IC stored-value card application solutions in chain stores

SaveSavedRemoved 0
Deal Score0
Deal Score0

[ad_1]

1. Application background

With the development of society, business competition has intensified day by day. In response to market competition, operators have adopted a variety of operating methods or measures, such as the implementation of VIP cards and consumption points. However, how to attract and retain customers, and strengthen the management and control capabilities of each branch, has become a concern of every operator. The chain store membership card management system launched by Tsinghua Tongfang provides operators with advanced and reliable management methods.

2. Design goals

Using the IC card as a safe and effective data carrier, with the help of the powerful functions of the POS machine, a simple, convenient and easy-to-use chain store management system is constructed. Main design goals:

Safe and convenient management of the sale of IC stored-value cards to ensure the security of IC card information.

Realize flexible and changeable sales methods, meet the different needs of customers to the greatest extent, and improve the competitiveness of enterprises.

Support multiple communication methods to realize data transmission and exchange, and realize data statistical analysis, query, printing and other functions

Improve work efficiency and management level, eliminate repetitive work, and save operating costs.

Three, plan composition

In view of the business process analysis of chain stores, the system mainly consists of three parts: card issuance management, daily business processing, and data transmission. As a stored-value electronic currency, the IC card is used to complete all operations independently by the terminal, completely getting rid of the terminal’s dependence on the network. The requirements for the network are not high, and the requirements for the timing and sensitivity of the network are low. The structure and flow are as follows:

Fourth, realize the function

POS introduction: As an embedded product, with the increasing popularity of various network-based applications, POS products with easy operation, practical functions, and safe use are widely used. According to the usage, they are roughly divided into two types: handheld POS and POS terminals. They all provide users with a general application development platform, and the different needs of users can be achieved by compiling different application programs to facilitate and flexibly implement program downloading, data transmission and other tasks. At the same time, it has a variety of network connection methods. Users can easily, conveniently, safely and efficiently construct various IC card application systems.

1.Issuance and management of cards

The issuance and management of the card is completed in the chain head office. The first is the pre-processing of the card: write the control key of the enterprise in advance to all the cards, and adopt a unified key management to prevent illegal access and copying of the card. At the same time, generate operation authority cards for all levels of operation and management personnel, such as: administrator card and terminal operator card. Prevent illegal personnel from accessing the system and operating the terminal. Ensure the safe operation of the system.

In the issuance of a user card (membership card), the system first verifies the authority of the operator. After passing, the system generates an access key based on the control key and writes it into the card through a specific algorithm. At the same time, writes the predetermined amount and other information into the card. . The system automatically records card issuance records and operation records.

Complete the setting of various functions of POS. Application writing and algorithm loading.

2.Daily business processing

Complete the sales of IC stored-value cards.

Regardless of whether door-to-door sales or other sales methods are used, the business process is roughly the same. The first is the verification function: when the machine is turned on, the terminal will first verify the legality of the operator. When the customer presents the membership card for consumption, the terminal verifies the membership card. The verification process is: the terminal reads the ID of the user or operator in the card, and the access key is generated through a specific algorithm pre-installed in the terminal , Compare with the read card key. The same verification passed.

After the normal business processing is completed, the transaction flow is automatically written into the POS and user membership card. In order to carry out data transmission and query.

3.Data transfer

According to the different conditions of each chain branch, different networking methods are selected regularly or irregularly for data transmission, so as to realize the electronic exchange of various information with each chain store.

The system provides a variety of connection methods, local area network, public telephone information network, data acquisition card (terminal and when used alone) for data exchange. Such as: transaction flow, household information, etc.

Through the management software, it is convenient to summarize and analyze the information, and manage the purchase, sale, distribution, and storage of distribution centers and chain stores. Make effective use of resources. Provide a basis for leadership decision-making. Scientific analysis of consumer demand.

4.Scalable function

The basic functions of the system are given above. According to the actual needs of users, the system can be easily expanded, which is very convenient and simple. Such as: realize the electronic management of chain distribution with the help of IC card; realize the function of consumption points. Just modify the internal application of POS.

Five, security analysis

The system adopts unified key management to realize the security management of keys. The key management system uses a specific encryption algorithm for encryption to achieve the security of card information. The terminal adopts the operation authority management method to fully ensure that the terminal is not accessed illegally.

The mutual authentication between the card and the terminal device is direct and without intermediate links. Without the dynamic link library authentication of the terminal device, the mutual authentication is carried out in the form of cipher text inside the terminal, and the information is not exposed to ensure the safe operation of the system.

The reading of the information in the card requires key verification, and the read-write key of each card is generated by a specific encryption algorithm to ensure that the information in the card is not illegally read. At the same time, all operations are performed under the control key of the enterprise .

1

[ad_2]

We will be happy to hear your thoughts

Leave a reply

RFID made in China
Logo
Enable registration in settings - general
Compare items
  • Cameras (0)
  • Phones (0)
Compare