1 Situation and purpose
The purpose of this smart card application is to provide the ability to pay a small amount to a video game console. Smart cards will replace coins commonly used in such machines to reduce operating costs.
There are two types of terminals here. The loading terminal has a coin detector for the coin input slot and can carry electronic "cash" into the smart card. The debit terminal, whose operation is basically automatic, can debit the cash from the smart card.
2 demand
The entire system should be anonymous, but all payment flows should still be monitored. If there is doubt about fraud, you should be able to identify individual cards and selectively block them.
Since this is a payment system application, and considering that all settings are fully automated and do not require people to manage operations, the design should achieve a moderate level of security.
3 Suggested solutions
The program is based on a simple closed wallet system, which is designed to be specifically designed for this purpose. Of course, with minor modifications to the file and processing, it is easy to use for similar applications. We avoid rabbits using the e-wallet system that complies with the CEN EN 1546 standard. Such a solution is more expensive for the application provider than the proposed solution. In addition, our goal is to demonstrate the principles of a simple closed wallet system.
At the center is an automaton that accepts coins and banknotes and loads the equivalent of electronic cash into a smart card. Neither PIN nor any other user input is required because the e-wallet is anonymous. The only saved record is the individual card number executed and the amount loaded into the card (the card number is unique in the system).
A PC monitors the management of all data and payment flows. There is also a database in the PC that holds information about all issued cards. Balanced daily or weekly settlements can be used to check for cash flows that remain closed in the system.
The loaded currency unit is debited from the smart card's electronic wallet at a payment (debit) terminal. The display on the terminal indicates to the user the amount of the debit. In order to make the cost of the terminal as cheap as possible, secure communication is used to protect data transmission instead of using a gate. Each terminal has a security module to store the secret key and keep a record of the payment amount by card number. The data thus acquired is transmitted to the managed PC via a wire or a special transmission card at regular intervals, and is responsible for processing the data. The file tree of the proposed solution is shown in Table 1. Depending on the smart card operating system used, it takes about 100 bytes in the EEPROM.
Regular exchange of data between the debited terminal and the management computer can be used to maintain a blacklist of blocked cards in the terminal. If the terminal concludes that an inserted card is on the blacklist, it blocks the electronic money contained in the EF2 file. After that, the card can no longer be used for payment. The user must unlock the card at the management terminal, and at the same time, a check can be made to find out why the card is blacklisted.
The keys required for this application are listed in Table 2. In this simple system that is noticeable, all of the export key and card private key are not used. Table 3 is the access conditions for the application.
Table 2 Keys required for the "game machine" application example
The proposed solution is very suitable for paying for services that are accepted from the automatic setting, and human intervention is unnecessary. However, using a special machine to automatically load "money" into the card is not the only solution. The card can also be manually loaded at the service desk to exchange the equivalent amount of cash in cash. The system listed here can also be used in a launderette or canteen as long as minor modifications are made.
Table 3 Access Conditions for the "Video Game" Application
Figure 1 illustrates the basic process of loading electronic money into an electronic wallet, while Figure 2 similarly illustrates the process of making a payment.
Figure 1 Command sequence for loading electronic cash into a wallet in an "electronic game console" application
Figure 2 Command sequence for a payment from the wallet in the "Video Game" application
General turnstile gates are common equipment suitable for pedestrians. When pedestrians carry large suitcases, push strollers or wheelchairs, conventional turnstile gates cannot meet this type of traffic demand and must be equipped with wide lane barrier gate, wide channel Turnstile Gate or wide access turnstile gate to manage.
Wide Lane Barrier Gate,Wide Channel Turnstile Gate,Wide Access Turnstile Gate,Wide Lane Turnstile Gate
Guangdong Zecheng Intelligent Technology Co., Ltd , https://www.szzcsecurity.com