Local payment
Solution of non-cash payments is a stored value card that can store prepaid money, points, bonus, and other benefits, but the unit can deploy definition. One single contactless cards to be used in many applications public transport, retail outlets, entertainment district, hospitals, schools, industrial park .... Cardholders can load and pay for goods and services with payment cards at the point. The unit can assess their performance through a comprehensive monitoring system offered by Tuệ Minh. Solution of non-cash payment not only bring a better experience for consumers, but also to improve operational efficiency and transparency to the units deployed solution. It is easier to administer, support many payment points. Combined with the co-branded card, loyalty card.

System components

System security
The Key Management System (KMS) executes system security design by conditioning electronic purses (E-Purse) and Security Access Modules (SAM) such that any subsystem interacting with the E-Purse must require a SAM to enforce secured implementation of the application program. he SAM is specially designed security application residing inside a CPU smart card, which enhances and complements security of off-the-shelf E-Purse smart cards.
All security-sensitive decisions can only be made inside the security module to prevent application programmers being able to access to cryptographic keys or modify any processes made in module. Security modules are autonomous intelligent smart cards using cryptographic keys as the basis for security. Cryptographic keys are isolated and decoupled from the application program and programmers though the KMS.
Cryptographic keys generated by random keys created by user (System Operator) using multiple seeds controlled by user.
User-definable multiple sets of key.
One key one purpose for card authentication, terminal authentication, acquirer transaction certification, debit certification, issuer debit transaction signature, credit certification, credit transaction signature
Keys resided in various types of SAMs on a need-to-have basis.
Secured online and offline key updates.
All security-sensitive decisions can only be made inside the security module to prevent application programmers being able to access to cryptographic keys or modify any processes made in module. Security modules are autonomous intelligent smart cards using cryptographic keys as the basis for security. Cryptographic keys are isolated and decoupled from the application program and programmers though the KMS.
