KR101619290B1 - Method and ic tag for prevention of forgery of documents - Google Patents
Method and ic tag for prevention of forgery of documents Download PDFInfo
- Publication number
- KR101619290B1 KR101619290B1 KR1020150065809A KR20150065809A KR101619290B1 KR 101619290 B1 KR101619290 B1 KR 101619290B1 KR 1020150065809 A KR1020150065809 A KR 1020150065809A KR 20150065809 A KR20150065809 A KR 20150065809A KR 101619290 B1 KR101619290 B1 KR 101619290B1
- Authority
- KR
- South Korea
- Prior art keywords
- tag
- document information
- authentication
- information
- server
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 55
- 230000002265 prevention Effects 0.000 title claims description 4
- 238000004891 communication Methods 0.000 claims description 21
- 238000012790 confirmation Methods 0.000 claims description 2
- 238000012360 testing method Methods 0.000 description 135
- 230000008569 process Effects 0.000 description 15
- 238000005516 engineering process Methods 0.000 description 8
- 238000010586 diagram Methods 0.000 description 7
- 238000013475 authorization Methods 0.000 description 6
- 230000006870 function Effects 0.000 description 6
- 238000007726 management method Methods 0.000 description 4
- 230000004075 alteration Effects 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 3
- 230000000694 effects Effects 0.000 description 3
- 230000007246 mechanism Effects 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 238000004458 analytical method Methods 0.000 description 2
- 230000008859 change Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/10009—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
- G06K7/10257—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves arrangements for protecting the interrogation against piracy attacks
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B42—BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
- B42D—BOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
- B42D25/00—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
- B42D25/20—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof characterised by a particular use or purpose
- B42D25/22—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof characterised by a particular use or purpose for use in combination with accessories specially adapted for information-bearing cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/067—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
- G06K19/07—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
- G06K19/073—Special arrangements for circuits, e.g. for protecting identification code in memory
- G06K19/07309—Means for preventing undesired reading or writing from or onto record carriers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/26—Government or public services
- G06Q50/265—Personal security, identity or safety
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Tourism & Hospitality (AREA)
- Toxicology (AREA)
- General Health & Medical Sciences (AREA)
- Artificial Intelligence (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Electromagnetism (AREA)
- Development Economics (AREA)
- Educational Administration (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Economics (AREA)
- Human Resources & Organizations (AREA)
- Marketing (AREA)
- Primary Health Care (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Storage Device Security (AREA)
Abstract
A method of querying document information requiring authentication by an authentication server through a tag attached to a document or a wireless tag of a user terminal mounted on the document, the method comprising the steps of: (a) receiving a random number generated in real time from the tag; (b) encrypting the real-time random number with an encryption key of the authentication server; (c) transmitting the result of the encryption to the tag to confirm whether or not the tag matches the result of the encryption, thereby allowing the reader to authenticate the read right; (d) requesting document information for the tag; And (e) receiving document information from the tag.
Description
The present invention relates to a method and a tag for preventing document forgery, and more particularly, to a method and tag for preventing document forgery, and more particularly, A method for preventing forgery of a document, a user terminal, and a tag.
In the modern society, copying machines, scanners, printers, and other duplication devices become common, making it easier to counterfeit various documents. In addition, the rapid development of scanners, color printers and graphic tools is accelerating the easy and rapid forgery and alteration of documents requiring certification, such as certified test reports and certificates.
For example, in the case of an official test report of a quality inspection agency that inspects the quality of a product, it is necessary to delete or change the submission purpose, acceptance date, test date, or result value of the test report through forgery or alteration, Unfair delivery and miscellaneous accidents occurred due to normal supply, and the reliability of the product quality was lowered.
Various anti-counterfeiting technologies have been developed to cope with this.
Typically, in order to prevent the risk of document forgery, there is a technique for manufacturing a latent image hidden in the original by using an anti-falsification paper and copying the original paper to documents that need to be proved original, Therefore, when the original document is copied, a latent image indicating a copy may be displayed. In some cases, there is a problem that the anti-counterfeit function can not be guaranteed 100%.
In addition, there are anti-counterfeiting technologies such as watermark, but with the advent of these technologies, anti-counterfeiting technology has gradually evolved as well.
SUMMARY OF THE INVENTION The present invention has been made to solve the above problems of the prior art, and it is an object of the present invention to provide a method and system for storing a content of a document in an NFC tag to prevent forgery or tampering, To improve the transparency and accuracy of the user's trust, and to improve the reliability of the user.
Yet another object of the present invention is to enable efficient management of computerized information management of a wide range of documents by the anti-counterfeiting or authentication system through the NFC tag.
In addition, the present invention relates to a document information inquiry method that requires authentication to improve convenience of a user by allowing the user to immediately determine whether the authentication information matches the paper type document and only the NFC touch.
SUMMARY OF THE INVENTION The present invention has been made in order to solve the above-mentioned problems of the prior art, and it is an object of the present invention to provide an authentication server, A method of querying document information, comprising: (a) receiving a random number generated in real time from the tag; (b) encrypting the real-time random number with an encryption key of the authentication server; (c) transmitting the result of the encryption to the tag to confirm whether or not the tag matches the result of the encryption, thereby allowing the reader to authenticate the read right; (d) requesting document information for the tag; And (e) receiving document information from the tag.
The document information inquiry method requiring authentication may further include generating the encryption key using the read authentication key stored in the authentication server and the ID of the tag received from the tag before the step (a) .
Wherein the confirmation by the tag is performed by checking whether the result of encrypting the random number with the encryption key for reading and the result encrypted by the authentication server in the tag are matched.
The document information inquiry method requiring the authentication may further include decrypting the encrypted document information after step (d).
The method may further include transmitting the received document information to the user terminal.
Wherein the document information inquiry method requires the issuance server issuing the document information and receiving the document information from the server storing the document information and encrypting the document information before the step (a); Authenticating an authority to issue document information to the tag; Requesting storage of encrypted document information in the tag, and storing the encrypted document information in the tag; And recording the document information issuance history to the tag.
The issuing authority authentication step may include transmitting the result of encrypting the document information and the document information with the encryption key of the issuing server to the tag and comparing the result obtained by encrypting the document information with the encryption key for writing stored in the tag And a step of causing the authority authentication to be performed through the determination of coincidence.
According to another embodiment of the present invention, there is provided a document forgery prevention system for performing a document information inquiry function which requires authentication through a tag attached to a document or a wireless communication of a user terminal, A reading authorization unit for transmitting a result obtained by encrypting a random number using an encryption key to the tag and authenticating a reading right by checking whether the result is encrypted with the tag; An encrypted document information requesting unit for requesting document information to the tag; And an encrypted document information receiving unit for receiving document information from the tag.
And a document information decryption unit for decrypting the encrypted document information.
A document information encryption unit for receiving document information from a server storing document information and encrypting the document information; An issuing authority authenticating unit that authenticates an authority to issue document information to the tag; A document information tag storage requesting unit for requesting storage of encrypted document information in the tag and storing the encrypted document information in the tag; And an issuance history storage unit for recording the document information issuance history to the tag.
According to still another embodiment of the present invention, there is provided a wireless communication tag for preventing forgery of an authentication document, the wireless communication tag comprising: a write authorization unit for confirming a write authorization of an issuance server for inputting document information to a writing unit of the tag; A document information storage unit for storing document information received from the issuing server; A read right authentication unit for confirming a read right of an authentication server for inquiring the document information stored in the reading unit of the tag; A document information retrieval unit for retrieving document information by receiving a document information request from the authentication server; And a document information transmitting unit for transmitting the retrieved document information to the authentication server.
According to an embodiment of the present invention, since it is possible to immediately determine whether the authentication information is matched only through the paper type document and the NFC touch, convenience of the user can be improved.
Also, according to an embodiment of the present invention, by storing contents information of a document in an NFC tag, forgery or alteration is fundamentally blocked, thereby making it impossible to capture information through hacking. Therefore, transparency And improve the accuracy and the reliability of the user.
In addition, the computerized information management of a wide range of documents can be efficiently operated by the anti-counterfeiting or authentication system through the NFC tag.
It should be understood that the effects of the present invention are not limited to the above effects and include all effects that can be deduced from the detailed description of the present invention or the configuration of the invention described in the claims.
1 is a block diagram of a system for preventing forgery of a document through NFC touch according to an embodiment of the present invention.
FIG. 2 is a flowchart illustrating a procedure for issuing a test report, which is a method for preventing document forgery through NFC touch according to an embodiment of the present invention.
FIG. 3 is a flowchart illustrating a procedure for inquiring and authenticating a test report, which is a method for preventing document forgery through NFC touch according to an embodiment of the present invention.
4 is a block diagram illustrating a schematic configuration of an issuing server according to an embodiment of the present invention.
5 is a block diagram showing a schematic configuration of an authentication server according to an embodiment of the present invention.
6 is a block diagram showing a schematic configuration of an NFC tag according to an embodiment of the present invention.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS Hereinafter, the present invention will be described with reference to the accompanying drawings. The present invention may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. In order to clearly illustrate the present invention, parts not related to the description are omitted, and similar parts are denoted by like reference characters throughout the specification.
Throughout the specification, when a part is referred to as being "connected" to another part, it includes not only "directly connected" but also "indirectly connected" . Also, when an element is referred to as "comprising ", it means that it can include other elements, not excluding other elements unless specifically stated otherwise.
Hereinafter, embodiments of the present invention will be described in detail with reference to the accompanying drawings.
Hereinafter, the process of issuing, inquiring, and authenticating test reports is described in detail as an embodiment of the present invention. However, the present invention can be applied to all documents requiring certification or certification, in addition to test reports.
1 is a block diagram of a system for preventing forgery of a document through NFC touch according to an embodiment of the present invention.
Referring to FIG. 1, a document counterfeiting prevention system using an NFC tag touch includes a
First, the communication network can be configured without regard to its communication mode such as wired and wireless. A local area network (LAN), a metropolitan area network (MAN), a wide area network (WAN), and the like. Preferably, the communication network according to one embodiment may be implemented as a WWW (World Wide Web).
The
A user of the
The test report authentication application may be a program module that can communicate with an external device, and may be included in the
The
The
The
According to an embodiment of the present invention, the result information by the testing or analysis of the certification authority stored in the
The issuing
In addition, the issuing
The
In order to perform the authentication process of the
According to an embodiment of the present invention, even when the
The
According to an embodiment of the present invention, the
Here, the IC chip is a chip having a microprocessor and a memory, and can store and process information in the IC chip, thereby minimizing the risk of forgery and providing various services. The microprocessor, memory, OS, and security algorithm are integrated in the IC chip, so information can be stored and processed. It is possible to perform various additional functions requiring storage of additional information because the storage capacity is higher, and the security problem can be improved.
In the case where the
When the
Meanwhile, in order to store the specific test report information in the IC chip, the test report information can be written in the writing unit W. To this end, an encryption key for confirming the access right is stored in the writing unit W .
Detailed functions of the reading unit R and the writing unit W as a specific configuration of the
According to the embodiment of the present invention, it is preferable that the
The
If the
Hereinafter, the proximity arrangement between the
2, the
2 is a flowchart illustrating a procedure for issuing a test report according to an embodiment of the present invention. 4 and 6 are block diagrams that functionally describe the internal configuration of the issuing
Hereinafter, the test report issuing procedure according to the embodiment of the present invention will be described with reference to FIGS. 2, 4, and 6. FIG. .
The issuance procedure of the test report is issued by an organization that performs the quality certification test and transmits the test report information stored in the
The issuing
After the login, if the access right is confirmed, the test report
Upon receiving the request, the
In this case, according to one embodiment, the test report information received by the issuing
Thereafter, the issuing
The issuing
In order to issue the test report information to the
The information input to the
Also, according to an embodiment of the present invention, as a part of the issuing authority authentication process, the issuing
Hereinafter, the issuing authority authentication process of step s205 will be described in detail.
The writing unit W of the
The issuing
When the encryption result input by the issuing
According to the above security methods, the integrity of the writing unit W can be ensured such that access or modification can be performed only by the person to whom the information is applied.
After the issuing authority of step s205 is authenticated, the test certificate information tag
In response to the request for storing the test report information, the test report
The issuance
It is possible to confirm whether the test report issued from the issuing
When the issuance procedure of the test report information is completed, the test report information stored in the
3 is a flowchart illustrating an inquiry and authentication procedure of a test report according to an embodiment of the present invention. 5 is a block diagram for functionally describing the configuration of the
Hereinafter, a test report inquiry and authentication procedure according to an embodiment will be described with reference to FIGS. 3, 5, and 6. FIG.
A user who wants to inquire and authenticate a test report for confirming the quality of a product may touch the
First, when a touch occurs between the
If the test certificate authentication application is not installed in the
After the test report authentication application is executed, information transmission / reception between the
According to an embodiment, only the
Therefore, the read
According to one embodiment, the
For the security of the stored information, the reading part (R) of the NFC tag performs verification of the reading right through the reading encryption key so that only the authorized person can inquire the information stored in the NFC tag .
Specifically, if there is a touch between the
In the
The read
Meanwhile, the
The read
Since the encryption key generated by the
If the test report reading right is authenticated, the encryption test report
The
The encryption test report
The encryption test
According to one embodiment, the decryption may be performed using a decryption key embedded in the
The
Although the issuing
It will be understood by those skilled in the art that the foregoing description of the present invention is for illustrative purposes only and that those of ordinary skill in the art can readily understand that various changes and modifications may be made without departing from the spirit or essential characteristics of the present invention. will be. It is therefore to be understood that the above-described embodiments are illustrative in all aspects and not restrictive. For example, each component described as a single entity may be distributed and implemented, and components described as being distributed may also be implemented in a combined form.
The scope of the present invention is defined by the appended claims, and all changes or modifications derived from the meaning and scope of the claims and their equivalents should be construed as being included within the scope of the present invention.
100: User terminal
200: Issuer terminal
300: Test report server
400: issuing server
410: Test report information request section
420: Test report information receiver
430: Test certificate information encryption unit
440: issuing authority authentication unit
450: Test report information request storage section
460: Issuance history storage unit
500: authentication server
510: Read right authentication unit
520: Encryption test report information request part
530: Encryption test report information receiver
540: Test report information decoding unit
600: NFC tag
610:
620: Encryption test report information storage unit
630:
640: Encryption test report information retrieval unit
650: Encryption test report information transmission unit
Claims (11)
(a) receiving a random number generated in real time from the tag;
(b) encrypting the real-time random number with an encryption key of the authentication server;
(c) transmitting the result of the encryption to the tag to confirm whether or not the tag matches the result of the encryption, thereby allowing the reader to authenticate the read right;
(d) requesting document information for the tag; And
(e) receiving document information from the tag.
Before the step (a)
Further comprising generating the encryption key using the read authentication key stored in the authentication server and the ID of the tag received from the tag.
Wherein the confirmation by the tag is performed by checking whether or not the result of encrypting the random number with the encryption key for reading in the tag matches the result encrypted by the authentication server.
After the step (d)
And decrypting the encrypted document information.
And transmitting the received document information to the user terminal.
Before the step (a)
An issuing server for issuing document information,
Receiving document information from a server storing document information and encrypting the document information;
Authenticating an authority to issue document information to the tag;
Requesting storage of encrypted document information in the tag, and storing the encrypted document information in the tag; And
And recording the document information issuance history to the tag.
Wherein the issuing authority authentication step comprises:
And a result obtained by encrypting the document information and the document information with the encryption key of the issuing server is transmitted to the tag to determine whether or not the result information is identical to a result value obtained by encrypting the document information with the encryption key for writing stored in the tag, The method comprising the steps of:
A read right authentication unit for transmitting a result obtained by encrypting a random number received from the tag with an encryption key to the tag and authenticating a read right by checking whether the result is encrypted with the tag;
An encrypted document information requesting unit for requesting document information to the tag; And
And an encrypted document information receiving unit for receiving document information from the tag.
Further comprising: a document information decryption unit for decrypting the document information received by the encrypted document information receiving unit.
A document information encryption unit for receiving document information from a server storing document information and encrypting the document information;
An issuing authority authenticating unit that authenticates an authority to issue document information to the tag;
A document information tag storage requesting unit for requesting storage of encrypted document information in the tag and storing the encrypted document information in the tag; And
Further comprising: an issuance history storage section for storing a history of issuing document information to the tag.
A writing authority authentication unit for confirming a writing authority of an issuing server for inputting document information in a writing unit of the tag;
A document information storage unit for storing document information received from the issuing server;
A read right authentication unit for confirming a read right of the authentication server to inquire the document information stored in the reading unit of the tag;
A document information retrieval unit for retrieving document information by receiving a document information request from the authentication server; And
And a document information transmitting unit for transmitting the retrieved document information to the authentication server.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020150065809A KR101619290B1 (en) | 2015-05-12 | 2015-05-12 | Method and ic tag for prevention of forgery of documents |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020150065809A KR101619290B1 (en) | 2015-05-12 | 2015-05-12 | Method and ic tag for prevention of forgery of documents |
Publications (1)
Publication Number | Publication Date |
---|---|
KR101619290B1 true KR101619290B1 (en) | 2016-05-10 |
Family
ID=56021183
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020150065809A KR101619290B1 (en) | 2015-05-12 | 2015-05-12 | Method and ic tag for prevention of forgery of documents |
Country Status (1)
Country | Link |
---|---|
KR (1) | KR101619290B1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101869431B1 (en) * | 2016-08-10 | 2018-06-20 | 박삼식 | ID card using OID code and System and Method for Preventing forgery the same |
-
2015
- 2015-05-12 KR KR1020150065809A patent/KR101619290B1/en active IP Right Grant
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101869431B1 (en) * | 2016-08-10 | 2018-06-20 | 박삼식 | ID card using OID code and System and Method for Preventing forgery the same |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101958795B (en) | Key storage device, biometric authentication device, biometric authentication system, key management method, biometric authentication method | |
JP4360422B2 (en) | Authentication information management system, authentication information management server, authentication information management method and program | |
US20080195858A1 (en) | Method and Apparatus For Accessing an Electronic Device by a Data Terminal | |
JP2006246015A5 (en) | ||
US20040044625A1 (en) | Digital contents issuing system and digital contents issuing method | |
CN101989982A (en) | Information processing apparatus, program, storage medium and information processing system | |
US20090315686A1 (en) | Rfid tag using encrypted value | |
KR101812638B1 (en) | Module, service server, system and method for authenticating genuine goods using secure element | |
KR102178179B1 (en) | apparatus and user terminal for mobile identification | |
JP2009212731A (en) | Card issuing system, card issuing server, and card issuing method, and program | |
JP2005196412A (en) | Data communication device and memory management method for data communication device | |
JP5073312B2 (en) | IC tag system | |
CN102222195B (en) | E-book reading method and system | |
KR101619290B1 (en) | Method and ic tag for prevention of forgery of documents | |
KR101285362B1 (en) | Authentication system for electronic signature | |
KR100720738B1 (en) | A method for providing secrecy, authentication and integrity of information to RFID tag | |
JP5167826B2 (en) | Document management system, program, and medium using position information | |
KR20200013494A (en) | System and Method for Identification Based on Finanace Card Possessed by User | |
KR20200022194A (en) | System and Method for Identification Based on Finanace Card Possessed by User | |
JP5386860B2 (en) | Payment system, payment processing apparatus, validity verification apparatus, validity verification request processing program, validity verification processing program, and validity verification method | |
JP2020052682A (en) | Information processing apparatus, information processing method, program, and secure element | |
TWI850002B (en) | Individual encrypted signature system and signing method thereof | |
JP2008022189A (en) | Electronic application method using virtual storage medium | |
JP5133743B2 (en) | Authentication system, authentication method, reader / writer, and program | |
EP3678872B1 (en) | Document authentication using distributed ledger |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
E701 | Decision to grant or registration of patent right | ||
GRNT | Written decision to grant |