Font Size: a A A

Refueling Ic Card System-based Security Technology Research,

Posted on:2010-05-12Degree:MasterType:Thesis
Country:ChinaCandidate:L LiuFull Text:PDF
GTID:2208360278978005Subject:Precision instruments and machinery
Abstract/Summary:PDF Full Text Request
With the development of science and technology, information automated management of the industry is imperative. It is imperative to take an automated management in all kinds of industries. As a vital method of electronic commerce, IC card has been applied in many fields. At the same time,with the rapid development of the automotive industry,the management of fuel, gas industry will be gradually transformed into IC card charging systems from original payment. Based on this background, the IC card system will become a new direction of development of the energy industry.Usually , the IC card has preserved massive important information. Therefore, the data secrecy and security appears especially importance for the IC card. From the perspective of engineering, IC card system includes not only the data exchanges between IC card and card-reader, but also other segments, such as the network transmission, the background of the host system, and so on. Although much attention has been taken into the physical security, logical security and transaction security in the design of IC card system, with the popularity of the application of IC cards, electronic, information and security technologies, the existence of security-risk has become more apparent. How to keep IC card system financial data security safe is becoming an important issue.Based on this background, the design did a safety analysis and research for IC card fuel system in aspects of practical and theoretical. At present ,management-center and data-center are the center of operating, management and data in IC card system. Through the special line, the date center is connected with pre-level systems, which is connected with gas stations, fuel cards network and POS ,including Each node of the LAN design. The LAN network designs of the physicalnodes are the same as eachother.With a large number of physicalnodes , the entire system is an immense and complicated project. Therefore, there are lots of holes in the network, which become a certain threats to the security of the entire IC card fuel system, including the border security of IC card system, remote access security, virus security, security of LAN network and data link security. For above problems, a plan has been put forword:(1) installing the hardware firewall and seting up intranet .extranet and DMZ regions by security classification to keep the border safe.(2) taking the remote access mode of USBKEY and VPN ,ensure the workers inside to access safely,and the visit -process can be monitored effectly by the Radius server.(3) to realize the security control to the virus which is controled by the network communication, installing antivirus software in the LAN network.(4)through the dividing of VLAN ,realizing the security isolation among the logical subnets of LAN network,aoid the unauthorized users and facilities to visit the sensitive data, improving the visit security of the system. Furthermore,a reseach of security mechanism and encryption algorithm of IC card fuel system has been done in this article. According to the characteristic of high-risk, this article argued the unstable factors of the traditional data encryption algorithm,and took a new encryption algorithm project .and evaluate it ,set up the IC card data transaction procedure which based on the AES algorithm, ensure the securtiy of the data transmission.Through the IC card system for refueling a comprehensive understanding , designing of a practical information-based network security solutions and card transaction data algorithm, the design fully meets the needs of system security and can be extended for other systems.
Keywords/Search Tags:IC card, Network system, Security, Encryption
PDF Full Text Request
Related items