KR20160135864A - Management system and method for nfc tag - Google Patents

Management system and method for nfc tag Download PDF

Info

Publication number
KR20160135864A
KR20160135864A KR1020150059595A KR20150059595A KR20160135864A KR 20160135864 A KR20160135864 A KR 20160135864A KR 1020150059595 A KR1020150059595 A KR 1020150059595A KR 20150059595 A KR20150059595 A KR 20150059595A KR 20160135864 A KR20160135864 A KR 20160135864A
Authority
KR
South Korea
Prior art keywords
information
nfc
user
nfc tag
terminal
Prior art date
Application number
KR1020150059595A
Other languages
Korean (ko)
Inventor
오만석
Original Assignee
(주)엠에스벤터
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by (주)엠에스벤터 filed Critical (주)엠에스벤터
Priority to KR1020150059595A priority Critical patent/KR20160135864A/en
Publication of KR20160135864A publication Critical patent/KR20160135864A/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0032Apparatus for automatic testing and analysing marked record carriers, used for examinations of the multiple choice answer type
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/073Special arrangements for circuits, e.g. for protecting identification code in memory
    • G06K19/07309Means for preventing undesired reading or writing from or onto record carriers
    • G06K19/07318Means for preventing undesired reading or writing from or onto record carriers by hindering electromagnetic reading or writing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Computer Hardware Design (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Electromagnetism (AREA)
  • Accounting & Taxation (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Cash Registers Or Receiving Machines (AREA)

Abstract

The present invention relates to an NFC tag management system and to a method thereof. The present invention enables only a user, who normally performs an authentication process, to record and modify information to an NFC tag by using an NFC terminal. Accordingly, the present invention has an advantage of efficiently manage the NFC tag since malicious information is recorded in the NFC tag by unspecified majority or it prevents the information recorded in the NFC tag from being accidentally modified.

Description

Technical Field [0001] The present invention relates to an NFC tag management system,

The present invention relates to an NFC tag management apparatus, and more particularly, to an NFC tag management system and method for allowing only a user who has performed an authentication procedure to operate NFC tag information using an NFC terminal.

Recently, as NFC chipset (or modem) has been installed in smart phones and smartphones have been spreading explosively, various services using Near Feild Communication (NFC) technology, one of the RFID technologies, have been provided have. This is because, when an application capable of performing a specific service can be installed in an NFC tag, which is a medium that can be read by the NFC, the user can use the service by a simple operation.

As an example of the service, the NFC technology is applied to an order and payment system. For example, a franchisee that has a business relationship with the head office, such as a coffee shop or a fast food restaurant, can use the service by touching only the NFC tag attached to the table with his smartphone. That is, the URL is logged into the digital menu created by the mobile web using only the touch operation. Accordingly, the user can confirm the detailed information of the menus, and use the service to order and settle the menu.

However, NFC tags, which have the advantage of being able to read and write data, are also very vulnerable to information misuse and malicious tampering. If the information stored in the NFC tag is manipulatable by an unspecified number due to information mis-input and malicious manipulation, other incorrect information may be displayed instead of the correct information provided by the store at the NFC tag contact. Or may lead to access to a site or a site that slanders a particular person.

This is because the NFC tag can record and change information using an application as described above.

Korean Registered Patent No. 10-1281611 (2013. 05. 20. NF Information Tag Service System and Method)

It is therefore an object of the present invention to provide an NFC tag management system that enables only an authorized user to perform operations such as inputting and changing information in an NFC tag.

It is another object of the present invention to provide an NFC tag management system for limiting the operation range of information according to the authority (level) of a user using an NFC terminal.

According to an aspect of the present invention, there is provided an NFC tag management system comprising: at least one NFC terminal in which a user authentication process is performed when the NFC tag is located within a wireless communication range with an NFC tag; A server DB storing information for user authentication of the NFC terminal; And a server for receiving information stored in the server DB according to a user authentication request from the NFC terminal, performing a user authentication process, and transmitting the result to the NFC terminal; .

In an embodiment of the NFC tag management system according to the embodiment of the present invention, the NFC terminal includes: a first communication unit connected to a head office terminal or a POS terminal to transmit and receive data; An input unit for inputting information to be input to the NFC tag; An encryption unit encrypting the input information using a predetermined encryption key; A second communication unit for communicating with the NFC tag and reading the unique number of the NFC tag when the proximity touch with the NFC tag is detected and transmitting the encrypted information through the encryption unit to the NFC tag; An authentication unit for user authentication before accessing the NFC tag; And a control unit for controlling user authentication by the authentication unit and an information manipulation process of the NFC tag; .

In an embodiment of the NFC tag management system according to the embodiment of the present invention, the information stored in the server DB includes at least security information for user authentication for each user; And authorized level information enabling the information manipulation of the NFC tag; .

In an embodiment of the NFC tag management system according to an embodiment of the present invention, when the NFC terminal is located in a region capable of wireless communication with the NFC tag for a predetermined time or longer, Activate the authentication unit.

In one aspect of the NFC tag management system according to the embodiment of the present invention, the authentication unit includes a fingerprint recognition module for user fingerprint recognition.

One aspect of the NFC tag management method according to an embodiment of the present invention includes: an activation step of activating a user authentication procedure when it is determined that an NFC terminal is located within a region capable of communicating with an NFC tag for a predetermined time or longer; An information input step in which the NFC terminal receives user information for user authentication; An encryption step of the NFC terminal encrypting the input information; A first transmission step of the NFC terminal transmitting encrypted information to a server; An authentication step in which the server compares encrypted information with previously stored information to perform user authentication; A second transmission step of the server transmitting the user authentication result to the NFC terminal; And a message output step of outputting, by the NFC terminal, a message for determining whether to access the NFC terminal according to a user authentication result; .

In one embodiment of the NFC tag management method according to the embodiment of the present invention, in the activating step, the user authentication procedure is activated by displaying a menu for inputting user information on the screen.

In an embodiment of the NFC tag management method according to an embodiment of the present invention, in the authentication step, the server uses a unique number of the NFC terminal to identify a location of the NFC terminal, a user of a user engaged in a store / Information is searched first.

In one aspect of the NFC tag management method according to the embodiment of the present invention, in the authentication step, the server confirms a user level having different information operation rights for the NFC tag in the case of a normal authenticated user, In the second transmission step, the server transmits the identified user level to the NFC terminal, and in the message output step, the NFC terminal outputs the user-accessible access information based on the user level information.

In one aspect of the NFC tag management method according to the embodiment of the present invention, when the NFC terminal transmits the encrypted user information to the server in the first transmission step, the encrypted user information does not exist in the NFC terminal .

The NFC tag management system and its management method according to the present invention have the following effects.

The present invention constitutes an authentication unit for user authentication in an NFC terminal capable of recording a series of information in an NFC tag attached to a franchise store or an affiliated shop. Therefore, only a legitimate user can record / modify information in the NFC tag by using the NFC terminal. Therefore, it is possible to prevent information from being maliciously recorded in the NFC tag by an unspecified number, It is easy to identify the user to modify.

Further, according to the present invention, by setting different rights for each user, it is possible to efficiently manage the information recorded / modified in the NFC tag.

BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 is a block diagram of an entire NFC tag management system according to an embodiment of the present invention; FIG.
FIG. 2 is a detailed configuration diagram illustrating the NFC terminal of FIG. 1. FIG.
3 is a flow diagram illustrating a control procedure for accessing an NFC tag management system in accordance with an embodiment of the present invention.
FIG. 4 is a flowchart illustrating a process in which rights are set differently according to a user level according to an embodiment of the present invention. FIG.

It is a basic technical object of the present invention to allow an unspecified number of users to access an NFC tag and manipulate information by allowing only a user who normally performs an authentication procedure using an NFC terminal capable of user authentication to input and modify information in the NFC tag . In addition, according to the present invention, the right to input / modify NFC tags can be set differently according to the user level, thereby effectively managing NFC tags.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS Hereinafter, preferred embodiments of an NFC tag management apparatus and a management method thereof according to the present invention will be described in detail with reference to the accompanying drawings.

FIG. 1 is a block diagram of an entire NFC tag management system according to an embodiment of the present invention, and FIG. 2 is a detailed diagram illustrating an NFC terminal of FIG. 1. Referring to FIG.

Referring to FIG. 1, an NFC tag management system 1 includes a main office 10, a POS terminal 20, a server 30, at least one NFC terminal 100, and an NFC terminal 100 And at least one NFC tag 200 for storing input / modified information.

More specifically, the main office terminal 10 refers to a terminal located at a head office that manages a franchise affiliate store.

And the POS terminal 20 means a point-of-sale terminal provided to the franchisee. Practically, the POS terminal 20 is installed in a franchise shop, which is a merchandise / product store, and manages sales-related data.

The server 30 operates and manages the NFC tag management system 1 while being connected to the main office 10, the POS terminal 20 and the NFC terminal 100 via a network. Particularly, the server 30 transmits the information to the NFC tag 200 according to the approval process according to the user authentication request generated from the NFC terminal 100 in association with the server DB 40, and the previously stored user level information And an authority to input or modify the information stored in the NFC tag 200 is selectively performed.

Meanwhile, the server DB 40 stores store information and user information. Here, the store information may include a head office, a brand, an area, a merchant name, a table location, and the like. The user information may include personal information of a user (i.e., a head office employee, a store manager / a branch manager, an employee, etc.), user level information, , It means security information that can access the NFC tag management system 1. For example, the user fingerprint may be used as security information, but is not necessarily limited thereto. This will be described in more detail below.

Also, the server DB 40 can be set to a different level for each user as shown in [Table 1] below and stored.

List user position level One *** Headquarters staff Level 1 2 *** Manager Level 1 3 *** Boss Level 2 4
.
.
.
***
.
.
.
employee
.
.
.
Level 3
.
.
.

Here, the level can be said to be an amount of information that can be input and modified in the order of levels 1, 2, 3, 4, ... as a right that the user can input or modify in the NFC tag 200. Such a user-specific level may be determined by collaboration between the franchise head office and the merchant. For example, as shown in [Table 1], the headquarters staff and manager are set and stored at a level 1 capable of handling all the information recorded in the NFC tag 200, and the subordinates or employees are compared with the level 1 The amount of information that can be handled relatively is set at a level 2 or 3, etc. and can be stored.

The NFC terminal 100 is owned by a head office employee, a store manager, a sub shop manager, an employee, and the like, and is assigned a unique number by being divided into a region, a store, and an affiliate shop. The NFC terminal 100 inputs information to the NFC tag 200 in a non-contact state with the NFC tag 200 by short-range wireless communication with the NFC tag 200, Change stored information. To this end, the NFC terminal 100 may be provided with an application for inputting or changing information in the NFC tag 200. For example, the NFC terminal 100 may be defined as a portable terminal, such as a smart phone or a tablet PC, capable of wireless Internet or 3G / 4G communication and capable of executing the application for order confirmation and settlement .

On the other hand, the NFC terminal 100 determines whether the user who wants to access the NFC tag management system 1 is a legitimate user. In the present embodiment, the NFC terminal 100 authenticates the user by a fingerprint recognition method of recognizing the fingerprint of the user. Of course, the NFC terminal 100 may be configured to perform various kinds of security functions, such as biometric information and behavioral characteristics, such as face, iris, retina, fingerprint, A user may be authenticated using a biotechnology such as a property, or a user may be authenticated by combining two or more authentication methods.

The NFC terminal 100 accesses the server 30 to perform an authentication procedure, and encrypts and generates information using the unique number of the NFC tag 200. The configuration of the NFC terminal 100 will be described in detail below with reference to FIG.

The NFC tag 200 serves as a storage medium for storing information input by the NFC terminal 100 and modified information. Of course, since the NFC tag 200 is installed in a table such as a store / merchant, the NFC tag 200 stores information on the installed store and information for identifying the installed table.

2, the NFC terminal 100 includes a communication unit (or a first communication unit) 110 for communicating data with the main office 10 or the POS terminal 20, an NFC tag An encryption unit 130 for encrypting the input information using a predetermined encryption key, an encryption unit 130 for communicating with the NFC tag 200, A short range wireless communication module (or a second communication unit) 140 for reading the unique number of the NFC tag 200 when the touch is sensed and writing the information encrypted by the encryption unit 130 to the NFC tag 200, An authentication unit 150 for authenticating the user, and a control unit 160 for controlling the operation of the NFC terminal 100 as a whole.

More specifically, as the input unit 120, at least one of input means such as a keyboard, a mouse, and a touch screen may be used. The encryption unit 130 also encrypts not only the information to be input to the NFC tag 200 but also, in particular, personal information, that is, fingerprint information, among the user information input to the NFC terminal 100 upon user authentication request. The authentication unit 150 may be implemented as a physical medium in the NFC terminal 100 as a fingerprint recognition module or may be implemented using a touch screen. In particular, when the authentication unit 150 is implemented with a touch screen, an application for fingerprint recognition should be installed in the NFC terminal 100.

The controller 160 controls the communication with the main office 10, the POS terminal 20 and the NFC tag 200 and the user authentication and the input / And controls operations of the communication unit 110, the input unit 120, the encryption unit 130, the short-range wireless communication module 140, and the authentication unit 150. For example, as the controller 160, a central processing unit (CPU) provided in the NFC terminal 100 may be used.

Meanwhile, in the present embodiment, if the NFC terminal 100 maintains a state of non-contact with the NFC tag 200 for a predetermined time or more, the authentication module 150 can be activated automatically. Therefore, the user authentication procedure can be started in the NFC terminal 100 without any additional user operation. More specifically, when the NFC terminal 100 is located within a short range wireless communication range with the NFC tag 200, the controller 160 accesses the NFC tag 200 using the NFC terminal 100 And activates the authentication module 150 so that the user authentication procedure is performed automatically. Of course, if a signal for a separate authentication request is input or an installed authentication request program operates, the authentication module 150 may be activated by the controller 160. [

In addition, the NFC terminal 100 may output a result of the user level in the user authentication request through the authentication unit 150 and the user level. Examples of result information are "User (***) is verified", "User (***) is level 2. No more access 'or' User (***) is level 3. The information of the next step can not be confirmed or information input / correction is not possible. " That is, the NFC terminal 100 can display the accessibility of the NFC terminal 100 according to whether the user has access to the system and the user level, or output the voice output.

Hereinafter, a process of accessing the NFC tag management system of the present invention will be described with reference to the accompanying drawings.

3 is a flowchart illustrating a process of accessing an NFC tag management system according to an embodiment of the present invention.

3, when an NFC tag management system 1 is operated (S100), an arbitrary user may input information in the NFC tag 200 or modify the inputted information (S102) .

In such a case, the NFC terminal 100 owned by the user is located near the NFC tag 200 (S104). At this time, the user must locate the NFC terminal 100 within the short range wireless communication range with the NFC tag 200. When the NFC terminal 100 is located in the short range wireless communication range with the NFC tag 200, the controller 160 recognizes that the user accesses the NFC tag 200 through the NFC terminal 100 , And performs a user authentication procedure.

More specifically, the control unit 160 activates the authentication module 150 in a state where the NFC terminal 100 is located within the short-range wireless communication range with the NFC tag 200 (S106). When the authentication module 150 is substantially activated, for example, the controller 160 displays a guidance message on the screen to guide the user to scan the fingerprint.

Next, when the user fingerprint is scanned through the authentication module 150 in step S108, the controller 160 encrypts the fingerprint scanned through the encryption unit 130 in step S110. The control unit 160 transmits the encrypted fingerprint data to the server 30 through the main office 10 or the POS terminal 20 or directly to the server 30 at step S112. At this time, the encrypted fingerprint data exists only as the scanned data, and is not separately stored in the NFC terminal 100. [ Therefore, after the encrypted fingerprint data is transferred from the NFC terminal 100 to the server 30, the encrypted fingerprint data no longer exists in the NFC terminal 100.

Meanwhile, the server 30 accesses the server DB 40 and compares fingerprint data received from the NFC terminal 100 (S114). The process of comparing the fingerprint data with the server 30 may include checking the entire fingerprint data of the fingerprint data received from the NFC terminal 100 to determine whether the fingerprint data is stored in the server DB 40 The fingerprint data stored in the server DB 40 is firstly searched for by using the unique number of the NFC terminal 100 that is transmitted together with the fingerprint data or when transmitting the fingerprint data to the predetermined region or the store / There is a way. For example, in the case of a head office employee who manages a plurality of regions or stores / merchants, the fingerprint data is compared by a method of searching the entire area, and a manager or an employee engaged in a predetermined area or a store / The fingerprint data can be compared with each other.

Meanwhile, the server 30 transmits the comparison result of the fingerprint data to the NFC terminal 100 (S116). At this time, the comparison result can be classified into two types of 'user normal authentication' and 'user authentication failure'. If the same fingerprint data as the fingerprint data transmitted from the NFC terminal 200 is stored in the server DB 40 as a result of the comparison of the fingerprint data, the server 30 transmits a message " (S118). Accordingly, the controller 160 can perform the next step (step S119) to input / modify the information in the NFC tag 100. At this time, the user inputs / modifies information to / from the NFC tag 200 by directly operating the input unit 120 while confirming the input / modification menu displayed on the screen of the NFC terminal 100 ≪ / RTI >

However, if fingerprint data identical to the fingerprint data transmitted from the NFC terminal 200 is not stored in the server DB 40 as a result of the comparison of the fingerprint data, the server 30 transmits a message " To the NFC terminal (100), and the NFC terminal (100) outputs the received message. Therefore, information input / modification to the NFC tag 200 through the NFC terminal 100 is disabled (S120).

As described above, according to the present invention, by adding a configuration for user authentication to the NFC terminal 100 capable of communicating with the NFC tag 200, an unspecified number can be transmitted to the NFC tag 200 installed in the store / The user is prevented from inputting / correcting in advance. Therefore, in the present invention, when information is stored in the NFC tag 200 owing to mis-input of information, the input of the information is confirmed, or the NFC tag 200 is maliciously identified by an unspecified number of inside / Information can be prevented from being input / corrected. Particularly, according to the present invention, when the NFC terminal 100 is positioned within a short range wireless communication range with the NFC tag 200 for a predetermined time period without performing any switch operation, a process for user authentication is automatically performed, It is possible to input / modify information to the tag 100. [ Also, in the present invention, the NFC terminal 100 can securely protect the NFC tag management system 1 even if the NFC terminal 100 is lost because private information is not stored in the NFC terminal 100 during user authentication.

3, information to be input to the NFC tag 200 is input after the user authentication is completed. On the contrary, the information to be input to the NFC tag 200 is stored in advance (the stored information is encrypted information The user authentication process may be started when a proximity touch with the NFC tag 200 is detected.

Hereinafter, a process of setting a level according to a user level in the NFC tag management system of the present invention will be described with reference to the accompanying drawings.

FIG. 4 is a flowchart illustrating a process of assigning rights according to a user level according to an embodiment of the present invention.

Referring to FIG. 4, when the user requests a process for logging in, the NFC terminal 100 performs the user authentication process as described above (S200). Then, the server 30 confirms the authority granted by the user according to the user authentication information transmitted from the NFC terminal 100 (S202). That is, the server 30 confirms the level of the user of the fingerprint information coinciding with the user fingerprint information transmitted from the NFC terminal 100.

Next, the server 30 transmits the confirmed user level information to the NFC terminal 100 (S204). Then, the NFC terminal 100 displays the access information that the user can handle based on the user level information transmitted from the server 30 (S206). For example, in the NFC terminal 100, 'user (***) is level 1. Please enter your information! ' Or 'User (***) is level 3. There are no actions available in the current step 'or' User (***) is level 3. You will be able to display a message such as 'Only the next menu displayed is accessible'.

When the user inputs the access information displayed on the NFC terminal 100, that is, the accessable information, the NFC tag 200 can be selectively accessed to input and modify information (S208). In other words, in the present embodiment, the server 30 identifies a user when a user authentication request is made, grants authority for each user, and accordingly, the user processes information according to the granted authority.

As described above, the present invention provides that the information stored in the NFC tag can not be arbitrarily manipulated by using a series of terminals.

While the present invention has been particularly shown and described with reference to exemplary embodiments thereof, it is to be understood that the invention is not limited to the disclosed exemplary embodiments, It will be apparent that modifications, variations and equivalents of other embodiments are possible. Therefore, the true scope of the present invention should be determined by the technical idea of the appended claims.

30: Server 40: Server DB
100: NFC terminal 110:
120: input unit 130:
140: Local area wireless communication module 150: Authentication unit
160: Control section 200: NFC tag

Claims (10)

At least one NFC terminal in which a user authentication process is performed when the NFC tag is located within a wireless communication range with the NFC tag;
A server DB storing information for user authentication of the NFC terminal; And
A server for receiving information stored in the server DB in response to a user authentication request from the NFC terminal, performing a user authentication process, and transmitting the result to the NFC terminal; The NFC tag management system comprising:
The method according to claim 1,
The NFC terminal,
A first communication unit connected to the main office terminal or the POS terminal for transmitting and receiving data;
An input unit for inputting information to be input to the NFC tag;
An encryption unit encrypting the input information using a predetermined encryption key;
A second communication unit for communicating with the NFC tag and reading the unique number of the NFC tag when the proximity touch with the NFC tag is detected and transmitting the encrypted information through the encryption unit to the NFC tag;
An authentication unit for user authentication before accessing the NFC tag; And
A control unit for controlling user authentication by the authentication unit and an information manipulation process of the NFC tag; The NFC tag management system comprising:
3. The method of claim 2,
The information stored in the server DB
Security information for user authentication for each user; And
Authorized level information enabling the information manipulation of the NFC tag; The NFC tag management system comprising:
3. The method of claim 2,
Wherein the control unit activates the authentication unit so that a user authentication process is performed when the NFC terminal is located in a region capable of wireless communication with the NFC tag for a predetermined time or longer.
5. The method of claim 4,
Wherein the authentication unit includes a fingerprint recognition module for user fingerprint recognition.
An activation step of activating a user authentication procedure if it is determined that the NFC terminal is located within a predetermined time period in an area capable of communicating with the NFC tag;
An information input step in which the NFC terminal receives user information for user authentication;
An encryption step of the NFC terminal encrypting the input information;
A first transmission step of the NFC terminal transmitting encrypted information to a server;
An authentication step of causing the server to perform user authentication by comparing encrypted information with previously stored information;
A second transmission step of the server transmitting the user authentication result to the NFC terminal; And
A message output step of the NFC terminal outputting a message for determining whether to access the NFC terminal according to a user authentication result; The NFC tag management method comprising:
The method according to claim 6,
In the activating step,
Wherein the user authentication procedure is activated by displaying a menu for inputting user information on the screen.
The method according to claim 6,
In the authentication step,
Wherein the server searches the user information of a user who is engaged in the area where the NFC terminal is located or a store / merchant by using the unique number of the NFC terminal.
The method according to claim 6,
In the authentication step,
The server confirms a user level having different information operation rights for the NFC tag in the case of a normal authenticated user,
In the second transmission step,
The server transmits an identified user level to the NFC terminal,
In the message output step,
And the NFC terminal outputs the access information that the user can handle based on the user level information.
10. The method of claim 9,
In the first transmission step,
Wherein when the NFC terminal transmits the encrypted user information to the server, the encrypted user information does not exist in the NFC terminal.
KR1020150059595A 2015-04-28 2015-04-28 Management system and method for nfc tag KR20160135864A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
KR1020150059595A KR20160135864A (en) 2015-04-28 2015-04-28 Management system and method for nfc tag

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
KR1020150059595A KR20160135864A (en) 2015-04-28 2015-04-28 Management system and method for nfc tag

Publications (1)

Publication Number Publication Date
KR20160135864A true KR20160135864A (en) 2016-11-29

Family

ID=57706453

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1020150059595A KR20160135864A (en) 2015-04-28 2015-04-28 Management system and method for nfc tag

Country Status (1)

Country Link
KR (1) KR20160135864A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3859643A4 (en) * 2018-12-12 2022-01-05 China Unionpay Co., Ltd Data processing method implemented based on nfc tag, system and tag receiving terminal thereof
KR20230143001A (en) * 2022-04-04 2023-10-11 두산로보틱스 주식회사 Apparatus and method for authenticating a user of a robot using a mobile terminal

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3859643A4 (en) * 2018-12-12 2022-01-05 China Unionpay Co., Ltd Data processing method implemented based on nfc tag, system and tag receiving terminal thereof
KR20230143001A (en) * 2022-04-04 2023-10-11 두산로보틱스 주식회사 Apparatus and method for authenticating a user of a robot using a mobile terminal

Similar Documents

Publication Publication Date Title
US10171428B2 (en) Confidential data management method and device, and security authentication method and system
US20180268415A1 (en) Biometric information personal identity authenticating system and method using financial card information stored in mobile communication terminal
US9621562B2 (en) Propagating authentication between terminals
JP2021531567A (en) Systems and methods for dynamically generating URLs with smart cards
US11062050B2 (en) Devices, systems, and methods for securely storing and managing sensitive information
US10861006B1 (en) Systems and methods for data access control using a short-range transceiver
US9729545B2 (en) Method and apparatus for managing passcode
US20140101772A1 (en) Input method, input apparatus, and input program
JP2014235755A (en) Access control system
KR102071438B1 (en) Payment authentication method and apparatus of mobile terminal and mobile terminal
US20230388124A1 (en) Systems and methods for data access control of secure memory using a short-range transceiver
US10402586B2 (en) Patient privacy de-identification in firewall switches forming VLAN segregation
TW201544983A (en) Data communication method and system, client terminal and server
KR20160135864A (en) Management system and method for nfc tag
KR102156803B1 (en) Method for reverse autorization and electronic device thereof
KR102295480B1 (en) User authentication system and method for authenticating access to an industrial control system
KR101523485B1 (en) Unmanned guard system management method using mobile device
CN116783594A (en) System and method for authentication of access tokens
KR20230005212A (en) Systems and methods for peer-to-peer identity verification
US20240020413A1 (en) Devices, systems, and methods for securely storing and managing sensitive information
US11861028B2 (en) Devices, systems, and methods for securely storing and managing sensitive information
KR102408528B1 (en) User authentication method and device
US11971973B2 (en) Uilization control system, use permit issuance device, uilization control method, and computer-readable program
KR20240021850A (en) System and method for contactless card communication and key pair cryptographic authentication using distributed storage
KR20170091371A (en) Server for using biometric authentication and biometric authentication method using the same

Legal Events

Date Code Title Description
A201 Request for examination
E902 Notification of reason for refusal
AMND Amendment
E601 Decision to refuse application
AMND Amendment
J501 Disposition of invalidation of trial