
The NFC certificate that can store electronic photos adopts non-contact CPU card technology compatible with NFC standards, which has high security and convenient use. The personal information of the certificate holder, such as photos and identity information, is stored in the chip of this NFC certificate and written into the issuance system of the management office. Security personnel use smartphones (any commercially available smartphone with NFC function) to read personal information data (including clear photos) in identification documents and display them on the smartphone for real-time verification of the identity of the incoming and outgoing personnel.
NFC certificates using non-contact CPU card technology have the advantages of large information content, high anti-counterfeiting security, offline operation, and multifunctional development. The CPU card adopts a powerful and stable security controller, enhancing the security of the card. The non-contact CPU card uses wireless transmission to obtain energy and data signals through radio frequency, which can meet the requirements of fast transactions (such as the rapid passage of public transportation). The CPU card adopts various chip level anti attack measures and is basically unforgeable; CPU cards can perform encryption and decryption operations internally, and their unique internal and external authentication mechanisms, as well as specialized authentication mechanisms represented by financial IC card standards, can fully ensure the legality of transactions; During the authentication and transaction process, the CPU key will not be leaked to the outside of the card. Each time, it is encrypted with a random number, and the participation of the random number ensures that the content transmitted each time is different, ensuring the security of the transaction. The keys used in the authentication and transaction process are generated in a secure card issuing environment and installed ciphertext into the SAM card and user card, and the keys are not exposed throughout the entire process. The application firewall function of CPU cards can ensure the security independence of different applications on the same card. The financial industry with high security requirements uses CPU cards as the standard for the next generation of bank cards. The use of non-contact CPU cards can prevent card forgery, terminal forgery, and transaction forgery, ultimately ensuring the security of the system.
This NFC certificate can be combined with NFC certification system and NFC verification system to achieve efficient and low-cost personnel access control mechanism.
NFC certification system
The certification system is placed in the management department and consists of certification software and NFC readers. This certification software runs on the Windows system of a PC and has the characteristics of clear and concise interface, and easy to use. Before issuing the certificate, users need to prepare for the entry of the information of the certificate holder. After the information of the certificate holder and the validity period of the certificate are entered and organized, they can connect an NFC reader in the certificate issuance software and start the certificate issuance operation. According to the prompts on the screen and buzzer sound, they can place blank certificates one by one into the reader, and the NFC reader will automatically write personal information into the corresponding NFC certificate one by one.
NFC verification system
The verification system is held by the security personnel at the entrance and is an Android phone equipped with a verification APP program and NFC function (any commercially available Android smartphone with NFC function is acceptable). After unlocking the screen, security personnel only need to place the entry and exit documents of the certified personnel on the back of the phone and hold them for about 2 seconds. The security information stored inside the documents, such as photos, text information, and the validity period of the documents, will be displayed on the phone screen. After the expiration date information stored in the card is read out by the NFC mobile app, it automatically determines whether the document has expired. If it has expired, security personnel will be given a clear prompt to refuse or retrieve the document. If within the validity period, security personnel will compare the personal information and photos displayed on the screen with the certificate holder on site to determine whether they are themselves.
This NFC certificate has the following advantages:
1、 安全性高;
Adopting the latest contactless CPU card technology used in bank cards and social security cards, it has high security and is extremely difficult to crack;
NFC based offline verification does not require a server backend, so there is no need to worry about the server being attacked by criminals;
2. Good reliability and low deployment cost:
Offline verification does not require a server backend, so there is no need to worry about system shutdown due to unstable network conditions or server software and hardware failures;
No dedicated handheld device is required, but the verification app can be installed directly on a commercially available NFC Android smartphone.
This NFC certificate is particularly suitable for the following customers:
When large enterprise owners with branches or factories in multiple locations need to frequently visit these dispersed areas with many external personnel who have business dealings, the owner units can improve management efficiency and ensure high security by using this system to centrally handle entry and exit documents.
