中文English
芯片查询网站icichaiyang 2024-05-07 22:51 19
You can't. The information in the IC card cannot be copied after encryption, the password check is wrong, the card itself has a self-destruct function, so the data in the IC card i...

Can IC cards be copied?

You can't. The information in the IC card cannot be copied after encryption, the password check is wrong, the card itself has a self-destruct function, so the data in the IC card is safe and reliable; Network requirements are not high, the safety and reliability of IC card makes it in the application of computer network real-time, sensitivity requirements are low, can be used in the network quality is not high in the environment or in the case of offline application; IC card reading and writing mechanism than magnetic card reading and writing mechanism is simple, reliable, cheap, easy to promote, simple maintenance. If the user's IC card is accidentally lost or stolen, the user can report the loss and replace the card at the card storage point; The validity period of the IC card printed on the back of the card shall prevail. The expired IC card shall be extended or replaced. According to the embedded chip type, IC cards can be divided into three categories:

1, memory card: the integrated circuit in the card is the programmable read-only memory EEPROM that can be electrically erased, which only has the data storage function, no data processing capability; The memory card itself has no hardware encryption function, only encryption on the file, which is easy to crack.

2, logic encryption card: the integrated circuit in the card includes encryption logic circuit and programmable read-only memory EEPROM, encryption logic circuit can protect the security of the card and the data in the card to a certain extent, but only low-level protection, can not prevent malicious attacks.

3, smart card (CPU card) : the integrated circuit in the card includes the central processor CPU, programmable read-only memory EEPROM, random access memory RAM and solidified in the ROM card Operating System COS(Chip Operating System). The data in the card is divided into external reading and internal processing parts to ensure the safety and reliability of the data in the card.


If there is an ic card key or authorization, it is possible to copy the ic card content. Otherwise, it is necessary to use abnormal means to copy, under the current security technology, this kind of copy has certain difficulties, and some types of cards have not yet found a way to copy

< br \/ >

IC Card (Integrated Circuit Card, integrated circuit card), also known as Smart card (Smart card), Intelligent card (Intelligent card), Microcircuit card (Microcircuit card) or microchip card. It is a microelectronic chip embedded in the ISO 7816-compliant card base, in the form of a card. The communication mode between the IC card and the reader can be contact or non-contact. According to the communication interface, the IC card is divided into contact IC card, contactless IC and dual interface card (with both contact and contactless communication interface).


If there is an ic card key or authorization, it is possible to copy the ic card content. Otherwise, it is necessary to use abnormal means to copy, in the current security technology, this copy has certain difficulties, some types of cards have not yet found the method of copying IC Card (Integrated Circuit Card, integrated circuit card), Also known as Smart card (Smart card), Intelligent card (Intelligent card), Microcircuit card (Microcircuit card) or microchip card. It is a microelectronic chip embedded in the ISO 7816-compliant card base, in the form of a card. The communication mode between the IC card and the reader can be contact or non-contact. According to the communication interface, the IC card is divided into contact IC card, contactless IC and dual interface card (with both contact and contactless communication interface).