difference
1, security: IC access control use IC card, ID access control use ID card, IC card security is much greater than ID card. The card number in the ID card can be read without any permission and is easy to copy. The reading and writing of the data recorded in the IC card need the corresponding password authentication, and even each area of the card has different password protection, which fully protects the data security, the password of the IC card to write data and the password of the read data can be set to be different, providing a good hierarchical management method to ensure system security.
2, recordability: the ID card can not write data, its record content (card number) can only be written by the chip manufacturer at one time, the developer can only read the card number for use, can not formulate a new number management system according to the actual needs of the system. IC card can not only be read by the authorized user a large amount of data, but also by the authorized user to write a large amount of data (such as new card number, user rights, user information, etc.), IC card recorded content can be repeatedly erased.
3, storage capacity: ID card only record card number; IC cards, such as the Philips mifare1 card, can record about 1000 characters.
4, offline and networking operation: Because there is no content in the ID card, the card holder's permissions, system functions and operations are completely dependent on the support of the computer network platform database. The IC card itself has recorded a large number of user-related content (card number, user information, authority, consumption balance and a lot of information), can be completely separated from the computer platform to run, to achieve networking and offline automatic conversion mode of operation, to achieve a wide range of use, less wiring needs.
5, card extension application: ID card because there is no record, no partition, can only rely on network software to process the information of each subsystem, which greatly increases the dependence on the network; If the user wants to increase the function points after the ID card system is completed, it needs additional wiring, which not only increases the difficulty of engineering construction, but also increases unnecessary investment. Therefore, the use of ID card to do the system, it is difficult to expand the system, it is difficult to achieve a real card. The IC card storage area itself is divided into 16 partitions, each partition has a different password, with multiple subsystem independent management functions, such as the first partition to achieve access control, the second partition to achieve consumption, the third partition to achieve employee attendance and so on. Fully realize the purpose of the card, and can be fully modular design, even if the user wants to increase the function point, there is no need to cabling, just increase the hardware and software modules, which facilitates the IC card system to upgrade and expand at any time in the future, to achieve smooth upgrades, reduce repeated investment.
6, the maintenance and operation of the intelligent system: for example: the computer issued a new user ID card, it must be through the ID card system network, manually download all ID card numbers to each ID card reading controller, otherwise the ID card is used as an invalid card and cannot be used; To change user permissions, enter the authorized ID card number on each ID card controller. In addition, if there are more than one card subsystem, or the subsystem is slightly larger, the complexity of system maintenance and management will be increased geometrically, which will directly lead to the normal operation of the system. And the use of IC card system, IC card issued, the card itself is a data information carrier, even if the communication network is blocked, read and write controller as usual to achieve offline read and write card operation. If you change the user's rights, the user's rights can be written directly in the IC card, new users change the rights only need to modify the card, no need to modify each controller, from the technical mechanism to avoid the manager everywhere to change the controller card use rights, to improve management efficiency, to achieve the goal of intelligent management.
7, cost performance: although ID card and ID card reader is cheaper than IC card and card reader, but from the composition of the entire card system (wiring cost, structural composition), the price of the two systems is comparable, and only the IC card system can run stable and reliable, so the IC card system cost performance is much higher than the ID card system. In addition, considering that the hardware environment of today's community is not very mature, and the system maintenance personnel are not very familiar with the reality of computer knowledge, it is impossible to establish or maintain a complete network system to support the 24-hour continuous network operation of the ID card system. Therefore, the intelligent IC card system that meets the mutual adaptation of networking and offline operation is the only choice for today's users.
8, the card industry has two conclusions: ID card can not be made into a card (as mentioned above), ID card can not do consumption: the biggest reason why ID card can not do consumption is the \"credit\" problem. Because the ID card has no key security authentication mechanism, and can not write the card, so the consumption data and the amount can only all exist in the computer database, and the computer is managed by the property management personnel, from the principle and mechanism there is completely * space, in addition, if the consumption data crashes due to computer problems, there will be disastrous consequences. Therefore, it is impossible to make consumers agree with the authority (that is, credit) of the ID card managed by the community, and too many money disputes can only make the ID card consumption system unusable. The IC card consumption system, because of its high reliability, can not be cracked in line with the ISO9001 international security certification mechanism, mainly because the \"electronic wallet\" that is, the IC card is in the hands of the user, each consumption amount is \"mastered\" by the user himself in the hand, so the IC card consumption system is a very \"credit\" consumption system. Of course, in the networking state, there is also data consistent with the user IC card in the computer, for the system, this is also to achieve double security data allocation.
9. The \"strange\" phenomenon of IC card as ID card: Some ID card equipment, system manufacturers, forced by the powerful advantages of IC cards, also claimed that its system can use IC cards, but in fact, like the use of ID cards, only use the card number in the public area of the IC card, and do not change the system structure of its ID card, and do not have the key authentication, read and write security mechanism of the IC card. Therefore, it is inferred from the essence that it is still an ID card system, compared with the traditional ID card system, it is only more wasteful of resources and more cheating, and it cannot have the advantages of IC card system
ic card full name integrated circuit card (integrated circuit card), also known as smart card (smart card). Read and write, large capacity, encryption function, reliable data record, more convenient to use, such as card system, consumption system, etc., the main philips mifare series cards.
id card full name identification card (identification card), is a non-writable induction card, including a fixed number, mainly Taiwan syris em format, the United States hid, ti, motorola and other id cards.
There are the following differences:
1. Different references
< br >
1, IC card: smart card, is a microelectronic chip embedded in the ISO7816 standard card base, made into a card form.
< br >
2, ID card: identification card, is a non-writable induction card, including a fixed number.
< br >
Second, different characteristics
< br >
1, IC card: due to its inherent information security, easy to carry, relatively perfect standardization and other advantages, in the identity authentication, banking, telecommunications, public transportation, parking management and other fields are getting more and more applications, such as second-generation ID card, bank electronic wallet, telecom mobile phone SIM card, public transportation bus card, subway card.
< br >
2, ID card: only the \"card number\" is used, in addition to the card number, there is no security function in the card, its \"card number\" is open and naked. So the ID card is an \"inductive magnetic card\".