CN111491295A - NFC-based identity authorization and identity verification method, device and system - Google Patents

NFC-based identity authorization and identity verification method, device and system Download PDF

Info

Publication number
CN111491295A
CN111491295A CN202010287351.0A CN202010287351A CN111491295A CN 111491295 A CN111491295 A CN 111491295A CN 202010287351 A CN202010287351 A CN 202010287351A CN 111491295 A CN111491295 A CN 111491295A
Authority
CN
China
Prior art keywords
nfc
identity
authorization
personal
authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010287351.0A
Other languages
Chinese (zh)
Other versions
CN111491295B (en
Inventor
屈柏耿
胡昌吉
段春艳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Foshan Polytechnic
Original Assignee
Foshan Polytechnic
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Foshan Polytechnic filed Critical Foshan Polytechnic
Priority to CN202010287351.0A priority Critical patent/CN111491295B/en
Publication of CN111491295A publication Critical patent/CN111491295A/en
Application granted granted Critical
Publication of CN111491295B publication Critical patent/CN111491295B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/40Security arrangements using identity modules
    • H04W12/47Security arrangements using identity modules using near field communication [NFC] or radio frequency identification [RFID] modules
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/63Location-dependent; Proximity-dependent
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The NFC identity authorization device with the authorization of the national level identity authentication center performs login verification on a user; after the user logs in successfully, a service transaction interface of the NFC identity authorization device is opened, and the transacted service comprises identity authorization; when the NFC identity authorization device receives an identity authorization instruction, whether identity authorization can be carried out on the NFC personal device used as the identity identification is judged; if the NFC personal identity authorization device can be connected with the national level identity authentication center once to acquire the recorded personal identity information of the user, and the acquired personal identity information is written into an NFC chip of the NFC personal device. The invention carries out identity authorization on the NFC personal device to use the NFC personal device as an identity card, thereby facilitating identity authentication of a user and improving the convenience of identity authorization.

Description

NFC-based identity authorization and identity verification method, device and system
Technical Field
The invention relates to the technical field of information security and NFC, in particular to an identity authorization and identity verification method, device and system based on NFC.
Background
At present, the only identity of each person is an identity card, and the identity card is needed to verify the identity of each person in many occasions, for example, the identity of each person needs to be verified by riding high-speed rails, handling bank cards, purchasing on line and the like, so that the use requirements of users are met.
However, the existing card-type identity card is inconvenient to carry and easy to lose; on the other hand, the identity of the person is easy to break and cannot be verified through the broken identity card. Wherein, in case the ID card is lost or lost, all need the user to carry effective certificate to go to the public security bureau of place of birth and carry out the ID card and handle, all have the risk of embezzlement during handling through bank card, cell-phone, public transit card etc. that the ID card authorized, need freeze, and handle the ID card and need certain cycle, brought the inconvenience for user's daily life.
Therefore, the prior art has defects and needs to be improved and developed.
Disclosure of Invention
The technical problem to be solved by the present invention is to provide a method, a device and a system for identity authorization and identity verification based on NFC, aiming at solving the problems that in the prior art, an identity card is easy to lose or break as a unique personal identity, and the handling process is complicated.
The technical scheme adopted by the invention for solving the technical problem is as follows:
the identity authorization method based on NFC comprises the following steps:
the NFC identity authorization device with the authorization of the national level identity authentication center performs login verification on the user;
after the user logs in successfully, a service transaction interface of the NFC identity authorization device is opened, and the transacted service comprises identity authorization;
when the NFC identity authorization device receives an identity authorization instruction, whether identity authorization can be carried out on the NFC personal device used as the identity identification is judged;
if the NFC personal identity authorization device can be connected with the national level identity authentication center once to acquire the recorded personal identity information of the user, and the acquired personal identity information is written into an NFC chip of the NFC personal device.
Further, when the NFC id authorization device receives the id authorization command, it determines whether the NFC personal device used as the id can be authenticated, and then the method further includes:
if the NFC identity authorization device cannot perform identity authorization on the NFC personal device, judging whether an NFC device with authorized identity exists;
if the NFC identity authorization device exists, the NFC identity authorization device prompts to remove authorization;
when the NFC identity authorization device receives an authorization removing instruction, the NFC identity authorization device is automatically connected with a national level identity authentication center to search information of an authorized NFC device owned by a user, and identity authorization of the authorized NFC device is removed.
Further, the way that the NFC authentication device performs login authentication on the user at least includes: fingerprint verification, face recognition, identity card verification, personal voiceprint verification, algorithm decoding and authorized NFC device verification.
Further, after the user logs in successfully, a service handling interface of the NFC identity authorization device is opened, and handled services also include loss reporting;
when the NFC identity authorization device receives the loss report instruction, the NFC identity authorization device is automatically connected to a national level identity authentication center to search information of the authorized NFC device, and identity authorization of the authorized NFC device is frozen.
Further, the NFC personal device is an intelligent wearable device.
The invention also provides an NFC-based identity authorization device, wherein the NFC-based identity authorization device is used for executing the NFC-based identity authorization method when being used.
The invention also provides an identity authentication method based on NFC, wherein the identity authentication method comprises the following steps:
the NFC identity verification device induces an NFC personal device with authorized identity, personal identity information in an NFC chip is obtained, authentication data corresponding to the obtained personal identity information is applied to a national level identity authentication center according to the obtained personal identity information, and the authentication data comprises: name, ID card number and certificate photo;
the NFC identity authentication device shoots a face image of a user and judges whether the similarity between the shot face image and a certificate photo in authentication data reaches a preset threshold value or not;
if the unique authentication data corresponding to the personal identity information exists in an identity database of the national level identity authentication center, the NFC identity verification device judges that the NFC personal device is a legal terminal; meanwhile, the similarity between the face image shot by the NFC authentication device and the certificate picture in the personal identity information reaches a preset threshold value, and the NFC authentication device passes the authentication of the user.
Further, the NFC personal device performs authentication on an NFC authentication device, previously comprising:
receiving a positioning starting instruction by an NFC personal device, and starting a positioning function of the NFC personal device;
the NFC identity authentication device searches the geographic position of the NFC personal device in the communication area and judges whether the NFC personal device is in the communication area;
and when the NFC personal device and the NFC authentication device are in the same communication area, the NFC authentication device passes the positioning authentication of the NFC personal device.
The invention also provides an NFC-based authentication device, wherein the NFC-based authentication device is configured to perform the NFC-based authentication method when being used.
The present invention also provides a system comprising a memory, and one or more programs, wherein the one or more programs are stored in the memory and configured to be executed by the one or more processors includes a processor configured to perform the NFC-based identity authorization method as described above, and the NFC-based identity verification method as described above.
The invention provides an identity authorization and identity verification method, device and system based on NFC, comprising the following steps: the NFC identity authorization device with the authorization of the national level identity authentication center performs login verification on the user; after the user logs in successfully, a service transaction interface of the NFC identity authorization device is opened, and the transacted service comprises identity authorization; when the NFC identity authorization device receives an identity authorization instruction, whether identity authorization can be carried out on the NFC personal device used as the identity identification is judged; if the NFC personal identity authorization device can be connected with the national level identity authentication center once to acquire the recorded personal identity information of the user, and the acquired personal identity information is written into an NFC chip of the NFC personal device. The invention carries out identity authorization on the NFC personal device through the NFC identity authorization device so as to use the NFC personal device as an identity card, thereby facilitating identity authentication of a user and improving the convenience of identity authorization.
Drawings
Fig. 1 is a flow chart of a preferred embodiment of the NFC-based identity authorization method in the present invention;
fig. 2 is a flow chart of a preferred embodiment of the present invention for NFC personal terminal identity authorization;
fig. 3 is a flow chart of a preferred embodiment of the present invention for authenticating an NFC device and a user identity;
fig. 4 is a flow chart of a preferred embodiment of authentication by NFC device, user identity and location in the present invention;
fig. 5 is a functional block diagram of a preferred embodiment of the system of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention clearer and clearer, the present invention is further described in detail below with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
Referring to fig. 1, fig. 1 is a flowchart of an NFC-based identity authorization method in the present invention. As shown in fig. 1, the NFC-based identity authorization method according to the embodiment of the present invention includes the following steps:
s100, the NFC identity authorization device with the authorization of the national level identity authentication center performs login verification on the user.
And S200, after the user successfully logs in, opening a service transaction interface of the NFC identity authorization device, wherein the transacted service comprises identity authorization.
S300, when the NFC identity authorization device receives the identity authorization instruction, whether the NFC personal device used as the identity can be subjected to identity authorization or not is judged.
And S400, if the NFC personal authentication device can be connected with the national level identity authentication center once, the personal identity information of the user recorded in the personal identity authentication center is acquired, and the acquired personal identity information is written into an NFC chip of the NFC personal device.
In an embodiment, as shown in fig. 2, fig. 2 is a flow chart of a preferred embodiment of the present invention for performing NFC personal terminal identity authorization. The method specifically comprises the following steps:
s110, the NFC identity authorization device with the authority of the national level identity authentication center receives the login verification instruction, and starts a login interface.
Specifically, NFC identity authorization device is self-service device, sets up in administrative service points at all levels, is unified to be administered by national administrative office, and NFC identity authorization device is the convenient passageway of individual access national level authentication center, and the user is through carrying out self-service identity authorization on NFC identity authorization device, has improved the convenience of identity authorization, has made things convenient for user's daily needs, has also reduced national administrative office staff's work load, has realized that the intellectuality of identity registration, report for loss, applying for etc. is handled, saves the time of handling.
And S120, when the login information is received, connecting the national level identity authentication center to access the access information corresponding to the login information so as to verify whether the login information exists.
Specifically, the login information may be one or a combination of several of fingerprint verification, face recognition, identification card verification, personal voiceprint verification, algorithm decoding and authorized NFC device verification, and the access information corresponding to the login information is a verification certificate which is specified by the user in the national authentication center and is uniquely used as a login NFC identification authorization device in advance, and the access information corresponding to the login information can be authorized to the national authentication center only by authorization of a national administrative agency, and the user must successfully verify the identity each time the login information is modified.
It can be understood that the user can also customize an additional authentication manner on the basis of the login information to enhance the protection of the identity information, such as defining a password through an algorithm, generating a real-time password based on biometric identification, and customizing a calculation formula.
And S130, if the user logs in the network, the user logs in successfully.
And S140, if the log-in information does not exist, prompting that the log-in is failed.
And S200, after the user successfully logs in, opening a service transaction interface of the NFC identity authorization device, wherein the transacted service comprises identity authorization.
S300, when the NFC identity authorization device receives the identity authorization instruction, whether the NFC personal device used as the identity can be subjected to identity authorization or not is judged.
And S400, if the NFC personal identity authorization device can be connected with the national level identity authentication center once to acquire the recorded personal identity information of the user, and writing the acquired personal identity information into an NFC chip of the NFC personal device.
Specifically, the personal identity information is information stored in an existing resident identification card, and includes: name, ID card number and certificate photo, etc. When the NFC identity authorization device acquires the identity authorization from the national level identity authentication center, the NFC identity authorization device can also read the equipment identification code of the NFC personal device used for the identity authorization and upload the equipment identification code to the national level identity authentication center for backup, so that a user can conveniently search the authorized NFC device.
S500, if not, the NFC identity authorization device cannot perform identity authorization on the NFC personal device, and whether an NFC device with authorized identity exists is judged.
S600, if the NFC identity authorization device exists, the NFC identity authorization device prompts to remove authorization.
S700, when the NFC identity authorization device receives an authorization removing instruction, the NFC identity authorization device is automatically connected with a national level identity authentication center to search information of an authorized NFC device owned by a user, and identity authorization of the authorized NFC device is removed.
It can be known that, when the authorized NFC device is removed by connecting the national authentication center, the user can perform the identity authorization on the new NFC personal device through the NFC identity authorization device, and the NFC device with the identity authorization only has one NFC device. By the mode, the user is ensured to only have one NFC personal device which is authenticated by an official party and uniquely identifies the user identity, and the safety of using the NFC personal device by the user is improved while the identity of the user is conveniently verified.
Certainly, after the user logs in successfully, a service transaction interface of the NFC identity authorization device is opened, the transaction service further includes a loss report, and when the loss report operation is performed, the following steps are specifically performed:
and S800, when the NFC identity authorization device receives the loss report instruction, the NFC identity authorization device is automatically connected to a national identity authentication center to search information of the authorized NFC device, and identity authorization of the authorized NFC device is frozen.
Of course, the identity authorization of the authorized NFC device is frozen by loss reporting, and in order to improve the efficiency of freezing, a unified fixed phone may be set to perform freezing processing, and the number of the unified fixed phone is not limited here, and all the ways that the instant freezing can be implemented belong to the protection scope claimed in the present invention.
Furthermore, when the identity authorization is frozen by performing fixed-line call alarm, the effectiveness of freezing can be guaranteed by recording voice print comparison, video call, intelligently positioning the position of an alarm person and the like. The NFC personal device does not have an authentication function during a freeze period, wherein the freeze period is autonomously selectable by a user and the authorization to freeze the identity of the NFC personal device is released after the freeze period has elapsed.
And above-mentioned NFC personal device as identity mandate can be for intelligent wearing equipment, like intelligent wrist-watch, intelligent ring, intelligent necklace, intelligent bracelet, intelligent waistband, intelligent foot ring or foot chain, intelligent headwear etc. still can implant the human body with the NFC chip that the identity mandate even, above mode convenience of customers carries, is difficult for losing.
It can be understood that the NFC personal device may have the existing functions of a common intelligent terminal, such as calendar, time, short message sending and receiving, step counting, heart rate measurement, and the like, and may further add personalized customization elements, such as functions of increasing human health monitoring and the like.
In an embodiment, a credit rating system may be further established in the national-level authentication center, and the credit of the user may be evaluated through the number and behavior of times that the user indirectly accesses the national-level authentication center, for example, when the NFC personal terminal is an illegal terminal, the personal identity information stored in the NFC chip is tampered, the personal identity information is illegally embedded in the NFC chip, and the like, if the credit rating system is checked by the national-level authentication center, the credit rating system may be modified according to the verification login information corresponding to the NFC personal terminal, so as to establish a good accountability system, and ensure the security of the user accessing the national-level authentication center.
The invention also provides an NFC-based identity authorization device, wherein the NFC-based identity authorization device is used for executing the NFC-based identity authorization method when being used; the NFC-based identity authorization apparatus is the above-mentioned NFC identity authorization apparatus, and executes the above-mentioned identity authorization method when performing identity authorization, as described above.
When the authorized NFC personal device performs authentication on the NFC personal device, the NFC personal device performs authentication operation of the NFC personal device, so the present invention further provides an NFC-based authentication method, as shown in fig. 3, where fig. 3 is a flowchart of a preferred embodiment of performing authentication on the NFC device and the user identity in the present invention. The identity authentication method based on NFC comprises the following steps:
a100, the NFC identity verification device induces the NFC personal device, personal identity information stored in the NFC personal device is obtained, and authentication data corresponding to the obtained personal identity information is applied to a national level identity authentication center.
Specifically, the personal identification information in the NFC personal device is stored in the NFC chip therein, and when the NFC chip is read, the NFC authentication device automatically acquires the personal identification information in the NFC chip. The personal identity information is the same as the personal identity information for identity authorization in the NFC identity authorization device, the NFC identity verification device can read the personal identity information and the equipment identification code of the NFC personal device, and whether the read NFC personal device is an authorized NFC device or not can be quickly known through matching with the equipment identification code backed up in the national level identity authentication center. Therefore, the authentication data is the equipment identification code backed up by the national level identity authentication center.
And A200, if the unique authentication data corresponding to the personal identity information exists in an identity database of the national level identity authentication center, judging that the NFC device is a legal device.
It is to be understood that, to further ensure the accuracy of identity verification, the authentication data may further include a name, an identification number and a certificate photo corresponding to the personal identity information. The national level identity authentication center records the personal identity information of each resident, and the recorded personal identity information is authenticated by the national administration center and can not be changed freely. And the personal identity information acquired from the NFC personal device is compared with the personal identity information recorded by the national level identity authentication center, so that whether the personal identity information in the NFC personal device is illegally tampered or the personal identity information stored in the NFC personal device is illegally implanted and is not subjected to identity authorization can be visually checked.
Certainly, in order to improve the security of the identity verification, the applied verification data often uses the name, the identity card number, the certificate photo and the backup device identification code recorded by the national level identity authentication center at the same time. It is possible to verify both the personal identification information stored in the NFC personal device and the NFC personal device.
In an embodiment, when the NFC authentication device performs authentication, face recognition is performed on a user to improve validity and accuracy of authentication, as shown in fig. 4, fig. 4 is a flowchart of a preferred embodiment of performing authentication through the NFC device, user identity, and location in the present invention, and specifically includes:
a300, the NFC identity authentication device shoots a face image of a user, and whether the similarity between the shot face image and a received certificate photo reaches a preset threshold value is judged according to the comparison between the shot photo and the received certificate photo received by the national level identity authentication center;
and A400, if the user is authenticated, the NFC authentication device authenticates the user.
A410, if the identity of the user is not verified, the NFC identity verification device does not pass the identity verification of the user; and re-verifying the identity of the user.
After the NFC personal device is verified to be a legal device and the identity verification of the user is passed, the method further comprises the following steps:
and A420, passing identity authentication.
In an embodiment, when the NFC authentication device performs authentication and face recognition, it further performs authentication on a user by combining positioning, as shown in fig. 4, specifically including:
and A500, the NFC personal device receives a positioning starting instruction, and the positioning function of the NFC personal device is started. The positioning in the NFC personal device is in the form of Beidou, GPS, 5G base stations and the like.
A600, the NFC identity authentication device searches the geographic position of the NFC personal device in the communication area and judges whether the NFC personal device is in the communication area.
And A700, if so, the NFC authentication device passes the positioning authentication of the NFC personal device.
Specifically, the positioning verification of the NFC personal device is performed to ensure that the user is within the current NFC authentication device area, thereby improving the security of the authentication.
And A710, if not, the positioning verification of the NFC personal device by the NFC identity verification device is not passed.
After the NFC personal device is verified to be a legal device, and the identity verification of the user passes and the location verification passes, the method further includes:
and A800, passing identity authentication. It can be understood that, in order to improve the safety of the NFC personal device, after the positioning verification, the face recognition and the NFC personal device verification are all passed, the applications loaded in the NFC personal device may be opened, which includes: applications with payment functions such as payment treasures, WeChat, Bank APP, etc. and the location of the NFC personal device may be automatically turned off after these applications are taken out of service. Of course, the positioning of the NFC personal device can also be switched on manually/inductively and switched off manually/automatically.
The invention also provides an NFC-based authentication device, wherein the NFC-based authentication device is configured to perform the NFC-based authentication method as described above when being used; the NFC-based authentication device is the above-mentioned NFC authentication device, and executes the above-mentioned authentication method during authentication, as described above.
It can be understood that all devices capable of reading the NFC chip can be used as the NFC authentication device in the present invention, so that the flexibility and convenience of authentication are improved, and a common NFC authentication device may be as follows: security check machines, cash registers, and the like.
The present invention also provides a system, as shown in fig. 5, wherein a memory 20 is included, and one or more programs are included, wherein the one or more programs are stored in the memory 20 and configured to be executed by the one or more processors 10 include a method for performing the NFC-based identity authorization method as described above, and an NFC-based identity authentication method as described above.
In summary, the NFC-based identity authorization and identity verification method, apparatus and system disclosed in the present invention include: the NFC identity authorization device with the authorization of the national level identity authentication center receives a login verification instruction and performs login verification on a holder; after the user logs in successfully, a service transaction interface of the NFC identity authorization device is opened, and the transacted service comprises identity authorization; when the NFC identity authorization device receives an identity authorization instruction, whether identity authorization can be carried out on the NFC personal device used as the identity identification is judged; if the NFC personal identity authorization device can be connected with the national level identity authentication center once to acquire the recorded personal identity information of the user, and the acquired personal identity information is written into an NFC chip of the NFC personal device. According to the invention, the NFC personal device is used as the identity card by performing identity authorization on the NFC personal device, so that the identity authentication of a user is facilitated, and the convenience of identity authorization is also improved; when the NFC personal device is made into intelligent wearable equipment, the daily requirements of a user can be met conveniently, and the NFC personal device is not easy to lose or break; when the NFC personal device subjected to identity authorization is used for identity authentication, the equipment which can read the NFC chip can be used for identity authentication of the user, and therefore the flexibility of identity authentication is improved.
It is to be understood that the invention is not limited to the examples described above, but that modifications and variations may be effected thereto by those of ordinary skill in the art in light of the foregoing description, and that all such modifications and variations are intended to be within the scope of the invention as defined by the appended claims.

Claims (10)

1. An identity authorization method based on NFC, characterized by comprising:
the NFC identity authorization device with the authorization of the national level identity authentication center performs login verification on the user;
after the user logs in successfully, a service transaction interface of the NFC identity authorization device is opened, and the transacted service comprises identity authorization;
when the NFC identity authorization device receives an identity authorization instruction, whether identity authorization can be carried out on the NFC personal device used as the identity identification is judged;
if the NFC personal identity authorization device can be connected with the national level identity authentication center once to acquire the recorded personal identity information of the user, and the acquired personal identity information is written into an NFC chip of the NFC personal device.
2. The NFC-based identity authorization method according to claim 1, wherein when the NFC identity authorization device receives the identity authorization instruction, it is determined whether the NFC personal device used as the identity can be authorized, and then the method further comprises:
if the NFC identity authorization device cannot perform identity authorization on the NFC personal device, judging whether an NFC device with authorized identity exists;
if the NFC identity authorization device exists, the NFC identity authorization device prompts to remove authorization;
when the NFC identity authorization device receives an authorization removing instruction, the NFC identity authorization device is automatically connected with a national level identity authentication center to search information of an authorized NFC device owned by a user, and identity authorization of the authorized NFC device is removed.
3. The NFC-based identity authorization method according to claim 1, wherein the manner of the NFC identity authorization device performing login authentication on the user at least includes: fingerprint verification, face recognition, identity card verification, personal voiceprint verification, algorithm decoding and authorized NFC device verification.
4. The NFC-based identity authorization method according to claim 1, characterized in that when the user logs in successfully, a service transaction interface of the NFC identity authorization device is opened, and the transacted service further includes a loss report;
when the NFC identity authorization device receives the loss report instruction, the NFC identity authorization device is automatically connected to a national level identity authentication center to search information of the authorized NFC device, and identity authorization of the authorized NFC device is frozen.
5. The NFC-based identity authorization method according to claim 1, wherein the NFC personal device is a smart wearable device.
6. NFC-based identity authorization means, characterized in that the NFC-based identity authorization means, when used, is adapted to perform the NFC-based identity authorization method according to any of claims 1-5.
7. The identity authentication method based on NFC is characterized by comprising the following steps:
the NFC identity verification device induces an NFC personal device with authorized identity, personal identity information in an NFC chip is obtained, authentication data corresponding to the obtained personal identity information is applied to a national level identity authentication center according to the obtained personal identity information, and the authentication data comprises: name, ID card number and certificate photo;
the NFC identity authentication device shoots a face image of a user and judges whether the similarity between the shot face image and a certificate photo in authentication data reaches a preset threshold value or not;
if the unique authentication data corresponding to the personal identity information exists in an identity database of the national level identity authentication center, the NFC identity verification device judges that the NFC personal device is a legal terminal; meanwhile, the similarity between the face image shot by the NFC authentication device and the certificate picture in the personal identity information reaches a preset threshold value, and the NFC authentication device passes the authentication of the user.
8. The NFC-based authentication method of claim 7, wherein the authenticating of the NFC personal device on the NFC authentication device is preceded by:
receiving a positioning starting instruction by an NFC personal device, and starting a positioning function of the NFC personal device;
the NFC identity authentication device searches the geographic position of the NFC personal device in the communication area and judges whether the NFC personal device is in the communication area;
and when the NFC personal device and the NFC authentication device are in the same communication area, the NFC authentication device passes the positioning authentication of the NFC personal device.
9. NFC-based authentication means, characterized in that said NFC-based authentication means, when used, is adapted to perform the NFC-based authentication method according to claim 7 or 8.
10. A system comprising a memory, and one or more programs, wherein the one or more programs are stored in the memory and configured to be executed by the one or more processors include instructions for performing the NFC-based identity authorization method of any one of claims 1-5 and the NFC-based identity verification method of claim 7 or 8.
CN202010287351.0A 2020-04-13 2020-04-13 NFC-based identity authorization and authentication method, device and system Active CN111491295B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010287351.0A CN111491295B (en) 2020-04-13 2020-04-13 NFC-based identity authorization and authentication method, device and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010287351.0A CN111491295B (en) 2020-04-13 2020-04-13 NFC-based identity authorization and authentication method, device and system

Publications (2)

Publication Number Publication Date
CN111491295A true CN111491295A (en) 2020-08-04
CN111491295B CN111491295B (en) 2024-02-27

Family

ID=71811765

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010287351.0A Active CN111491295B (en) 2020-04-13 2020-04-13 NFC-based identity authorization and authentication method, device and system

Country Status (1)

Country Link
CN (1) CN111491295B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102271041A (en) * 2011-07-30 2011-12-07 任明和 Root service system for personal identity authentication
WO2017084013A1 (en) * 2015-11-16 2017-05-26 华为技术有限公司 Transaction authentication method, device, mobile terminal, pos terminal and server
CN107070945A (en) * 2013-06-19 2017-08-18 华为技术有限公司 Identity logs method and apparatus
WO2018113437A1 (en) * 2016-12-21 2018-06-28 杨宪国 Authentication device-based electronic identity card authentication service system
CN108765778A (en) * 2018-05-29 2018-11-06 禾麦科技开发(深圳)有限公司 A kind of information processing method and its equipment, storage medium, electronic equipment

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102271041A (en) * 2011-07-30 2011-12-07 任明和 Root service system for personal identity authentication
CN107070945A (en) * 2013-06-19 2017-08-18 华为技术有限公司 Identity logs method and apparatus
WO2017084013A1 (en) * 2015-11-16 2017-05-26 华为技术有限公司 Transaction authentication method, device, mobile terminal, pos terminal and server
WO2018113437A1 (en) * 2016-12-21 2018-06-28 杨宪国 Authentication device-based electronic identity card authentication service system
CN108765778A (en) * 2018-05-29 2018-11-06 禾麦科技开发(深圳)有限公司 A kind of information processing method and its equipment, storage medium, electronic equipment

Also Published As

Publication number Publication date
CN111491295B (en) 2024-02-27

Similar Documents

Publication Publication Date Title
US20190325439A1 (en) Systems and methods for verifying identities in transactions
US20210089635A1 (en) Biometric identity verification and protection software solution
US20060282395A1 (en) Methods for using a mobile communications device in consumer, medical and law enforcement transactions
US20030005310A1 (en) User verification system, and portable electronic device with user verification function utilizing biometric information
US11496471B2 (en) Mobile enrollment using a known biometric
CN106101135A (en) A kind of account login system based on face and fingerprint recognition and its implementation
CN103699995A (en) Payment authentication method based on fingerprints and finger veins
US9466060B1 (en) System and method for validating identity for international use of an electronic payment card
US20150120543A1 (en) EyeWatch ATM and Wire Transfer Fraud Prevention System
CN109522694A (en) A kind of identification system based on computer network
CN112334896B (en) Unlocking method and equipment of terminal equipment and storage medium
JP2011502320A (en) Credit card security system
CN111491295A (en) NFC-based identity authorization and identity verification method, device and system
US20190007400A1 (en) Method for authentication via a combination of biometric parameters
AU2021101726A4 (en) A Novel Approach to Make Active and Inactive Entire Device’s Screen for Fingers with Fingerprint Authentication
US20150100493A1 (en) EyeWatch credit card fraud prevention system
Armington et al. Biometric authentication in infrastructure security
EP4362520A1 (en) Methods for recovering a device, app and system including the device
US20240135012A1 (en) Methods for recovering a device, app and system including the device
JP2002207948A (en) Method, device, and system for settlement processing by biological authentication
CN113421367A (en) Access control device passing method, terminal, electronic device and storage medium
TR2023015412A2 (en) AN AUTHENTICATION SYSTEM AND METHOD
CN116362741A (en) Digital wallet payment device
KR20060124206A (en) Method and system for authenticating user
CN113256856A (en) Intelligent access control system and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant