Technology and security defense and management control of large-scale sports events (I)

The potential application forms of smart cards in the sports field are diverse, including at least: industrial management of venues for the public (market), sports clubs, physical fitness monitoring in the national fitness, the use of large-scale sports events in competitive sports, and the information construction of sports colleges. Campus card and campus card. In the book "IC Card Application System", the author has published a separate chapter on the three specific expressions of the first three categories, which will not be described here. The campus card and campus card of physical education colleges are an extension of the application of information technology construction in colleges and universities. The characteristics and connotations of the colleges and universities have also been discussed in the proceedings "Computer and China Sports". Here, only the role of smart cards in the field of sports, the most "spectacular" and "tempting", smart cards and related technologies, in the large-scale sports competitions, especially the Olympics, such as the large-scale comprehensive international competitions, talk about the role view.
1 The inevitable necessity of this type of application
The inevitable necessity of this type of application depends on two aspects:
1.1 The needs of social development and scientific management
The computer information management system of the comprehensive large-scale sports meeting is the crystallization of high-tech such as modern computer technology, network technology and communication technology. It not only reflects the scientific and technological content of the Games, but also reflects the technological level and economic strength of the host region or country to some extent. Its wide adoption and application of smart cards, which is one of the ever-changing information products in the world today, will not only bring great convenience to participants, organizers and audiences, but also provide a comprehensive strength and technology level for the host regions or countries. The excellent opportunity, and will greatly promote the traditional operational management concepts and models of large-scale sports events, and form a new economic growth point while forming a dazzling scientific and technological highlights.
Of course, its implementation scale and difficulty are also larger than the top four, especially the strict requirements for safety and reliability. And such applications often do not appear in a single form, but complement each other with other high-tech (such as the fingerprint recognition mentioned in the article and the satellite global positioning system that will be highlighted in the second half of this article).
1.2 The need for security
With the progress of social civilization, the value and proportion of sports in modern human life are increasing day by day. Large-scale sports events have become a huge event with great influence in modern society, especially the four-year Olympic Games, as human beings. The most grand and grand world in peacetime, a world-wide mega-collection that transcends all races and political factions, has a wide-ranging influence, participation and care for those who love it, and is beyond the reach of any other social activities. Both the competition and the number of participants are continuing to grow. This kind of development momentum, which is getting bigger and bigger and more prosperous, brings a heavy economic and political return to the host country or region, and also brings a heavy burden to the host's reception, service, safety and transportation. The most important safety issue is more and more concerned about the relevant parties. The Olympic Games, which have a great impact on the world, have repeatedly become targets and performance stages for international terrorism. In 1972, the "Black September" tragedy in Munich and the 1996 Atlanta Park bombings all ate the bloody violence of the Olympic Movement. In the case of the September 11th World Trade Center in New York in 2001, it once again sounded the alarm for such a large-scale world gathering!
Friendly, harmonious and convenient is a good desire for all audiences and participants to expect, and safe and secure prevention is an essential guarantee for the normal operation of the Games. They are sometimes difficult to integrate or even contradict each other. Too much emphasis on the latter often inevitably has a negative impact on the former. The deliberate pursuit of the former will restrict the full implementation of the latter, and even leave catastrophic hidden dangers. Since today’s forms of terrorist activity have been gradually transformed from early planned and targeted activities to suicides without specific goals, random randomness, and even threats to unrelated people, the Olympic Games with anti-terrorism as the core have been further increased. The difficulty of securing large sports events. The full use of various modern technologies is undoubtedly an excellent way and good means to alleviate such contradictions while taking into account security, enthusiasm and warmth.
The Integrated Circuit Card (ICC) and the Global Positioning System (GPS) were originally developed by the financial, military and other fields. They have gradually penetrated into modern humans. The various social and economic activities have unique effects on the management control of large-scale sports events, especially security.

This article will give a conceptual discussion on the application prospects of ICC and GPS in large-scale sports events from a technical point of view. Some of the contents are still forward-looking prospects, and there are still many issues to be discussed in terms of organizational management, capital investment, and implementation details.
2 The application form and function of integrated circuit card (ICC)
The sports information computer information management system is the nerve center for the organization, operation, command and service of large-scale sports games, and the integrated circuit card (also known as smart card) can be used as an important front-end interface for human-computer interaction of this information system, used for identity authentication, traffic control, Data recording, comprehensive management, auxiliary competition, admission securities, patrol inspection, life service, medical first aid, small amount of consumption, etc.
For such applications, they can be divided into four categories as shown in Figure 1.
2.1 Participant card
It has a wide range of jurisdictions and diverse breeds, including athletes, coaches, referees, delegation officials, organizing committee staff, doping inspectors, journalists, guests, VIPs, representatives of international organizations, officials at all levels, and police. Services and medical workers...etc. are the most important and critical applications of ICC in large-scale events. All participants can only rely on the card they hold to carry out the relevant activities allowed by the authority in the specific authority scope of the card. Its characteristics are:
2.1.1 Variety: In order to facilitate the rapid visual distinction between the various types of objects mentioned above, the color, pattern and text of the card surface must be clear, eye-catching, easy to distinguish, and print photos. In addition to the original ID (Identity) identification code and the card number given by the conference, the card electronic information should have at least the name, age, gender, citizenship, country, province, identity, project, and card time. , expiration date, etc. For more demanding objects, even fingerprint information can be included. Fixed or portable card reader terminals throughout the assembly will accurately distinguish objects accordingly.
2.1.2 Convenience: This type of card is a voucher for the event that the cardholder may use every day. It should be as convenient and efficient as possible. For this purpose, a dual interface card with both contact and non-contact interfaces should be used. DIC-Dual Interface Card). In addition to higher security requirements such as financial payment and fingerprint recognition, general channel identification and other non-contact work methods are taken. If necessary, the card main picture can be automatically displayed on the channel monitoring screen to achieve fast and effective visual identification (the card front or front + side photo is retained in the system when the card is registered, and the corresponding card reading terminal is transmitted in advance via the network. When the card is used, the terminal automatically retrieves according to the card number).
2.1.3 Good security and anti-counterfeiting: This type of card is the cardholder's “identity card” and “passport”. It is closely related to the security of the conference and must adopt a series of security measures. Such as:
In order to prevent counterfeit copying, each ICC has a world-unique ID code that is written once by the manufacturer before the chip is shipped from the factory. For each read and write operation of the chip, the card machine must be authenticated in both directions. And strictly implement the key management system, beware of leaks. When conditions permit, it is also possible to take appropriate anti-counterfeiting measures for the embedded substrate of the chip - the manufacturing process of the card and the surface printing.
In order to prevent theft or fraudulent use, in addition to printing photos on the card surface or displaying the card main photo on the card reading terminal monitoring screen, a personal identification number (PIN-Personal Identifica- tion Number) test or fingerprint recognition may be performed if necessary.
The DIC's on-chip CPU and non-volatile memory space are shared between contact and contactless modes to ensure consistency in the security level of the two operating modes.
The system establishes a strict and efficient reporting mechanism for reporting loss, reissue, and blacklisting. When the card is lost, the card owner must report the loss in the branch (site, station, etc.) management department with a fully credible person or physical evidence. The report of loss reporting is then blacklisted after being reported to the central computer of the conference by the network, and is transmitted to the terminals via the Internet to prevent others from using it. At the same time, the card owner handles the temporary card and makes a transition to reissue the new card.
2.1.4 Multiple use of one card: In addition to being used for identification, it can also be used as:
The key to open the house and office door locks in a contact or non-contact manner. The preset in the card allows the opening time period and expiration date, and the actual opening time is retained in the card and the electronic door lock.
Used for catering services, entertainment and fitness, etc. (free or limited or billed), and even use the "e-wallet" in the card to buy souvenirs, newspapers, telephone calls, washing, etc. in the concession store, commissary, etc. consumption. The amount of "e-wallet" can be written by the conference department at the time of card-making, or can be recharged by prepaid cash at the recharging terminals distributed throughout the venue or transferred from the card account of the card owner through the financial network. From a safety point of view, such recharge and transfer can only be carried out in a contact manner, but can be consumed in a contact or non-contact manner.
Also serves as a medical emergency card. First-aid information such as card holder name, age, gender, blood type, allergy contraindications, medication, major illness, contact information, medical insurance number, etc. are written in a specific area of ​​the card in clear text.
Staff attendance.
Conference vehicle pass.
2.2 Special security control card
The above-mentioned card is used for the cardholder's identity certificate, which is the general certificate of the cardholder's activities at the venue and the basis for the reception and management of the relevant departments. At higher security levels, he or she must also present another card - a dedicated security (full) control card. The characteristics of this type of card are: single function, dedicated, but more secure. In view of the fact that non-contact RFID is vulnerable to intercepting and analyzing the information flow of the card machine, and then copying or inserting the pseudo signal, the card is often selected to have a contact-resistant CPU card with better anti-attack performance. Its main form of expression is:
2.2.1 Special Pass: It is used to enter key departments such as confidentiality, finance, power supply, general control room, network center, and communication hub. More strict card machine two-way authentication and time period and expiration date control are implemented. The opening information is not only saved by the card machine, but also can be uploaded to the security center via the network in real time for supervision and filing. If necessary, you can increase the PIN code verification or even fingerprint identification to further determine the card holder's legality.
2.2.2 Operation authority card: It is used to authorize and supervise the access to the key network and database of the conference information system, and to control the illegal intrusion and malicious attacks on the system. The card records the card holder's specific personal information and various keys. These keys and corresponding encryption algorithms and digital signatures will form the core of the system's security and confidentiality.
The card is not only the key to the operator entering the system (the card is inserted into the system through authentication), but also the work log created by the card machine image, and also records the information on the machine, the online time and the entry area, and retains the anti-repudiation RSA. digital signature. Through the work log, the competent department can understand the operation of the specific modules of the system, and conduct safety and quality inspection and evaluation.
The setting of the operation card level permission minimizes the possible damage range of the system; and the personal password defined by the operator is hidden in the ciphertext form, and the machine is not resident. Not only can it prevent illegal acts of stealing passwords from computers, but it can also prevent others from stealing/disposing of operating cards. Once the cardholder enters the password continuously for a limited number of times, the card is automatically scrapped and the system alarms.
2.2.3 Information transfer card: Transit media between the management system and offline terminals (including retail terminals, vehicle terminals, simple channel terminals, handheld security terminals), download and report terminal operation data, system commands and black Record the information such as the list and so on. In this type of application, in addition to the card machine two-way authentication, PIN code verification, RSA digital signature and other measures to achieve ICC, terminal and cardholder legality identification and responsibility confirmation, if necessary, should also deal with transaction flow, blacklist, etc. Key information is encrypted.
2.2.4 Others: All types of SAM (Secure Access Module) included in the system's information defense system to realize key generation and storage, data encryption and decryption, card machine two-way authentication, digital signature/verification, etc. Cards and radio or TM (Touch Memory) patrol cards for security inspections.
2.3 Auxiliary competition
At the end of the twentieth century, many large international marathons in Europe and America (Berlin, Hamburg, Boston, Rotterdam, etc.) were manufactured using a miniature glass transponder (an electronic tag) and injection molded in a special shape ABS plastic. An antenna of about 2m x 1m thin pad. The former is fixed to the athlete's shoelace; the latter is combined into an antenna array, and the ground is placed at the beginning and end, and the reader (card reader) is connected. The reader reads the ID code of the transponder passing through the antenna identification area, and the monitor screen displays the time of each player in real time. The 1996 Atlanta Olympics also had similar applications.
Obviously, it is only necessary to preset the name, country (province) name and other information corresponding to each ID code in the machine, and the player's information can be displayed in different characters through the dot matrix LED/LCD display. With only minor adjustments to the hardware and software, the marathon timing system can be used for the metering of the venue.
If the flexible electronic label with adhesive is attached to the number cloth on the front/back of the competitor's chest, the card information can be read by the handheld card reader and the referee terminal or project management computer can be transmitted. It is also possible to read the information of the referee card in the same way and sign the referee to facilitate the information management of the competition.
The characteristics of this type of application are:
Generally used only for object recognition, there is little or no write operation when actually using the card. Sometimes even chip personalization is not required. The on-chip contains less information (often only for index marks, object details storage system), and all information is plain text, do not worry about leaking, only the most basic anti-counterfeiting features. Therefore, the safety level and storage space of the chip are extremely low; on the other hand, because it is placed on a player who is strenuously moving, the volume is required to be as small as possible, the weight is as light as possible, the fixed removal is easy, the competition is not affected, and the reliability is reliable. It is waterproof, dustproof, anti-magnetic, anti-mechanical shock and twisting ability, and most of them are disposable. It is better to use electronic tags with low cost, passive and non-contact RF operation.
In the track timing and metering applications, this type of tag must also have an anti-collision function for multiple players simultaneously, and the power and size of the reader antenna should be large enough to ensure read/write distance, coverage and reliability.
2.4 Admission Securities
The most attractive form of ICC application in the Games, the main features are:
2.4.1 Easy to use, especially when people are crowded, non-contact swipe, a wave.
2.4.2 Each ticket checking (reading card) terminal can be connected to the management center through the network, which helps the organization manager to keep abreast of changes in the flow of people entering the venue.
2.4.3 Good security and anti-counterfeiting. Each card chip has a world-unique ID code that is written once before leaving the factory. When the card is personalized, the game information (date, time, venue, entrance, seat, competition, etc.) is written in cipher text. Password protected. When the card is used (checking), the ticket checking terminal first verifies the identification code, then reads the verification and game related information, and finally checks the "checking flag" located in a specific area of ​​the chip. After confirming that the "admission ticket" is legal and valid, the "check-in" is set to the check-mark area and released.
The triple protection of identification code, encryption and read and write passwords can effectively prevent copying and forgery of cards. All the addition and decryption operations at the time of sale and check-in are automatically completed inside the machine. The relevant passwords/keys and algorithms are hidden inside the machine and vary from view to game to prevent internal staff from engaging in malpractice.
2.4.4 Card personalization can be completed in advance or at the time of ticketing, and can be booked remotely by phone or network. When personalizing, in addition to writing the above information in the card, it is necessary to establish a clear-text view information on the card surface that is consistent with the content for the cardholder to view.
Since the card face and the information in the card are established when the card is personalized, how much "sell" "sell" is beneficial to avoid the waste caused by the "selling" of the ticket.
2.4.5 The cost is lower. Although its anti-counterfeiting property is much better than paper ticket, it has lower cost, waterproof and anti-mechanical damage because it has relatively low security level and contains limited information and can be written without rewriting. A flexible RF electronic tag with better performance.
2.4.6 The large circulation is not only conducive to further reducing the cost of single card, but because ICC's physical life is much longer than paper tickets, it can use its long-lasting card face advertisement to form another important economic source for the organizer.
2.4.7 Each ticket checking terminal can access the management network wirelessly or by wire. If necessary, you can output text and voice prompts, such as: "ticket expired", "please take the X door" and so on. When an abnormality such as a network failure occurs, it should be able to work offline and save the ticket checking information.
2.4.8 Each ticket checking terminal can accept the blacklist transmitted by the network or special security control card, and conduct security audit and alarm.
2.4.9 One-card multi-voucher, different game viewing information area and ticket checking area are established in different areas on the card, and different password/key isolation protection is applied respectively.
2.4.10 Using the ID card code read during ticket checking, you can realize the points discount or sweepstakes, and give rewards such as souvenirs, free viewing, star signature/photo. In an active atmosphere, mobilize the mood and enthusiasm of the audience, enhance the enthusiasm of the audience for the cold-stayed projects, and promote the industrialization of sports.
Since the second half of the 1990s, the potential use of ICC in the scientific management and security defense of large-scale sports events has increasingly attracted more attention from relevant parties at home and abroad. The 26th/27th Olympic Games, the 21st World University Games and the 9th National Games of China have all been carefully considered or tried. The 2008 Olympic Games card, which is brewing, further indicates the bright future of ICC in Beijing's “Technology Olympics” and “Digital Olympics” grand blueprint. For the 10th National Games held in Jiangsu in 2005, the realization of the "Science and Technology Ten Games" is also no enlightenment. As for the security control in the conference traffic between the venues, another technical means - GPS.

Description of EVA Foam Sticker

1) Safe for children and non-toxic

2) SGS,CE,EN71

3) Different materials, color, printing, size, and shapes are available .

4) Easy to use, removable, beautiful, position anywhere you like. 

5) Very popular for promotional purposes.

6) Customers' logo and designs are available.

7) OEM & ODM orders are welcome.

 

About Usage of Eva Foam Sticker

You can take EVA foam stickers as wedding gifts, souvenirs, decorations.business gift.

For celebrations and outdoor parties, it's both beautiful and practical, which shows your unique

aesthetic and considerateness to your guests.

For Commercial use ,promotion, advertisement, etc.

Customized OEM service is provided.


Competitive Advantage of Eva foam sticker

Colorful

Soft

Many colors available for choice

Easy to apply

Competitive price

Meet the safety requirement

Low MOQ requirement

Own design welcome

Provide service on creating designs upon request

 

Eva foam sticker


animal foam sticker

Eva foam sticker


magnetic foam sticker 

Eva Foam Sticker

EVA Foam Sticker,Decorative EVA Foam Sticker,Environmental Eva Foam Sticker,Adhesive EVA Foam Sticker

Ji An Chi Cai Gift and Packaging Product Co., Ltd. , http://www.chicaieva.com