A security verification method and device based on NFC identification

A security verification and to-be-verified technology, applied in the direction of digital data authentication, etc., can solve the problem of easy copying or fraud, and achieve the effect of being suitable for large-scale promotion, shortening verification time, and increasing difficulty

Inactive Publication Date: 2019-08-20
CHINA UNIV OF GEOSCIENCES (WUHAN)
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition, the data information of the current NFC card is stored

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A security verification method and device based on NFC identification
  • A security verification method and device based on NFC identification
  • A security verification method and device based on NFC identification

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0019] Embodiment 1, a schematic flow chart of a safety verification method based on NFC identification, which will be combined below figure 1 A schematic flow chart of a security verification method based on NFC identification in this embodiment is introduced in detail.

[0020] Such as figure 1 As shown, a schematic flow chart of a security verification method based on NFC identification, including the following steps:

[0021] Step 1: Read the ID serial number of the NFC card and initialize it, generate initialization information and store it;

[0022] Step 2: identifying the ID serial number to be verified of the NFC card to be verified, and encrypting the ID serial number to be verified to generate information to be verified;

[0023] Step 3: Compare the initialization information corresponding to the NFC card to be verified with the information to be verified. If the two match, the verification will pass, and the deduction will be completed according to the agreed amou...

Embodiment 2

[0046] Embodiment 2, a schematic structural diagram of a safety verification device based on NFC identification, which will be combined below figure 2 A schematic structural diagram of an NFC identification-based security verification device in this embodiment is introduced in detail.

[0047] Such as figure 2 As shown, a structural diagram of a security verification device based on NFC identification, including a card reading and writing module, a front-end card reading module and a background server.

[0048] Wherein, the background card reading and writing module is used to read the ID serial number of the NFC card and initialize it, generate initialization information and send it to the background server for storage; the front-end card reading module is used to identify the ID of the NFC card to be verified The ID serial number to be verified, and the ID serial number to be verified is encrypted, and the information to be verified is generated and sent to the background...

Embodiment 3

[0062] Embodiment three, a schematic structural diagram of a safety verification system based on NFC identification, which will be combined below image 3 A schematic structural diagram of an NFC identification-based security verification system in this embodiment is introduced in detail.

[0063] Such as image 3 As shown, a schematic structural diagram of an NFC-based security verification system includes at least one smart terminal and the NFC-based security verification device, and the smart terminal is wirelessly connected to the background server.

[0064] A security verification system based on NFC identification of the present invention can directly read the ID serial number of the NFC card through the intelligent terminal, and complete the communication of the NFC card through the communication between the intelligent terminal and the background server. NFC card payment can be completed anytime and anywhere, which is convenient, fast, safe and efficient, and is very ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an NFC recognition based security verification method and device. The NFC recognition based security verification method comprises the steps of reading an ID serial number of an NFC card, initializing the ID serial number, generating initialization information and storing the initialization information; recognizing an ID serial number to be verified of an NFC card to be verified, carrying out encryption processing on the ID serial number to be verified, and generating information to be verified; and comparing initialization information corresponding to the NFC card to be verified with the information to be verified, wherein the NFC card to be verified passes verification if the initialization information is consistent with the information to be verified, and fee deduction is accomplished according to agreed amount of money. The method provided by the invention increases the difficulty of an attacker for breaking data in the NFC card, and enables verification information of a user not to be leaked. Meanwhile, a data block to be read can be positioned quickly through an algorithm, people do not need to read all data in the card to carry out verification, the verification time in communication is shortened, and the verification efficiency is improved.

Description

technical field [0001] The invention relates to the technical field of NFC communication, in particular to an NFC identification-based security verification method and device. Background technique [0002] The currently used NFC deduction mode only stores the amount data into the card, and changes the data in the card each time the card is swiped to realize the deduction operation. Different merchants have different NFC cards for circulation. For the same user, it is inconvenient to use different cards for consumption, so I want to design a deduction model based on this, even if one card is used to realize different merchants. deduction operation. The NFC card is only used as a verification tool, and only the user's verification information is stored in the card. When the user swipes the card, the encrypted random verification data written in the card is used for matching verification with the information saved on the server side. If the verification is successful, it will ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/34
Inventor 张鹏飞姜孝男刘聪俊
Owner CHINA UNIV OF GEOSCIENCES (WUHAN)
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products