, but is open-minded, focusing on inclusiveness and more important. The thing is - look to the future.
Second, information security - the core and weakness of the IC card
In a highly information-based modern society, information security issues are receiving increasing attention. Traditional password authentication methods such as passwords and smart cards do not meet the needs of modern society because of their shortcomings such as easy forgetting or easy to fake. According to relevant data, the annual losses due to the loss of documents or passwords are enormous. For example, in the United States, hundreds of millions of dollars of welfare funds are fraudulently incurred each year due to the loss of documents or management errors; the world-renowned credit card giant MasterCard estimates that there are about $450 million in credit card fraud each year. Because passwords are cracked, mobile communications lose at least $1 billion a year. ATMs, which are ATMs alone, lose more than $300 million a year in related fraud.
This is because encryption and decryption are always a contradiction. As long as it can be encrypted by mathematics, there must be a method of decryption (at least there is an exhaustive method) in the mathematical theory of decryption, that is, there is no unbreakable encryption. The so-called "split by the son of the spear" is the truth. Due to the speed of computer operation and the development of Moore's Law, even in the current high-digit encryption, decryption will be completed at a very low cost after a short period of time. The fact is that the probability that various encryption technologies will be cracked will be more The higher it is.
At present, the core factor affecting the positioning of various IC card markets and distinguishing their prices lies in the encryption technology and encryption bits used and supported by them, and information security is precisely its weakness. Since some key technologies of IC cards, such as high-end chips, core modules, financial POS machines, and production equipment, are mastered by foreign companies, the information security of IC cards may endanger China's financial order and even national security.
Therefore, the author's claim that IC card heat should be properly cooled, especially to avoid blindly adopting foreign technology and equipment. For IC card applications, it is also best to limit to low-value or even anonymous IC stored value cards, in the construction field, such as public telephones, bus rides, plumbing charges, as some non-critical areas of administration (such as Construction market, qualification certification, etc. can only be used as an auxiliary measure.
Third, the concept, advantages and development of biometrics
The biometric technology that has emerged in recent years has good reliability. Humans have gone through three stages of development in the pursuit of documents, the effectiveness and convenience of transactions and the security of goods. The first stage, the initial method, is to use a variety of mechanical keys that are already familiar to everyone. The second stage is the development of mechanical keys to digital keys such as passwords or barcodes, which are currently used in different degrees in technologies such as IC cards. The third stage is to use the biological characteristics inherent in the human body to identify and verify identity. Biometrics is a high-level security key system in today's digital life.
Biometric technology is a solution that relies on the physical characteristics of the human body for authentication. The biological characteristics of the human body include fingerprints, sounds, faces, retinas, palm prints, skeletons, and the like. The core of so-called biometric identification is how to acquire these biometrics, convert them into digital information, store them in a computer, and use a reliable matching algorithm to complete the process of verifying and identifying personal identity. Anti-counterfeiting technology that uses human biological characteristics to identify individuals and prove identity has been applied to public security, security, customs, finance and other fields. Since the human body features the inherent non-reproducibility of the human body, this biometric key cannot be copied, stolen or forgotten. Common passwords, IC cards, stripe codes, magnetic cards or keys have many disadvantages such as loss, forgetting, copying and theft. Smart cards that contain cardholder biometrics are more convincing than traditional PIN codes and passwords when verifying a person's identity, especially when using biometric data to compare them within the card.
In recent years, in some industrially developed countries, the use of biological anti-counterfeiting technology, the method of identifying individuals based on biometric characteristics of human beings has been applied in some customs, safe passages and financial departments, thus preventing theft of genuine cards, passports, Keys and passwords are engaged in illegal and criminal activities such as customs clearance, withdrawal, opening, unlocking, driving and starting. In China, there have been such technologies in recent years, providing a powerful forensic tool for exposing and preventing card fraud. For example, the anti-counterfeiting technology for identity verification of color photo fingerprint cards introduced by Peking University Founder Fingerprint Electronics Co., Ltd. Bill Gates has made the assertion that biometrics, that is, the use of human physiological characteristics, such as fingerprints, irises, etc., to identify an individual's identity will become an important innovation in the IT industry in the next few years. The backing of Gates’s remarks is that more and more individuals, consumers, companies and even government agencies admit that existing smart card, identity and password-based identification systems are not enough, biometrics. Technology will play an important role in providing solutions in the future.
As an emerging identity authentication technology, biometric identification has its irreplaceable superiority. From the current situation, especially after "9-11", it will be one of the top ten most promising high-tech in the new century in the world; for domestic, biometric-based identification will also be the national key encouragement. And one of the key technologies for development.
IV. Overview and implementation of iris recognition technology
The iris of the human eye is located behind the cornea. Before the lens, the iris is disc-shaped through the cornea. There is a hole in the center, which is called the pupil. The pupil can be automatically reduced or enlarged according to the brightness of the environment. The disc-shaped iris is centered on the central pupil, with a radial texture and a small concave around it, like a skirt fold. When the pupil is shrunk, the texture becomes straight, and when the pupil is enlarged, the texture is wavy (see Figure 1). The iris of the eye is composed of quite complicated fibrous tissue. The detailed structure is determined by random combination before birth, and it does not change after 1 year and a half. The disadvantage is that if the iris has lesions or damage, it will affect the recognition. . Iris recognition technology converts the iris's visual features into a 512-byte Iris Code, which is stored for later identification, 512 bytes, which is a very compact biometric template. The template, but it is huge for the amount of information obtained from the iris. From the 11mm diameter iris, Dr.Daugman's algorithm uses 3.4 bytes of data to represent the iris information per square millimeter, so that an iris has about 266 quantized feature points, while the general biometric technology only has 13 60 feature points, which in biometrics, the number of feature points obtained is quite large. Iris recognition is one of the most accurate and accurate recognition technologies available today. This technology uses a camera to take pictures of the human iris without the need for a laser or physical contact (similar to a non-contact IC card). As an important identification feature, the iris has the advantages of uniqueness, stability, collectability and non-invasiveness. The iris has higher accuracy than the identification methods such as face and sound. According to statistics, the error rate of iris recognition is the lowest among various biometrics.
Figure 1: Iris under the microscope
The first iris image reader was introduced in 1976 and must be close to the instrument for inspection. In 1992, the automatic cash dispenser with iris recognition developed by Sensak Company of the United States was able to identify within a few feet. It has been reported that in 1993, the Iriscan company developed a device that can check the iris of the human eye, the iris automatic identification device, which has been patented. This is a system that captures a video image of the iris a few feet away. The iris image can be taken from a comfortable distance using only ordinary video optics. At the time of identification, the subject approaches the optical device and looks at the camera lens, so that the system obtains the iris code. A computer digitizes the image, analyzes the characteristics of the iris, and generates a 256-byte iris code that is stored in the database.
V. Analysis of the economics and safety of biometric ICs
1. Economic type:
According to China and the International Patent Protection Convention, the patent protection period is about 20 years. If it is a 1993 patent, it will automatically expire after 2003. China is a manufacturing country in the world, and the hardware facilities used for biometric identification. For example, the production of ordinary video optical devices such as CCD cameras has already formed a scale. At present, the iris recognition camera has entered the home, so the biometric automatic identification device including the iris can achieve localization and low cost in a short time. .
In addition to the identification device, no other physical medium (such as a card) is needed. The human body itself is a unique entity that is almost perfectly encrypted, storing a huge amount of encrypted information, especially if several biometric devices are used in combination. From the common sense, it is almost impossible to judge that a person is completely imitated.
2. Security:
Since the biometric characteristics of the human body as the identification carrier only store the ID identification and encrypted information, all other information (such as name, qualification, account amount, etc.) is stored in the database, and more importantly, in any identification (including the database) In the process of generating), the absolute digital isolation and data transmission of the identified unit and the database are guaranteed to be absolutely unidirectional, and therefore, the database cannot be accessed through an external channel. There is also no exchange of electronic data between the identification system and the biometrics that are linked between the database and the biometrics, that is, the recognition system is unlikely to change the biometrics, and the biometrics may not affect the identification system. The artificial manufacture (or change) of the human body's own biological characteristics still has insurmountable obstacles in the current level of human science and technology development.
It can be seen that when applying the biometric-based "IC" recognition system, any general-purpose, conventional, transparent technology can be adopted without worrying about information security from the outside, only from the organization (not technically). Strengthen the security management inside the system. At the same time, a combination of multiple biometric "IC" identification technologies can still be applied in the internal security management of the system.
Sixth, application case
Firstly, the feasibility, convenience and scalability of biometrics-based "IC" technology are illustrated by taking public transportation as an example. It has been reported that metros in large cities such as Washington, DC, and the United States are expected to use such iris recognition systems to store images of passengers' irises at the time of card purchase. When riding, the passengers only look at the camera, the computer checks the account and the image of the inventory, and eliminates the amount of the deduction from the prepaid ticket. At the same time, the system can also be combined with the “eyes†project of urban public safety to prevent and combat terrorist activities and criminal crimes.
According to British media reports, in a dining hall in a middle school in the UK, IC cards have been replaced by a more advanced electronic trading method, and the medium used in this transaction is the iris in our eyes! Using iris ID technology in the canteen, you can secretly “pick out†students who have difficulty getting home, have to accept free lunches, and those who eat normally. In this way, you can avoid many embarrassing situations of poor students, and can promote equality between students. According to the school's plan, more than 900 students will be asked to stare at a special camera for a few seconds, and the camera will deposit the iris scan results into the school's student archive. In the future, students can not only use iris technology in the cafeteria, but also use it to borrow books in the library.
Conclusion, current solutions and outlook
Various bank cards (now mostly magnetic cards, have begun to transfer to IC cards), water and electricity fee payment cards, gas fee cards, cable TV payment cards, dining cards, medical cards, phone cards and other stored value cards, and various IC card ID card, student ID card, entrance card, time card, medical card, accommodation card, etc., in the construction field, there are so-called "city cards" that combine some functions, etc., and the various cards have been brought to people. It's not just convenience, it's more troublesome. What's more troublesome is that after a few years, the cards that are being used now can be easily decrypted and produced by ordinary people. If you want to continue using the IC card, you must Upgrade again, so eliminated, upgraded, eliminated, upgraded, and never ending in the scope of Moore's Law.
Therefore, from the perspective of convenience and information security, the application of IC cards should be appropriately slowed down. In the field of construction, if it is practical, convenient and safe, it can be considered that under the supervision of the People’s Bank, the competent administrative and information industry authorities will jointly formulate nationally unified standards and produce some low-valued values ​​with anti-counterfeiting labels. Registered IC stored value cards, for example, can be divided into 50 yuan and 100 yuan face value, issued by the People's Bank of China, equivalent to RMB but limited in circulation in the market, can be used for consumption on IC card equipment, automatically after the balance is used up Invalidation, if the cost of the card cannot be controlled below 1% of the recharge amount, it can be recharged at the bank or the designated bank of the People's Bank of China. For ID cards applied to the construction market and qualification management, it is now completely replaceable with a mature biometric-based "IC" technology.
With the continuous development of information technology and related industries, the "IC" recognition system based on biometrics will gradually replace the various IC cards currently used. It is believed that the era of cardless era is not far away.
Modeling Clay,Parachute Toy,Parachute Game,Hand Puppet
NINGBO MACEY EDUCATION PRODUCT CO.,LTD , https://www.maceycreative.com