Smart card application system based on Bluetooth technology

Because smart cards have a good human-machine interface, powerful read and write capabilities, adequate security technology, large-capacity storage capacity and convenient portability, smart cards have been used in the financial and non-financial fields (medical, transportation, security, etc.). Data carriers, transaction media and security tools have been widely used [1]. The application field of smart cards is expanding. Some high-capacity, high data transmission rates, embedded power and interface, embedded biometric sensors, real-time, application-downloadable smart cards have become the focus of research and attention [2~4] . However, the smart card resources are limited, the original intention of the design is as a passive authentication device, the data can only be one-way flow, and the two-way payment cannot be realized in small consumption. The smart card can only be used in the occasion of having special reading and writing devices. The application and development of smart cards.

The American company's reader-integrated and card-integrated Ikey, Moncard system for payment between cards [5], integrates the readers into the card, but they cannot be separated from computers and special devices. In the literature [6], the existing smart card application system is studied, and a new type of smart card system is preliminarily given, but the problem of equipment accessing the network is not considered. In [7], a new card-centric smart card prototype is researched and presented. The smart card is in control position, the transaction is initiated by the card, and the terminal responds. However, both parties to the transaction are still in an unequal position and fail to achieve a two-way free flow of data.

1 Analysis of existing smart card application systems

The existing smart card application system [1, 6] is a distributed computer system, which consists of smart cards and terminals (such as PINpads, PC card readers, reader IFDs, electronic POS machines EPOS, point-of-sale terminals EFT-POS, ATM). (etc.), network and host system components, usually divided into the following three layers:

(1) Management: It usually consists of a host system consisting of a server and a PC. Under the control of the background management system, it is responsible for monitoring, control and system maintenance (such as card issuance, identity authentication, recharge, data processing and loss/discontinuation login) for the entire system;

(2) Interface layer: consists of reading and writing devices (interface devices, application devices) and communication networks, responsible for information transmission between the smart card and the host system, including card reading and writing, power supply and communication with the host system, which is a smart card. An interface that interacts with the host system.

(3) Application layer: It is composed of smart cards and is convenient for users to use. In this application architecture, the smart card communicates with the host system through the interface layer. The trust relationship between entities [8] is established through the following ways:

(1) The manufacturing publisher is trustworthy, the reading and writing device trust card manufacturing publisher, the reading and writing device is credible to the card and card manufacturing publisher, therefore, the smart card trusts the owner of the reading and writing device through The external authentication of the reading and writing device is realized, and the trust of the card manufacturing publisher to the card data is realized by trusting the reading and writing device, and the trust of the data owner of the card to the card manufacturing publisher is realized by trusting the reading and writing device. of.

(2) The communication process is safe. Communication involving card and read-write devices, communication between the read-write device and the host system (card manufacturer), and card-writing operations of the read-write device authorized by the card manufacturer or merchant are safe. The card data owner trusts that the data read and written by the device is correct, and the data in the card is confidential to non-participants.

(3) The card is unchanged throughout the transaction. In particular, after the card reading operation of the reading and writing device, the result returned by the card is trusted. This trust is established on the external authentication of the card by the reading and writing device. Due to the presence of read and write devices in the interface layer, the relationship between the functional elements of the smart card application system becomes more complicated, and the security of the smart card system cannot be effectively guaranteed. In particular, the cardholder can only verify the correctness of the data in the card by reading and writing the device provided by the owner of the device. In the payment service, the funds can only flow out from the card, which brings security risks and inconveniences in the transaction. . The main reason is that the absolute separation of the reading and writing device and the card, the data of the card can only flow to the reading and writing device, and the data of the reading and writing device generally cannot flow to the card.

2 Bluetooth-based smart card application system

The smart card application system based on Bluetooth technology [9, 10] consists of a Bluetooth Smart Card (BSC), a Bluetooth Wireless Access Point (BLAP), a network, and a host system. Its composition is shown in Figure 1.

Bluetooth card-based smart card system structure BSC can communicate with each other for offline transactions
Figure 1 Bluetooth card-based smart card system structure BSC can communicate with each other for offline transactions

The BSC can also directly access the network for online transaction processing; it can also perform online transaction processing through the BLAP access network. Among them, the Bluetooth wireless access point is a Bluetooth-based LAN access protocol, which is a transaction access device for centralized and large-scale transaction occasions, which is used to connect the BSC and the public network. The BSC connects to the host system through BLAP to complete centralized and online transactions. The BLAP end is connected to the public network through the network port (RJ45), and the other end is connected to the BSC through Bluetooth to realize information circulation and sharing between the two.

Page 1 Page 2 Page 3

Frying Basket Strainer

Frying Basket Strainer,Deep Fryer Strainer Basket,Fryer Mesh Basket,Stainless Steel Fry Basket

HOMEARTS INDUSTRIAL CO.,LTD , http://www.homeartschina.com