First, the application background
With the development of society, business competition is increasing. In order to cope with market competition, operators have adopted a variety of business methods or measures, such as the implementation of VIP cards, consumption points and so on. However, how to attract customers and retain customers; and strengthen the management control ability of each branch has become a concern of every operator. Tsinghua Tongfang launched a chain store membership card management system to provide operators with advanced and reliable management tools.
Second, the design goals
Using IC card as a carrier of safe and effective data, with the powerful functions of POS machine, it constitutes a simple, convenient and easy-to-use chain store management system. Main design goals:
Safe and convenient management of the sale of IC stored value cards to ensure the security of IC card information.
Achieve flexible and variable sales methods to meet the different needs of customers and improve the competitiveness of enterprises.
Support a variety of communication methods to achieve data transmission and exchange, to achieve statistical analysis, query, printing and other functions of data
Improve work efficiency and management level, eliminate repetitive work and save operating costs.
Third, the program composition
For the business process analysis of chain stores, the system mainly consists of three parts: card release management, daily business processing, and data transmission. The IC card is used as the stored value of the electronic money. All operations are completed independently by the terminal. The terminal is completely free from the dependence of the terminal on the network. The requirements on the network are not high, and the timing and sensitivity of the network are low. The structure of the network is as follows:
Fourth, to achieve the function
Introduction to POS: As an embedded product, with the increasing popularity of various network-based applications, POS products with simple operation, practical functions, and safe use are widely used. According to the usage, they are roughly classified into handheld POS and POS terminals. They all provide users with a common application development platform. The different needs of users can be used to facilitate the downloading and data transmission of programs by compiling different applications. At the same time, there are a variety of network connections. Users can easily and conveniently construct various IC card application systems.
1. Card issuance and management
The card issuance management work is completed in the chain main store. First, the card is pre-processed: all the cards are written into the enterprise's control key in advance, and unified key management is adopted to prevent illegal access and copying of the card. At the same time, the operation authority cards of the operation and management personnel at all levels, such as the administrator card and the terminal operator card, are generated. Prevent unauthorized personnel from accessing the system and operating the terminal. Ensure the safe operation of the system.
The user card (member card) is issued, the system first verifies the authority of the operator. After the system passes the control key, the access key is written into the card through a specific algorithm, and the predetermined amount, other information, etc. are written in the card. . The system automatically records the card issue record and operation record.
Complete the settings for various functions of the POS. Application write and algorithm loading.
2. Daily business processing
Complete the sales of IC stored value cards.
Regardless of whether it is on-site sales or other sales methods, the business process is roughly the same. The first is the verification function: booting, the terminal first verifies the legality of the operator. When the customer presents the membership card for consumption, the terminal performs verification on the membership card. The verification process is: the terminal reads the ID of the user or the operator in the card, and generates an access key through a specific algorithm pre-installed in the terminal. , compared to the read card key. The same verification passed.
After the normal business processing is completed, the transaction flow is automatically written into the POS and the user's membership card. In order to transfer and query data.
3. Data transmission
According to the different situations of each chain store, different networked methods are used to transmit data regularly or irregularly, so as to realize electronic exchange with various information of various chain stores.
The system provides a variety of connection methods, LAN, public telephone information network, data acquisition card (terminal and when used alone) for data exchange. Such as: transaction flow, household information, etc.
Through management software, it is convenient to collect and analyze information, and manage the distribution, sales, distribution and storage of distribution centers and chain stores. Make resources available. Provide a basis for leadership decisions. Scientific analysis of consumer demand.
4. Scalable function
The basic functions of the system are given above. According to the actual needs of the user, it is convenient to expand the functions of the system, which is very convenient and simple. Such as: the electronic management of chain distribution by means of IC card; the function of realizing consumption points. Just modify the internal application of the POS.
V. Security analysis
The system uses unified key management to achieve secure key management. The key management system uses a specific encryption algorithm to encrypt and implement card information security. The terminal adopts the operation authority management mode to ensure that the terminal is not illegally accessed.
The mutual authentication between the card and the terminal device is direct, without intermediate links, and does not pass the dynamic link library authentication of the terminal device. Both of them authenticate each other in the form of cipher text inside the terminal, and the information is not exposed to ensure the safe operation of the system.
The card information is read by key verification, and each card's read/write key is generated by a specific encryption algorithm to ensure that the information in the card is not illegally read, and all operations are performed under the enterprise's control key. .
Aluminium Garden Dining Furniture
Outdoor Aluminum Dining Furniture
Outdoor aluminum Dining furniture using at least 1.2. 1.5. 2.0 thickness aluminum frame with rush resistant powder-coated. You can choose different powder-coated color to make the aluminum dining furniture special and fit your garden or home decorate.
Secure and comfortable structure, simple design but elegance, is popular option for customer. Aluminum frame is welded and polished in meticulous style. Gently angled backs and wide arms encourage restful lounging. The industry`s best high-performing fabrics encase the thick, double-wrapped foam cushions.
Table top can be tempered glass or marble style aluminum table top.
You can choose square, rectangle dining furniture with armchair and armless chair.
Outdoor aluminum furniture with high quality and long time guaranty.
If you have any questions, please contact with us directly. Outdoor Aluminum Furniture are produced by Golden Eagle Outdoor Furniture Co.,ltd with High Quality and Good Appearance. Welcome you to visit our Factory for any inquiry, please send mail directly to us.
Wicker Aluminium Garden Dining Furniture,Patio Aluminium Garden Dining Furniture,Rattan Aluminium Garden Dining Furniture,Outdoor Aluminium Garden Dining Furniture
Golden Eagle Outdoor Furniture Co., LTD. , https://www.gebarset.com