Main station|Member Center|Save the desktop|Mobile browsing
Ordinary Member

Shenzhen Huahai Smart Card Co., Ltd.

Various PVC cards, IC cards, ID cards, SIM cards, M1 cards/S50 cards, magneti...

sell
  • There is no classification
contact
  • Contact:黄志强
  • Phone:0755-27767766-8002
  • Email:huahai18@huahai.com
  • fax:0755-27767866-8010
search
 
link
  • There is no link yet
home > sell > SLE5528 card supply SLE5528 contact IC card chip
SLE5528 card supply SLE5528 contact IC card chip
products: Views:5SLE5528 card supply SLE5528 contact IC card chip 
brand: 华海智能卡
型号: IC卡
规格: 85.5*54*0.84
材料: PVC、ABS、PET、PETG
price: 1.30元/张
MOQ: 1000 张
Total supply: 100000000 张
Delivery date: Shipped within 3 days from the date of payment by the buyer
Valid until: Long-term validity
Last updated: 2016-11-23 17:49
 
Details
Mobile phone
Contact person: Huang Zhiqiang
Enterprise
Switchboard: - Extension:
Enterprise mail[r]
Factory name: Shenzhen Huahai Smart Card Co., Ltd., Guangdong Province
Factory address: Building B, Qiaotong Yuanling Industrial Park, Yuanling Avenue, Shiyan Town, Baoan District, Shenzhen City, Guangdong Province

The chip is a contact card chip with write protection and logic encryption. Function, currently this type of card is mainly suitable for telecommunications cards, cards, smart cards, integrated circuit cards, membership cards, electronic tickets, VIP cards, medical care, insurance, transportation, schools, etc.
1. Main indicators
Byte
Byte write protection zone (solidified data)
Byte password, error count
Temperature range: ℃ ~ +℃
At least 10,000 times of erasing and writing
At least one year data retention period
Working voltage:
2. Functional description
The capacity is b, and the address space is ~3.
All data, except the password, can be read out under any circumstances. The password can be read out after it is verified to be correct.
All data including the password itself can be written or changed after checking the correct password.
. All data can be write-protected by byte. After write-protection, the data is solidified and cannot be changed under any circumstances.
, there is a password error counter. address is. The initial value is, if there is an error in password verification, it will be reduced. If the counter value is , the entire card data is locked and can only be read, cannot be written or changed, and the password cannot be verified. If not, then only one verification is correct, and the counter will be restored to the initial value.
, the password length is b, and the address is, 3. There are several combinations. Before the password is verified correctly, the result of reading these two addresses is that it cannot be written or changed. After the password is verified correctly, the password can be read out or the password can be changed. The password will remain valid until the card is powered off.
, unique code. The address ~ is the user code of the card. This code is the only user code in the world to ensure the interests of the user. This code cannot be changed after it is solidified and written.
, address~,~ has been solidified by the manufacturer before leaving the factory and cannot be changed.
3. Precautions
There are three security mechanisms: user password, unique code, and solid writing. If the password is not verified correctly, data cannot be written. Once the written data is write-protected (hardened), it cannot be changed. Using a unique code as the identification of the card used in the system can prevent counterfeit cards of the same model from breaking into the system.
The card can read the entire card data without a password. Therefore, when designing, pay attention to content encryption to prevent vandals from identifying the data format.
The entire card is not partitioned. Once the password is correct, data can be written or modified to any address. Therefore, when designing, attention should be paid to properly solidifying the data and encrypting the data content to prevent unintentional damage to the data or illegal changes. data.
After the password is verified to be correct, it can be read out. Therefore, the program must be designed to prevent saboteurs from illegally interrupting the program and directly reading the password to steal the password.
Request for quotation
A total of0articles  Related Comments: