Font Size: a A A

Securitv Function Design And Implementation In Intelligent Card System Based On CPU Card

Posted on:2015-04-16Degree:MasterType:Thesis
Country:ChinaCandidate:H Z WangFull Text:PDF
GTID:2298330467957536Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the technological progress and social development, various cards play the key roles in the people’s daily activities. However, absence of card management will lead the application troubles. To avoid this problem, Intelligent Card solution is necessary for the further card development, and Non-contact CPU card, with its high safety security, will definitely have the significant influence in this application field.SMSIntelligent Card product established an application system for managing the cards to resolve previous systems uncompatibility problems due to the mismatch of used technologies and models. The systems used the present study includes door-entry, attendance records, restaurants, consumption, and Patrol records. The system security was also mainly stressed. The SMSIntelligent Card product has the following characteristics including different access keys in each card and each sector of the cards, and combination of several cards into one cards for the convenience of management.The present study focused on the design of Intelligent Card system security, description of the CPU key management system, discuss of the security management of CPU Intelligent Card system. The security management of Intelligent Card system including the consumption system was exampled to describe how to realize the management target, and explain how to use the uniform rights management module to integrate the subsystems in the same framework. The detailed descriptions were as follows, safety security of subsystem procedure; safety security of rights partition, network transmission encryption system; System hardware protection. In ensuring database security, the control authority and processes, and provide security for the transmission subsystem protection, and finally the installation of the hardware dog, thus ensuring every aspect of running the system has certain safety measures. Among them, the network transmission encryption system and the division of authority for the article focuses on security, and in the fourth chapter gives specific ideas design.The following works had been finished including (1)design of system software security; (2)design and partial realization of network transmission encryption system;(3)ealization of consumption system;(4)design and realization of database security. The study had the advantages of efficient system security, separation of system with the bottom hardware equipments with the drive layer, and design of the expansion functions of subsystem models which guaranteed the stable operations once one of the subsystems was out of work.
Keywords/Search Tags:CPU card, key management system, DES encryption, Softdog, Database security
PDF Full Text Request
Related items