Welcome Customer !

Membership

Help

Wuhan Shenrui Intelligent Technology Co., Ltd
Custom manufacturer

Main Products:

ybzhan>Products

Smartphone offline verification with built-in electronic photo NFC identification system for identity recognition

NegotiableUpdate on 04/12
Model
Nature of the Manufacturer
Producers
Product Category
Place of Origin
Overview
This system is an identity recognition system that uses smartphones to offline verify built-in electronic photo NFC credentials
Product Details

This system is an identity recognition system that uses smartphones to offline verify built-in electronic photo NFC credentials.



The identity recognition system mainly consists of the following three parts:
NFC identification
NFC certification system
NFC verification system

Each section is described in detail as follows:

1、 NFC identification
NFC identification adopts contactless CPU card technology that complies with NFC standards, which has both high security and convenient use. The personal information of the certificate holder, such as photos and identity information, is stored in the chip of this NFC certificate and written into the issuance system of the management office. Security personnel use smartphones (any commercially available smartphone with NFC function) to read personal information data (including clear photos) in identification documents and display them on the smartphone for real-time verification of the identity of the incoming and outgoing personnel.
NFC certificates using non-contact CPU card technology have the advantages of large information content, high anti-counterfeiting security, offline operation, and multifunctional development. The CPU card adopts a powerful and stable security controller, enhancing the security of the card. The non-contact CPU card uses wireless transmission to obtain energy and data signals through radio frequency, which can meet the requirements of fast transactions (such as the rapid passage of public transportation). The CPU card adopts various chip level anti attack measures and is basically unforgeable; CPU cards can perform encryption and decryption operations internally, and their unique internal and external authentication mechanisms, as well as specialized authentication mechanisms represented by financial IC card standards, can fully ensure the legality of transactions; During the authentication and transaction process, the CPU key will not be leaked to the outside of the card. Each time, it is encrypted with a random number, and the participation of the random number ensures that the content transmitted each time is different, ensuring the security of the transaction. The keys used in the authentication and transaction process are generated in a secure card issuing environment and installed ciphertext into the SAM card and user card, and the keys are not exposed throughout the entire process. The application firewall function of CPU cards can ensure the security independence of different applications on the same card. The financial industry with high security requirements uses CPU cards as the standard for the next generation of bank cards. The use of non-contact CPU cards can prevent card forgery, terminal forgery, and transaction forgery, ultimately ensuring the security of the system.

2、 Certification system
The certification system of the management office consists of certification software and NFC readers. This certification software runs on the Windows system of a PC and has the characteristics of clear and concise interface, and easy to use. Before issuing the certificate, users need to prepare for the entry of the information of the certificate holder. After the information of the certificate holder and the validity period of the certificate are entered and organized, they can connect an NFC reader in the certificate issuance software and start the certificate issuance operation. According to the prompts on the screen and buzzer sound, they can place blank certificates one by one into the reader, and the NFC reader will automatically write personal information into the corresponding NFC certificate one by one.

3、 Verify the system
The verification system used by security personnel is an Android phone with NFC function installed with a verification APP program (any commercially available Android smartphone with NFC function is acceptable). After the security personnel open the APP, they only need to place the entry and exit documents of the certified personnel on the back of their mobile phones and hold them for about 2 seconds. The security information stored inside the documents, such as photos, text information, and the validity period of the documents, will be displayed on the phone screen. After the expiration date information stored in the card is read out by the NFC mobile app, it automatically determines whether the document has expired. If it has expired, security personnel will be given a clear prompt to refuse or retrieve the document. If within the validity period, security personnel will compare the personal information and photos displayed on the screen with the certificate holder on site to determine whether they are themselves.

This system has the following advantages:
1、 安全性高;
Adopting the latest contactless CPU card technology used in bank cards and social security cards, it has high security and is extremely difficult to crack;
NFC based offline verification does not require a server backend, so there is no need to worry about the server being attacked by criminals;
2. Good reliability and low deployment cost:
Offline verification does not require a server backend, so there is no need to worry about system shutdown due to unstable network conditions or server software and hardware failures;
No dedicated handheld device is required, but the verification app can be installed directly on a commercially available NFC Android smartphone.
3. Easy to learn and use;
The verification app on smartphones and the certification software on computers are both simple, easy to understand, and user-friendly. There is no requirement for the operator's quality.
4. High work efficiency
Offline verification does not require networking and can directly read information from the certificate card without the need for network verification or data transmission.

This system is particularly suitable for the following customers:
When large enterprise owners with branches or factories in multiple locations need to frequently visit these dispersed areas with many external personnel who have business dealings, the owner units can improve management efficiency and ensure high security by using this system to centrally handle entry and exit documents.