JP2022532125A - 仮想現実世界の身元認証管理システム - Google Patents
仮想現実世界の身元認証管理システム Download PDFInfo
- Publication number
- JP2022532125A JP2022532125A JP2021566235A JP2021566235A JP2022532125A JP 2022532125 A JP2022532125 A JP 2022532125A JP 2021566235 A JP2021566235 A JP 2021566235A JP 2021566235 A JP2021566235 A JP 2021566235A JP 2022532125 A JP2022532125 A JP 2022532125A
- Authority
- JP
- Japan
- Prior art keywords
- virtual
- identity
- character
- information
- personal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000012795 verification Methods 0.000 title claims description 21
- 230000000694 effects Effects 0.000 claims description 9
- 230000032683 aging Effects 0.000 claims description 6
- 238000012790 confirmation Methods 0.000 claims description 6
- 238000000034 method Methods 0.000 description 11
- 238000010586 diagram Methods 0.000 description 8
- 125000002066 L-histidyl group Chemical group [H]N1C([H])=NC(C([H])([H])[C@](C(=O)[*])([H])N([H])[H])=C1[H] 0.000 description 3
- 241001465754 Metazoa Species 0.000 description 3
- 206010034719 Personality change Diseases 0.000 description 1
- 238000002316 cosmetic surgery Methods 0.000 description 1
- 238000001914 filtration Methods 0.000 description 1
- 230000001939 inductive effect Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 235000019640 taste Nutrition 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T13/00—Animation
- G06T13/20—3D [Three Dimensional] animation
- G06T13/40—3D [Three Dimensional] animation of characters, e.g. humans, animals or virtual beings
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T19/00—Manipulating 3D models or images for computer graphics
- G06T19/003—Navigation within 3D models or images
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
- H04L9/3273—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response for mutual authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2117—User registration
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Radar, Positioning & Navigation (AREA)
- Remote Sensing (AREA)
- Computer Graphics (AREA)
- Processing Or Creating Images (AREA)
- Collating Specific Patterns (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Description
Claims (8)
- 個人身元情報と事物情報のうち少なくとも一つの保護対象情報、および保護対象の写真イメージ情報の提供を受けて仮想現実世界で使われる保護対象の身元情報の登録を申請する仮想身元登録申請部;
前記写真イメージ情報に対する類似度範囲を設定し、設定された類似度範囲によって少なくとも一つの仮想キャラクターを生成する仮想身元キャラクター生成部;および
前記個人身元情報に基づいた本人認証および前記仮想キャラクターと予め登録された仮想身分証明書に含まれた他の仮想キャラクター間の類似度チェックを遂行して、前記本人認証および前記類似度チェックが正常に処理されると、ブロックチェーンを利用して前記個人身元情報公開および保護のための公開キーと個人キーをそれぞれ付与し、前記仮想キャラクターとともに前記仮想身元情報をデータベースに登録し、仮想身分証明書を発行する仮想身元認証登録部を含む
ことを特徴とする仮想現実世界の身元認証管理システム。 - 前記仮想キャラクターなしに前記仮想身元登録申請部を通じての仮想身元情報の登録申請時、該当登録申請日で前記仮想身分証明書の発行日を先占し、今後前記仮想キャラクターを生成して類似度チェックを遂行する時、前記登録申請日前に登録された仮想キャラクターを類似度比較対象として選別して類似度チェックを遂行するように、前記仮想身元認証登録部と連動する仮想身元事前予約登録部をさらに含む
請求項1に記載の仮想現実世界の身元認証管理システム。 - 前記仮想身元キャラクター生成部は、
前記写真イメージ情報に対する類似度範囲を設定する類似度範囲設定部;
前記類似度範囲設定部を通じて設定された類似度範囲によって前記写真イメージ情報を3次元モデリングして前記仮想キャラクターの草案データを生成する3次元キャラクターモデリング部;および
前記草案データに対する3次元デザイン編集を遂行して、前記仮想キャラクターを生成する3次元キャラクター編集部を含む
請求項1に記載の仮想現実世界の身元認証管理システム。 - 前記仮想身元認証登録部は、
前記個人身元情報に基づいた本人認証を遂行する本人認証遂行部;
前記仮想キャラクターと予め登録された仮想身分証明書に含まれた他の仮想キャラクター間の類似度チェックを遂行する仮想キャラクター類似度チェック遂行部;
前記本人認証と前記類似度チェックが正常に処理されると、前記個人身元情報のうち仮想現実世界内で公開される情報を互いに確認するための公開キーと、前記個人身元情報のうち仮想現実世界内で非公開される情報の保護のための個人キーを含む暗号化コードをそれぞれ付与する暗号化コード生成部;
前記個人身元情報、前記仮想キャラクターおよび前記暗号化コードを含む前記仮想身元情報をデータベースに登録する仮想身元情報登録部;および
前記仮想身元情報が登録された者に前記仮想身分証明書を発行する仮想身分証明書発行部を含む
請求項1に記載の仮想現実世界の身元認証管理システム。 - 前記仮想現実世界の身元認証管理システムは、
仮想現実世界内で前記仮想身分証明書を前記仮想キャラクターとともに表示するものの、前記仮想身分証明書に表示される前記公開キーの入力を受けて前記仮想身分証明書に含まれた個人身元情報のうち公開された情報のみを他の仮想キャラクターを通じて確認可能なように表示し、前記個人キーの入力を受けて前記個人身元情報のうち非公開された情報を表示する個人身元情報表示確認部をさらに含む
請求項4に記載の仮想現実世界の身元認証管理システム。 - 会員要請により前記仮想身元キャラクター生成部を通じて予め設定された類似度範囲値以下の仮想匿名キャラクターを生成した後、前記個人身元情報に基づいた本人認証が正常に処理されると、前記仮想匿名キャラクターとともに仮想現実世界内で公開される情報のうち一部の情報のみを互いに確認するための公開キーを付与したり該当公開キーを付与していない状態で仮想匿名身元情報をデータベースに登録して仮想匿名身分証明書を発行する仮想匿名身元開設部をさらに含む
請求項1に記載の仮想現実世界の身元認証管理システム。 - 仮想現実世界内で前記仮想キャラクターの活動および前記仮想キャラクターが位置した場所に対して、予め設定されたカテゴリーによって予め設定された類似度範囲を有する仮想キャラクターに変更して表示する第1仮想キャラクター変更部をさらに含む
請求項1に記載の仮想現実世界の身元認証管理システム。 - 仮想現実世界での時間の流れにしたがって前記仮想キャラクターの老化値を予測し、予測された老化値を仮想キャラクターに適用して変更表示する第2仮想キャラクター変更部をさらに含む
請求項1に記載の仮想現実世界の身元認証管理システム。
Applications Claiming Priority (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR10-2019-0053183 | 2019-05-07 | ||
KR20190053183 | 2019-05-07 | ||
KR10-2019-0059675 | 2019-05-21 | ||
KR1020190059675A KR102044008B1 (ko) | 2019-05-07 | 2019-05-21 | 가상 현실 세계의 신원 인증 관리 시스템 |
PCT/KR2019/015288 WO2020226247A1 (ko) | 2019-05-07 | 2019-11-11 | 가상 현실 세계의 신원 인증 관리 시스템 |
Publications (2)
Publication Number | Publication Date |
---|---|
JP2022532125A true JP2022532125A (ja) | 2022-07-13 |
JP7359872B2 JP7359872B2 (ja) | 2023-10-11 |
Family
ID=68577346
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2021566235A Active JP7359872B2 (ja) | 2019-05-07 | 2019-11-11 | 仮想現実世界の身元認証管理システム |
Country Status (6)
Country | Link |
---|---|
US (1) | US20220207116A1 (ja) |
EP (1) | EP3968190A4 (ja) |
JP (1) | JP7359872B2 (ja) |
KR (1) | KR102044008B1 (ja) |
CN (1) | CN113906420A (ja) |
WO (1) | WO2020226247A1 (ja) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP7321622B1 (ja) * | 2023-03-31 | 2023-08-07 | 株式会社Vrc | 情報処理装置、情報処理方法、及びサービス提供方法 |
WO2024048734A1 (ja) * | 2022-08-31 | 2024-03-07 | Toppanホールディングス株式会社 | アバター管理システム、アバター管理方法、及びプログラム |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11537701B2 (en) * | 2020-04-01 | 2022-12-27 | Toyota Motor North America, Inc. | Transport related n-factor authentication |
CN111476667B (zh) * | 2020-06-24 | 2021-01-12 | 支付宝(杭州)信息技术有限公司 | 基于区块链的原创作品交易方法及装置和电子设备 |
CN112100682B (zh) * | 2020-11-23 | 2021-02-19 | 北京软通智慧城市科技有限公司 | 身份信息保护系统和方法 |
KR102470261B1 (ko) | 2021-03-05 | 2022-11-25 | 논스랩 주식회사 | 휴대폰 사진의 gps 위치 데이터를 이용한 개인키 생성 및 복구 방법 및 이를 이용한 시스템 |
CN113676495B (zh) * | 2021-10-21 | 2022-03-11 | 深圳鼎信通达股份有限公司 | 设备注册方法、服务器及存储介质 |
CN114285674B (zh) * | 2022-03-07 | 2022-05-17 | 湖南兆物信链科技集团有限公司 | 一种元宇宙超入口的数字认证系统 |
KR20230170999A (ko) | 2022-06-12 | 2023-12-19 | 민경권 | 가상세계의 아바타정보와 현실세계의 개인정보가 동치적으로 상호연동하는 가상세계서비스 시스템 및 방법 |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002259318A (ja) * | 2001-02-27 | 2002-09-13 | Victor Co Of Japan Ltd | 仮想現実空間での人物画像表示方法 |
JP2005228185A (ja) * | 2004-02-16 | 2005-08-25 | E4C-Link Corp | キャラクター提供システム |
JP2005277555A (ja) * | 2004-03-23 | 2005-10-06 | Oki Electric Ind Co Ltd | 通信サービスシステムおよびコンテンツ選択方法 |
JP2010510587A (ja) * | 2006-11-15 | 2010-04-02 | アイアム・エンタープライジーズ | 3次元モデルを創作し、製造し、流通させる方法 |
JP2019057271A (ja) * | 2016-03-28 | 2019-04-11 | ブラック ゴールド コイン インコーポレイテッドBlack Gold Coin, Inc. | ブロックチェーン式多要素個人身元認証を実現するシステム及び方法 |
Family Cites Families (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20000049906A (ko) | 2000-05-04 | 2000-08-05 | 김성호 | 사이버 공간에서 실질적인 사용자에 대응하는 가상인간생성 방법 및 그 시스템 |
KR20010110586A (ko) | 2000-06-07 | 2001-12-13 | 정성훈 | 사용자의 이미지 데이터 업로드를 통한 인터넷 사이트등록 방법 |
JP2002008062A (ja) * | 2000-06-19 | 2002-01-11 | Kimio Kawai | アバターの登録方法及び登録システム |
US20070100705A1 (en) * | 2005-11-02 | 2007-05-03 | Royal Planet Co., Ltd. | Virtual reality shopping system |
KR100963827B1 (ko) * | 2008-02-13 | 2010-06-16 | 홍성관 | 인증 기반 가상객체를 이용한 가상현실 구현 방법 및 그장치 |
WO2009123411A1 (en) * | 2008-03-31 | 2009-10-08 | Electronics And Telecommunications Research Institute | User terminal with identity selector and method for identity authentication using identity selector of the same |
JP4808238B2 (ja) * | 2008-08-11 | 2011-11-02 | ヤフー株式会社 | 人物とアバターとの類似度を判定する装置、方法及びプログラム |
US8406428B2 (en) | 2008-12-11 | 2013-03-26 | International Business Machines Corporation | Secure method and apparatus to verify personal identity over a network |
KR20120106367A (ko) * | 2011-03-18 | 2012-09-26 | 주식회사 프리진 | 개방형 가상세계 간 통합 식별 체계 지원 시스템 및 그 방법 |
US8893258B2 (en) * | 2012-06-11 | 2014-11-18 | Cisco Technology, Inc. | System and method for identity based authentication in a distributed virtual switch network environment |
KR102008864B1 (ko) * | 2012-09-03 | 2019-10-21 | 에스케이플래닛 주식회사 | 캐릭터 연동 방법, 이를 위한 장치, 이를 위한 단말기 및 이를 위한 시스템 |
US9027087B2 (en) * | 2013-03-14 | 2015-05-05 | Rackspace Us, Inc. | Method and system for identity-based authentication of virtual machines |
WO2015153878A1 (en) * | 2014-04-02 | 2015-10-08 | Massachusetts Institute Of Technology | Modeling social identity in digital media with dynamic group membership |
US9781094B2 (en) * | 2015-04-28 | 2017-10-03 | Qualcomm Incorporated | Systems and methods for performing remote authentication of a virtual subscriber identity module (SIM) |
US10298396B1 (en) * | 2015-11-10 | 2019-05-21 | Wells Fargo Bank, N.A. | Identity management service via virtual passport |
CN111431847A (zh) * | 2016-02-01 | 2020-07-17 | 上海途鸽数据科技有限公司 | 虚拟用户识别模块鉴权方法和装置 |
CN107018121B (zh) * | 2016-10-13 | 2021-07-20 | 创新先进技术有限公司 | 用户身份验证的方法及装置 |
US10733780B2 (en) * | 2016-10-31 | 2020-08-04 | Dg Holdings, Inc. | Portable and persistent virtual identity systems and methods |
CN111783046A (zh) * | 2016-11-25 | 2020-10-16 | 阿里巴巴集团控股有限公司 | 身份验证方法及装置 |
KR101866407B1 (ko) * | 2017-03-15 | 2018-06-12 | 주식회사 한글과컴퓨터 | 아바타 생성 시스템 및 이를 이용한 아바타 생성 방법 |
NL2019698B1 (en) * | 2017-10-10 | 2019-04-19 | Morpho Bv | Authentication of a person using a virtual identity card |
US10949522B2 (en) * | 2017-12-05 | 2021-03-16 | International Business Machines Corporation | Authentication of user identity using a virtual reality device |
-
2019
- 2019-05-21 KR KR1020190059675A patent/KR102044008B1/ko active IP Right Grant
- 2019-11-10 US US17/608,654 patent/US20220207116A1/en active Pending
- 2019-11-11 JP JP2021566235A patent/JP7359872B2/ja active Active
- 2019-11-11 WO PCT/KR2019/015288 patent/WO2020226247A1/ko unknown
- 2019-11-11 EP EP19927925.8A patent/EP3968190A4/en not_active Withdrawn
- 2019-11-11 CN CN201980096138.7A patent/CN113906420A/zh active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002259318A (ja) * | 2001-02-27 | 2002-09-13 | Victor Co Of Japan Ltd | 仮想現実空間での人物画像表示方法 |
JP2005228185A (ja) * | 2004-02-16 | 2005-08-25 | E4C-Link Corp | キャラクター提供システム |
JP2005277555A (ja) * | 2004-03-23 | 2005-10-06 | Oki Electric Ind Co Ltd | 通信サービスシステムおよびコンテンツ選択方法 |
JP2010510587A (ja) * | 2006-11-15 | 2010-04-02 | アイアム・エンタープライジーズ | 3次元モデルを創作し、製造し、流通させる方法 |
JP2019057271A (ja) * | 2016-03-28 | 2019-04-11 | ブラック ゴールド コイン インコーポレイテッドBlack Gold Coin, Inc. | ブロックチェーン式多要素個人身元認証を実現するシステム及び方法 |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2024048734A1 (ja) * | 2022-08-31 | 2024-03-07 | Toppanホールディングス株式会社 | アバター管理システム、アバター管理方法、及びプログラム |
JP7321622B1 (ja) * | 2023-03-31 | 2023-08-07 | 株式会社Vrc | 情報処理装置、情報処理方法、及びサービス提供方法 |
Also Published As
Publication number | Publication date |
---|---|
US20220207116A1 (en) | 2022-06-30 |
WO2020226247A1 (ko) | 2020-11-12 |
JP7359872B2 (ja) | 2023-10-11 |
EP3968190A4 (en) | 2023-02-08 |
KR102044008B1 (ko) | 2019-11-12 |
EP3968190A1 (en) | 2022-03-16 |
CN113906420A (zh) | 2022-01-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP7359872B2 (ja) | 仮想現実世界の身元認証管理システム | |
Prasad | The morality of market exchange: Love, money, and contractual justice | |
JP6805885B2 (ja) | 情報処理装置、アクセス制御方法、及びアクセス制御プログラム | |
KR20210110533A (ko) | 가상 성형 sns 서비스 방법 및 장치 | |
US20160260185A1 (en) | Electronic Contract Creator | |
US20060021024A1 (en) | User certification apparatus and user certification method | |
CN105844164A (zh) | 用于数据的安全共享的系统和方法 | |
CN101145238A (zh) | 超现实三维全息智能虚拟人系统及方法 | |
Buchli | The prototype: presencing the immaterial | |
KR101565734B1 (ko) | 가족 문화 컨텐츠 서비스 방법 및 시스템 | |
Terman | The piety of public participation: The revolutionary Muslim woman in the Islamic Republic of Iran | |
Magwaza | Private transgressions: The visual voice of Zulu women | |
Sim | Will artificial intelligence take over arbitration | |
Donahoo | Why we need a national CROWN Act | |
US20080064333A1 (en) | System and method for specifying observed targets and subsequent communication | |
Okumura et al. | Identity verification of ticket holders at large-scale events using face recognition | |
WO2017133705A1 (zh) | 身份识别系统及其识别方法 | |
Aune et al. | Modest dress at work as lived religion: Women’s dress in religious work contexts in Saudi Arabia and the UK | |
CN107656959A (zh) | 一种留言方法、装置及留言设备 | |
Gunawan et al. | Digital proxemics approach in cyber space analysis-a systematic literature review | |
d’Iribarne | The combination of strategic games and moral community in the functioning of firms | |
Graney | Ten years of sovereignty in Tatarstan: end of the beginning or beginning of the end? | |
JP7448264B1 (ja) | チケット流通管理システム、チケット流通管理方法及びチケット流通管理プログラム | |
CN110909752A (zh) | 一种基于非特异性生物特征识别个体身份的多用途网络平台 | |
JP2020022681A (ja) | メイクアップ支援システム、及びメイクアップ支援方法 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A621 | Written request for application examination |
Free format text: JAPANESE INTERMEDIATE CODE: A621 Effective date: 20211105 |
|
A977 | Report on retrieval |
Free format text: JAPANESE INTERMEDIATE CODE: A971007 Effective date: 20221226 |
|
A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20230207 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20230508 |
|
TRDD | Decision of grant or rejection written | ||
A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 Effective date: 20230905 |
|
A61 | First payment of annual fees (during grant procedure) |
Free format text: JAPANESE INTERMEDIATE CODE: A61 Effective date: 20230928 |
|
R150 | Certificate of patent or registration of utility model |
Ref document number: 7359872 Country of ref document: JP Free format text: JAPANESE INTERMEDIATE CODE: R150 |