RF IC card POS machine software design

1 Introduction

The RF IC card is a non-contact IC card that successfully combines RFID technology and IC card technology to solve the problem of passive (no power in the IC card) and contactless. At the surface of the device, the card reader can complete the reading and writing operation of the card data, and the radio frequency IC card is a breakthrough in the field of electronic devices.

China began to establish the "Golden Card Project" in 1993, and the RF IC card technology has been rapidly developed and applied. In 2004, the public security department began to use the radio frequency IC card to renew the second-generation resident ID card. By May 2008, the country had issued 775 million documents. Construction business IC cards have been widely used in urban public transportation, municipal public utilities, digital communities, as well as gas, water, heating, road and bridge tolls, parking lot management, park attractions, etc., including Shanghai, Guangzhou, Hangzhou, Dalian and other 20 cities. Achieve multi-domain applications. The application of the “Traffic Card” IC card in Beijing began in 2000, and as of May 2008, it has issued 20.5 million cards. Guangzhou issued 8.5 million “Yangchengtong”. The financial industry and global bank card organizations have joined forces to implement bank IC cards, which are moving to EMV. The People's Bank of China took the lead in further improving China's financial IC card standards and actively explored bank IC cards to achieve small payments.

Therefore, the POS machine used as the electronic trading system of the radio frequency IC card has also been rapidly developed, but the software standards used by the IC card manufacturers are not uniform. How to provide the common functions and standard interfaces under the premise of the unified hardware standards of the POS machine RF card POS machine software system, so that POS products are universal and user-friendly, is one of the problems we have to solve. At the same time, with the decrease of the price of CPU radio frequency IC card, the high security CPU radio frequency IC card will be widely promoted, and gradually replace the logical encryption radio frequency IC card, how to realize the smooth transition of the logic encryption radio frequency IC card system to the CPU card system, It is a technically urgent problem. Based on this, we put forward some technical solutions for the upgrade design of RF IC card POS machine software.

2 RF IC card POS machine software design

2. 1 RF IC card POS machine software design

2. 1. 1 POS machine data storage information

(1) POS parameters: POS terminal number, MAC number, software version number, salesperson number.

(2) Trading flow information table: physical card number, card account number, transaction serial number, pre-transaction amount, transaction amount, post-transaction amount, transaction date, card transaction serial number.

(3) Account black and white name table: The status of the card account indicates that the loss report card is used to report the loss report, and the report of the lost card is released.

(4) Set the card balance limit

Set the maximum balance of the personal account, set a single transaction, daily transaction limit fee, thereby maximally protecting the interests of the card account holder, and as a blockage of the system abnormal transaction loopholes, such as the unpredictable abnormalities caused by machine tools, cards, communications, etc. Accounting problems. The POS machine verifies the card balance and the daily transaction limit.

2. 1. 2 Information Security Management

(1) POS machine key management: To ensure the legitimate use of the POS machine, the POS machine can only be used if the key of the system user is used. Otherwise, the system refuses to receive all services of the POS machine. To this end, the POS machine needs a dedicated SAM card encryption chip to achieve encrypted information without the chip, preventing comparative statistical analysis before and after data encryption.

(2) The legality of POS machine transaction flow preservation, transmission and reception. In the transaction flow saved in the POS machine, it is necessary to ensure that the transaction flow is credible and cannot be forged. The POS machine performs MAC verification on the transaction pipeline to ensure that the stored transaction pipeline data is normally generated by the POS machine.

2. 1. 3 Data Communication Management

(1) Upload the data collected by the POS machine to the computer, and do the corresponding processing for duplicate and timeout unacknowledged messages to prevent loss and retransmission of the transaction flow.

1POS machine sets the transaction serial number

In order to record the order of electronic transaction records, in addition to the POS machine to increase the clock record transaction time, the card transaction serial number should be designed in the card, and the POS machine design records the card serial number of the transaction to accurately reflect the card transaction sequence. At the same time, the flow sequence of all transactions is recorded in each POS machine.

2POS machine transaction upload record

The transaction records stored in the POS machine are stored in a queue format to ensure that the records are uploaded in the order of transactions, and the POS machine has the function of viewing the number of untransported electronic transaction records and not uploading the amount. There are online logs and recent transaction flow information on the system transaction monitoring computer to accurately determine the data recovery.

(2) The communication interface uses 8583 messages, and the communication uses connection-oriented TCP/IP protocol and uses CRC check data.

(3) The communication test of the physical communication line simulates the physical communication transmission status of the POS machine, which is convenient for maintenance and repair.

2. 1. 4 Classification management of message information

POS machine messages can be divided into transaction flow, account black and white list, software version update, key update, simulation test, etc., and perform different interaction processing for different message categories. For example, the online download function of the POS machine software, the download of the message category through the software, combined with the security management authority of the POS machine, can realize the online upgrade service of the software.

2. 2 RF IC card system accounting management design

There is a set of accounting problems on the card system and system. There will inevitably be two sets of accounting inconsistencies. The design is based on the balance of the system account. The balance on the card is only used to prevent the overdraft of the system account balance. The card balance is less than or equal to the system account. For the balance, the following techniques are required to ensure that the system is fair and reasonable.

2. 2. 1 Business transactions use the first write card and then write POS machine

When conducting an electronic transaction, first write the card data, then write the POS machine data. Due to the difference in write time, the card data may have been written, the POS data is not written, but the card has been removed from the card sensing area. The system design always performs the card writing operation according to the decrease of the card balance, and the consumer transaction is unsuccessful and no transaction settlement is performed. The POS machine transaction was not successful, and the system did not process the transaction, that is, the merchant did not receive the transaction payment. In this case, the card balance would be less than the system personal account balance. At the same time, for the unsuccessful write card, there is an unsuccessful identification on the POS machine.

(1) Account recharge is to write the card after writing the database first. When adding funds to the account, write the database first, the database operation is successful, then write the POS machine, and finally write the card. Even if the card is not successful, a unilateral account can be passed. If the business is completed, it will not cause the card balance to be greater than the system account balance.

(2) Set the transaction flow recovery cycle

The purpose of setting up the transaction flow recycling cycle is to ensure that all POS machine transaction data is uploaded to the electronic trading system in a timely manner. During the recycling cycle, the merchant must ensure that the POS communicates with the database online and that all transactions are completed after the POS has been submitted. If the cardholder's card is lost, it should be reported in time. When the application is reported to be lost, the cardholder will bear the consumption. The cardholder will bear the consumption. After the collection cycle, the merchant will not upload the transaction flow in time, and the loss will be borne by the merchant.

(3) Guarantee the timely upload of business data of merchants

The system must have the POS machine not upload business data check function. If the POS data has not been uploaded, the merchant should contact the maintenance personnel of the card system, check the communication line, ensure the communication is smooth, and ensure that the blacklist is downloaded to the POS machine in time to avoid causing losses to itself.

(4) The card replacement operation needs to be applied, and the card can be repaired and replaced after the data recovery period is over.

Due to the loss of the card or the bad card writing, the card account balance in the system needs to be transferred to the new card or the card balance is repaired. It is necessary to wait until the data is uploaded in the recycling cycle before performing the card repair and card replacement operations. Otherwise, the electronic transaction flow generated by the cardholder before changing the card or repairing the card cannot be recorded, causing losses to the merchant. To this end, an emergency card can be issued to the card repairer or card changer. The emergency card is not registered, no loss is reported, no card is repaired, and no refund is made.

2. 3 CPU card PO S machine and logic encryption RF card PO S machine compatible technology

2. 3. 1 File structure of the PSAM card in the CPU card POS machine

The file structure of the PSAM card in the CPU card POS is in compliance.

Under the premise of building industry integrated circuit (IC) card product testing industry standards, these files can be compatible with the current key structure of the universal card system, using the key card download, the business number (SAM card number) originally stored in the SAM card. The maximum number of blacklists and blacklists is stored in EF16 (0016) (terminal information file). The PSAM card file structure of the transaction terminal is shown in Figure 1.

2. 3. 2 POS machine automatically recognizes the logical encryption card and CPU card function In order to be compatible with the CPU card and the Mifare1 card, the code for the operation of the CPU card must be added, and when the card enters the card sensing area of ​​the POS machine, it can be automatically recognized. The CPU card is also a Mifare1 card. For different cards, call different programs for compatibility purposes.

File structure of CPU radio card PO S machine PSAM card

3 Conclusion

Based on the above design ideas, the logic encryption RF IC card (MIFARE ONE IC S50) POS machine and electronic trading system have been used in hundreds of units nationwide and are in good condition. The design also applies to the M IFARE ONE IC S70 RF card and its compatible card electronic trading system. The biggest advantage of the RF IC logic encryption IC card electronic transaction system compared with the read-only ID card electronic transaction system is that the POS machine can work offline, the card will not be overdrawn, and the application is wide. However, in the deposit, account subsidy, card loss reporting function, it is not as convenient as the RF ID card electronic trading system. The application of the RF CPU IC card POS machine introduced above will complete the smooth upgrade transition of the existing RF logic encryption IC card system.

(Text / College of Information Science and Engineering, Lanzhou University, Guo Mingchao, Rao Zengren)

Cooler Box

Cooler Box,Insulation Ice Cream Box,Portable Ice Cream Box,Insulation Cold Storage Box

Changzhou Jisi Cold Chain Technology Com,Ltd , https://www.cooler-boxs.com

Posted on