M1 card is our common access control ic card, m1 card was copied after the exposure of the incident, many owners of access control system security there is a huge skeptical attitude, so M1 card cracked after the maintenance of access control system security specific program is very necessary, CPU card instead of m1 card is also imperative, the following we look at.
In the entire access control management system, access control IC card is the core of the foundation of security management. The M1 card was cracked, it is the most core security control of the access control system to break, making it possible to copy the access card forgery. To solve the security problems of the access control system, the M1 card needs to be replaced with a CPU card.
In the entire system of access control and the card has a direct interaction with only two places: the background system in the card issuing subsystem and the most front-end identification system, that is, access control reading head. For the vast majority of access control systems, access control reading head just read out the card number through the controller to the background system, the system through the card number and background authorization to control the situation. So that when we upgrade the system, we only need to modify the access control reading head and card issuing subsystem, so that it can identify read and write CPU cards, and CPU cards to complete the authentication, other systems and software do not need to change, you can quickly complete the migration from M1 card to CPU card.
Specific programs to maintain the security of the access control system.
1, replace the access control reader, use the access control reader that supports the CPU card. As the communication interface between the access control reader and the controller has a unified specification, this replacement transformation is easy to achieve.
2, the original system to issue the card subsystem for transformation, replace the card reader, so that it can issue CPU cards. As the software platform of each access control manufacturers are different, so this transformation requires the original access control system manufacturers to cooperate to complete.
3, if the direct transformation of the card issuing system software has difficulties, you can develop a new CPU card issuing subsystem, and the original system backstage database docking
Talk about the specific program to maintain the security of the access control system after the M1 card crack
To achieve the CPU card issuing card. This approach is relatively simple to achieve, but the need to understand the original system database interface, still need some support from the original manufacturer. However, many access control management software supports the direct input of the card number issuance method, which creates very convenient conditions for system transformation.
In the card system, the subsystems directly related to the smart card include: card issuing subsystem, consumer terminal, card management subsystem; the transformation of the card issuing subsystem is mainly to initialize the M1 card process to initialize the CPU card; the transformation of the card management subsystem is also relatively simple to achieve CPU card reading and writing operations; the key to determine the success of the transformation is the upgrade of the consumer terminal, which not only requires The key to determine the success of the transformation is the upgrade of the consumer terminal, which not only needs to be able to read and write CPU cards, but also to upgrade the transaction process of M1 card to the standard transaction process of CPU card, which requires sufficient experience and understanding of CPU card application for the system developer.
Related products link: induction ic card access control ic card CPU card
Previous:How to encrypt the access card and the security performance of the access card