KR101646172B1 - Data brokering server and data brokering system using the same - Google Patents

Data brokering server and data brokering system using the same Download PDF

Info

Publication number
KR101646172B1
KR101646172B1 KR1020150079336A KR20150079336A KR101646172B1 KR 101646172 B1 KR101646172 B1 KR 101646172B1 KR 1020150079336 A KR1020150079336 A KR 1020150079336A KR 20150079336 A KR20150079336 A KR 20150079336A KR 101646172 B1 KR101646172 B1 KR 101646172B1
Authority
KR
South Korea
Prior art keywords
data
information
terminal
encryption
code
Prior art date
Application number
KR1020150079336A
Other languages
Korean (ko)
Inventor
이현종
Original Assignee
주식회사 빅스터
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 주식회사 빅스터 filed Critical 주식회사 빅스터
Priority to KR1020150079336A priority Critical patent/KR101646172B1/en
Application granted granted Critical
Publication of KR101646172B1 publication Critical patent/KR101646172B1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/08Auctions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0201Market modelling; Market analysis; Collecting market data

Abstract

The present invention relates to a data intermediation server and a data intermediation system using the data intermediation server. The data intermediation server encrypts identification information of data transmitted and received with a supplier terminal and a consumer terminal through non- The present invention relates to a technique for intermediating data.
According to the present invention, since the unique identification information of the customer is provided in the form of the encrypted non-identification information in a series of processes of receiving data from the supplier terminal and supplying data to the consumer terminal requesting transmission, It is possible to prevent exposure of the unique identification information of the customer and to provide a different encryption code for each of a plurality of provider terminals and a consumer terminal so that it is difficult to decrypt the encrypted information only with data transmitted from each provider terminal and the consumer terminal , There is an effect that the security of information is maintained at the time of data mediation.

Description

BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to a data intermediation server,

The present invention relates to a data mediation server and a data mediation system using the same.

BACKGROUND ART [0002] With the recent development of mobile communication technology and the establishment of a wide range of wireless network environments, network services such as Internet shopping, content browsing, and social network service (SNS) are utilized through communication terminals such as PCs connected to a conventional wired network The number of users who use network services through a mobile communication terminal such as a smart device connected to a mobile communication network regardless of a place has greatly increased.

As a result, network service providers need to collect and analyze vast amounts of data in accordance with the usage of services provided by numerous vendors as well as the services of the vendors in order to provide high quality services to the rapidly increasing users. Interest in analyzing the so-called Big Data.

However, because this huge data analysis requires a huge amount of data collection, it is possible to save time and money by collecting data by requesting the data collection agency to collect data, rather than establishing its own data collection infrastructure .

Such a service user information (customer) brokerage technique is disclosed in Korean Patent Laid-Open Publication No. 2010-0073884 (filed on December 23, 2008, published on July 21, 2010, hereinafter referred to as prior art).

However, the prior art does not have a means for protecting the customer's identity information in the broking process of the data, and there is a problem that the identity information of the customer exposed when the data is leaked to the outside can be abused.

SUMMARY OF THE INVENTION It is an object of the present invention to provide a data intermediation server for preventing exposure of identification information of a customer and a data intermediation system using the same.

According to an aspect of the present invention, there is provided a data intermediation system including: a supplier terminal providing data; A user terminal for requesting transmission of table information in the data and receiving requested table information; And a data mediation server for receiving the data provided from the provider terminal and storing the received data in the form of a table and transmitting the table information of the data requested to be transmitted from the consumer terminal to the consumer terminal, A second encryption code for re-encrypting unique identification information (hereinafter, referred to as primary password information) encrypted by the first encryption code so as to be one-to-one matched with the provider terminal or the consumer terminal, And providing the first and second encryption codes to the provider terminal and the consumer terminal to receive data encrypted with the unique identification information from the provider terminal through the first and second encryption codes, To the consumer terminal that has transmitted the transmission request information, through the second encryption code matching the consumer terminal (Hereinafter referred to as a second password information.) Expensive primary password information may transmit the information table that contains the.

Here, the provider terminal may be provided with an application interlocked with the data intermediary server, and may transmit unique identification information of data stored in the provider terminal to the provider through the first and second encryption codes provided from the data intermediary server, Encrypts the encrypted data with the secondary encryption information matching with the terminal on a one-to-one basis, and transmits only the data including the secondary encryption information to the data intermediation server.

The customer terminal is provided with an application interlocked with the data intermediary server and transmits unique identification information of data stored in the customer terminal through the first and second encryption codes provided from the data intermediary server to the customer terminal And transmits the generated request information to the data intermediary server by generating transmission request information including table information of data to be transmitted to the data intermediary server and the secondary cipher information.

The data intermediation server decrypts the secondary cryptographic information of the transmission request information received from the customer terminal into primary cryptographic information matched with the customer terminal on a one-to-one basis, Extracts the table information requested to be transmitted from the customer terminal in the data, extracts the encrypted secondary key information and the extracted table information through the second encryption code matched with the customer terminal, To the customer terminal.

In addition, the unique identification information of the data encrypted through the first and second encryption codes generated by the data mediating server includes at least any one of a mobile phone number, a resident registration number, a resident registration number, a passport number, Lt; / RTI >

Meanwhile, the data intermediary server according to an embodiment of the present invention includes a first encryption code for encrypting unique identification information of data, and unique identification information of data encrypted through the first encryption code A second encryption code for re-encrypting the first encryption code to match one-to-one with the supplier terminal or the consumer terminal; And transmitting the first and second encryption codes to the supplier terminal and the consumer terminal and transmitting the first and second encryption information to the supplier terminal and the consumer terminal through the second encryption code, (Hereinafter, referred to as " secondary password information "); A storage module for storing data received from the provider terminal in a table form; Decrypts the secondary encryption information of the data transmitted from the provider terminal and the consumer terminal through the second encryption code generated by the code generation module into the primary encryption information and encrypts the primary encryption information of the data with the secondary encryption information A data processing module; A data retrieval module for retrieving data stored in the storage module through data transmission request information transmitted from the customer terminal and extracting table information of retrieved data; And a control module for controlling the code generation module, the communication module, the storage module, the data retrieval module, and the data processing module.

Here, the code generation module may include: a first code generation unit for generating a first encryption code for encrypting unique identification information of data with primary encryption information; Generating a second encryption code for encrypting the primary encryption information with the supplier terminal or the consumer terminal in a one-to-one correspondence and encrypting the primary encrypted information with the secondary encryption information decryptable from each provider terminal or the consumer terminal matched on a one- part; And a code storage unit for storing the first and second encryption codes.

The unique identification information of the data encrypted through the first and second encryption codes generated by the code generation module may be at least any one of a mobile phone number, a resident registration number, a passport number, and a mail address of the customer .

Also, the data processing module may be configured to identify an object to which data including secondary cipher information is transmitted, acquire a second encryption code matching the transmission / reception object through the code storage unit, An object verification unit for generating object information including a matching second encryption code; A decoding unit for decoding the secondary cryptographic information into the primary cryptographic information through the object information; And an encoding unit for encrypting the primary cipher information with the secondary cipher information through the object information.

The data retrieval module may use the primary cryptographic information obtained by decoding the secondary cryptographic information of the transmission request information transmitted from the customer terminal through the data processing module as a retrieval value, A retrieval unit for retrieving data matched with the decryption key information; And an extracting unit for extracting table information requested to be transmitted in transmission request information received from the customer terminal in a table of data retrieved through the retrieving unit.

The control module decrypts the secondary cipher information of the transmission request information received from the customer terminal through the data processing module into the primary cipher information and controls the data retrieval module to extract, from the data stored in the storage module, Extracts information requested in the transmission request information from a table of the corresponding data, extracts secondary key information encrypted with a second encryption code corresponding to the consumer terminal, Table information to the customer terminal.

As described above, the present invention has the following effects.

First, since the unique identification information of the customer is provided in the form of the encrypted non-identification information in a series of processes of receiving data from the supplier terminal and supplying the information to the consumer terminal requesting the information transmission, The unique identification information of the customer can be prevented from being exposed.

Second, it is difficult to decrypt the encrypted data only by the data transmitted from each supplier terminal and the consumer terminal by providing different encryption codes for a plurality of provider terminals and consumer terminals, so that the security of information can be maintained have.

1 schematically illustrates a data intermediary system according to an embodiment of the present invention.
2 is a block diagram illustrating a configuration of a data mediation server according to an embodiment of the present invention.

The preferred embodiments of the present invention will be described in more detail with reference to the accompanying drawings, in which the technical parts already known will be omitted or compressed for simplicity of explanation.

< Configuration of data mediation system >

1 schematically illustrates a data intermediary system according to an embodiment of the present invention.

The data intermediary system according to an embodiment of the present invention may include a data intermediary server 100, a supplier terminal 200, and a customer terminal 300.

The data mediation server 100 generates a first encryption code and a second encryption code for doubly encrypting the unique identification information of the data. To the supplier terminal (200) and the consumer terminal (300).

At this time, data stored in the supplier terminal 200 and the customer terminal 300 may be activity information including table information such as customer service usage, payment of money, and area of interest.

In addition, the unique identification information of the data, that is, the unique identification information representative of the customer may be information of at least one of a mobile phone number, a resident registration number, a passport number, and a mail address of the customer, And it is assumed that the unique identification information in the data is the customer's mobile phone number.

Here, the first encryption code generated by the data mediation server 100 can encrypt the unique identification information of the data with the unidentified primary encryption information through a public key-based encryption method.

The first encryption code for encrypting the unique identification information of the data transmitted and received by the supplier terminal 200 and the consumer terminal 300 with the first encryption information is transmitted from the data intermediation server 100 to the data intermediation server 100, The mobile phone number of the customer in the data transmitted and received in the supplier terminal 200 and the consumer terminal 300 is encrypted with the non-identification information which can not be decoded by the first encryption code, .

The second encryption code generated by the data intermediation server 100 is a symmetric key based encryption method in which the supplier terminal 200 or the consumer terminal 300 and the data intermediation server 100 are matched one to one, The primary cryptographic information can be re-encrypted with the secondary cryptographic information so that it can be separately decoded in the supplier terminal 200, the data mediation server 100, the consumer terminal 300 and the data mediation server 100 .

The data intermediation server 100 may transmit the second encryption code different from the provider terminal 200 and the consumer terminal 300 to each other but the data intermediation server 100 may transmit the second encryption code to the supplier terminal 200 and the consumer terminal 300 ) To store the second encryption information of the data transmitted from the supplier terminal 200 and the consumer terminal 300 to the second encryption code corresponding to each supplier terminal 200 consumer terminal 300 , It can be decrypted with the primary encryption information.

That is, the first encryption code is generated by the provider terminal 200 transmitting the data including the cellular phone number of the customer to the data mediation server 100, or the customer terminal 300 storing the table of the data including the cellular phone number of the customer When requesting information transmission, the mobile phone number of the customer is encrypted with the primary encryption information and changed to non-identification information.

The data intermediation server 100 stores the data transmitted from the supplier terminal 200 and searches the stored data for the table information of the data requested to be transmitted from the customer terminal 300 and supplies the table information to the customer terminal 300 .

At this time, the data mediation server 100 stores the secondary cryptographic information of the data transmitted from the provider terminal 200 in order to enhance the security of data storage, or stores the secondary cryptographic information of the data transmitted from the provider terminal 200 The primary encryption information can be decrypted and stored through the second encryption code, and the data storage method will be described in detail in the description of the configuration of the data intermediation server 100. [

When receiving the information transmission request information requesting transmission of the table information corresponding to the secondary password value from the customer terminal 300, it searches the stored data through the primary or secondary password information and transmits the retrieved data to the corresponding consumer The second encryption information encrypted through the second encryption code corresponding to the terminal 300 and the table information requesting transmission are transmitted together.

In some cases, the data mediation server 100 stores the secondary password information transmitted to the provider terminal 200 and the original data (the cellular phone number of the customer is stored in an unencrypted state A mapping table capable of confirming the secondary cipher information and the unique identification information for each supplier terminal 200 can be provided so that the mobile phone number of the customer in the mobile terminal 200 can be matched and confirmed.

The supplier terminal 200 can store the original data whose cellular phone number of the customer is not encrypted or unidentified.

Here, when the supplier terminal 200 transmits data to the data mediation server 100, the mobile phone number of the customer in the data to be transmitted is transmitted through the first and second encryption codes received from the data mediation server 100 to the second Encrypted with the password information and transmitted.

The customer terminal 300 can store the original data whose cellular phone number is not encrypted or unidentified.

Herein, when the consumer terminal 300 wants to collect additional activity information for each customer, the activity information is stored in the form of table information in the consumer terminal 300, and the mobile phone number The consumer terminal 300 transmits to the data intermediation server 100 the transfer request information informing the customer's mobile phone number and the table information to be collected.

At this time, the consumer terminal 300 encrypts the customer's mobile phone number with the secondary encryption information in the transmission request information through the first and second encryption codes received from the data mediation server 100, And transmits the transmission request information including the primary password information and the table information to be collected to the data intermediary server 100.

Here, the supplier terminal 200 and the consumer terminal 300 may be provided in the form of a server in which an application linked to the data intermediary server 100 is installed.

< Configuring the data mediation server >

2 is a block diagram illustrating a configuration of a data mediation server according to an embodiment of the present invention.

The data mediation server 100 according to an embodiment of the present invention includes a code generation module 110, a communication module 120, a storage module 130, a data processing module 140, a data search module 150, Module 160 may be included.

The code generation module 110 can generate an encryption code for uniquely identifying the unique identification information of the data transmitted and received between the supplier terminal 200 and the customer terminal 300. The code generation module 110 includes a first code generation unit 112, A code generation unit 114 and a code storage unit 116. [

The first code generation unit 112 can generate the first encryption code for encrypting the cellular phone number information of the customer contained in the data with the primary encryption information which is the non-identification information.

The second code generation unit 114 matches the primary encryption information encrypted by the first encryption code to the supplier terminal 200 and the consumer terminal 300 on a one-to-one basis, 300 can encrypt the second encryption code with the second encryption information that can be decrypted.

The code storage unit 116 may store the first and second encryption codes generated by the first code generation unit 112 and the second code generation unit 114.

Here, the code storage unit 116 stores together the second encryption code generated by the second code generation unit and the information on the supplier terminal 200 and the consumer terminal 300 matched with the second encryption code, It is possible to know the second encryption code necessary for decrypting the secondary cipher information using only the secondary cipher information of the data transmitted and received from the supplier terminal 200 and the customer terminal 300 through the terminal.

The communication module 120 communicates with the supplier terminal 200 and the customer terminal 300 and transmits the first and second encryption codes generated by the code generation unit 110 to the supplier terminal 200 and the consumer terminal 300 And transmits and receives data including secondary cipher information in which the primary cipher information is re-encrypted through the second cipher code with the supplier terminal 200 and the consumer terminal 300.

The storage module 130 may store the data received from the supplier terminal 200 in the form of a table.

At this time, the storage module 130 stores the secondary encryption information of the data transmitted from the provider terminal 200 as it is to increase security of data storage, or stores the secondary encryption information of the data transmitted from the provider terminal 200 It is possible to decrypt and store the primary encryption information through the second encryption code.

Here, the storage module 130 may store primary or secondary password information such that various kinds of activity information of a customer received from a plurality of supplier terminals 200 in the stored data including the primary or secondary encryption information may be cumulatively stored, Can be stored in the form of a table.

The data processing module 140 decrypts the secondary cipher information into the primary cipher information according to the object to which the secondary cipher information is transmitted or received through the second cipher code stored in the code storage unit 116, And may include an object verification unit 142, a decoding unit 144, and an encoding unit 146. The encoding unit 146 encodes the encoded data.

The object verification unit 142 identifies an object to which data containing secondary encryption information is transmitted and received through the communication module 120 and obtains a second encryption code matching the transmission / reception object through the code storage unit 116 And can generate object information including the transmission / reception object information and the second encryption code matched with the transmission / reception object.

The decoding unit 144 may decode the secondary cryptographic information of the data into the primary cryptographic information through the object information generated by the object verification unit 142. [

The encoding unit 146 may encrypt the primary encryption information of the data with the secondary encryption information through the object information generated by the object verification unit 142. [

The data retrieval module 150 can retrieve the data corresponding to the data transmission request information transmitted from the customer terminal 300 in the storage module 130 and extract the table information of the corresponding data, And may include a portion 154.

The retrieval unit 152 retrieves the data stored in the storage module 130 using the primary encryption information decrypted with the secondary encryption information of the transmission request information received from the customer terminal 300 through the data processing module 140 as a retrieval value, It is possible to retrieve data matched with the primary encryption information.

Hereinafter, retrieval of data in the storage module 130 in which data including the primary encryption information is stored through the data retrieval module 150 will be described.

For example, when the storage module 130 decrypts and stores the secondary encryption information of the data received from the supplier terminal 200 into the primary encryption information through the data processing module 140, It is possible to check whether or not the secondary cipher information in the transmission request information received from the terminal 300 matches the primary cipher information of the data stored in the storage module 130 through the decrypted primary cipher information .

In this case, when the data retrieval unit 150 retrieves the data stored in the storage module 130, the time required for further encryption or decryption can be shortened, so that the table information requested by the customer terminal 300 can be quickly retrieved .

delete

delete

delete

The extracting unit 154 may extract the table information requested by the customer terminal 300 from the retrieved data through the retrieval unit 152. [

The control module 160 may control the code generation module 110, the communication module 120, the storage module 130, the data processing module 140, and the data retrieval module 150.

When the control module 160 receives the transmission request information from the customer terminal 300, the control module 160 decrypts the secondary encryption information of the transmission request information received from the customer terminal 300 into the primary encryption information, And searches the data corresponding to the primary encryption information from the data stored in the storage module 130 using the primary password information as a retrieval value and extracts table information requested by the customer terminal 300 from the corresponding data, The secondary cryptographic information obtained by encrypting the used primary cipher information with the second cryptographic code matched with the customer terminal 300 and the extracted table information can be transmitted to the customer terminal 300 that has transmitted the transmission request information.

As a result, in the process of the data intermediation server receiving the data from the supplier terminal and supplying the data to the consumer terminal requesting transmission, the unique identification information of the customer included in the data is stored in the form of non- Therefore, it is possible to prevent the customer's unique identification information from being exposed when the data is leaked out, and the data intermediation server generates the different encryption codes for the supplier terminal and the consumer terminal and provides them to the supplier terminal and the consumer terminal, The present invention provides a data intermediary server in which security of information is maintained at the time of data intermediation, and a data intermediation system using the same, because it is difficult to decrypt the encrypted data only by data transmitted from each supplier terminal and the consumer terminal.

While the present invention has been particularly shown and described with reference to exemplary embodiments thereof, it is to be understood that the invention is not limited to the disclosed exemplary embodiments. And the scope of the present invention should be understood as the following claims and their equivalents.

100: Data mediation server
110: code generation module
112: first code generation unit
114: Second code generation unit
116: code storage unit
120: Communication module
130: storage module
140: Data processing module
142:
144:
146:
150: Data retrieval module
152:
154:
160: Control module
200: Supplier terminal
300:

Claims (11)

A provider terminal for providing data corresponding to unique identification information and unique identification information;
A customer terminal for requesting transmission of table information corresponding to the unique identification information and receiving the requested table information; And
And a data mediation server for receiving data provided from the provider terminal and storing the received data in a table form and transmitting table information of data requested to be transmitted from the consumer terminal to the consumer terminal,
Wherein the data intermediary server comprises: a first encryption code for encrypting the unique identification information included in the data with primary key information, which is non-identification information; and a second encryption code, which is matched on one-to-one with the supplier terminal or the consumer terminal, And provides the first and second encryption codes to the provider terminal and the consumer terminal,
The provider terminal is provided with an application interlocked with the data mediating server. The provider terminal is configured to receive, from the data including the unique identification information, the secondary cipher information in which the unique identification information is encrypted through the first cipher code and the second cipher code, To the data intermediation server, data including table information according to the unique identification information,
Wherein the data intermediation server decrypts the secondary cryptographic information in the data received from the supplier terminal with primary cryptographic information through a second cryptographic code corresponding to the provider terminal, Stores the data including the differential cipher information in the form of a table,
The customer terminal is provided with an application interlocked with the data mediating server and transmits unique identification information of data stored in the customer terminal through the first and second encryption codes provided from the data mediating server to the customer terminal in a one- And transmits the request information including the table information of the data to be transmitted to the data intermediation server and the unique identification information encrypted with the second encryption information through the first and second encryption codes, And transmits it to the data mediation server,
The data intermediary server decrypts the secondary cryptographic information of the transmission request information received from the customer terminal into primary cryptographic information matched with the customer terminal in a one-to-one correspondence, and extracts, from the data stored in the data intermediary server, Extracting the table information requested to be transmitted from the customer terminal in the data, extracting the encrypted secondary key information and the extracted table information through the second encryption code matching with the customer terminal, To the terminal
Data mediation system.
delete delete delete The method according to claim 1,
Wherein the unique identification information of the data encrypted through the first and second encryption codes generated by the data intermediary server is at least any one of a mobile phone number, a resident registration number, a passport number, and a mail address of a customer
Data mediation system.
A first encryption code for encrypting the unique identification information with the primary password information which is non-identification information, and a second encryption code for matching the primary password information with the supplier terminal or the consumer terminal on a one-to-one basis and encrypting the primary password information with the secondary password information Code generation module;
And transmitting the first and second encryption codes to the supplier terminal and the consumer terminal, and transmitting a second encryption code corresponding to each provider terminal or the consumer terminal to the supplier terminal and the consumer terminal, A communication module for transmitting and receiving data including unique identification information encrypted with second cryptographic information;
A storage module for storing data received from the provider terminal in a table form;
Decrypts the secondary encryption information of the data transmitted from the provider terminal and the consumer terminal through the second encryption code generated by the code generation module into the primary encryption information and encrypts the primary encryption information of the data with the secondary encryption information A data processing module;
A data retrieval module for retrieving data stored in the storage module through data transmission request information transmitted from the customer terminal and extracting table information of retrieved data; And
And a control module for controlling the code generation module, the communication module, the storage module, the data retrieval module, and the data processing module,
Wherein the data stored in the form of a table stored in the storage module is data including primary cipher information received from the provider terminal and having unique identification information encrypted with a first encryption code,
The code generation module includes:
A first code generation unit for generating a first encryption code for encrypting unique identification information of data with primary encryption information;
Generating a second encryption code for encrypting the primary encryption information with the supplier terminal or the consumer terminal in a one-to-one correspondence and encrypting the primary encrypted information with the secondary encryption information decryptable from each provider terminal or the consumer terminal matched on a one- part; And
And a code storage unit for storing the first and second encrypted codes,
Wherein the unique identification information of the data encrypted through the first and second encryption codes generated by the code generation module is at least any one of a mobile phone number, a resident registration number, a passport number, and a mail address of a customer,
The data processing module includes:
A second encryption code that matches the transmission / reception object through the code storage unit, and a second encryption code that is matched with the transmission / reception object and the transmission / reception object An object identification unit for generating the object information;
A decoding unit for decoding the secondary cryptographic information into the primary cryptographic information through the object information; And
And an encoding unit for encrypting the primary encryption information with the secondary encryption information through the target information,
The data retrieval module includes:
Wherein the primary cryptographic information decrypted with the secondary cryptographic information of the transmission request information received from the customer terminal through the data processing module is used as a retrieval value and data matching the primary cryptographic information among the data stored in the storage module A search unit for searching; And
And an extracting unit for extracting table information requested to be transmitted in transmission request information received from the customer terminal in a table of data retrieved through the retrieving unit,
The control module decrypts the secondary cryptographic information of the transmission request information received from the customer terminal through the data processing module into the primary cryptographic information through the second cryptographic code corresponding to the customer terminal, Retrieves data matched with the primary cipher information from the data stored in the storage module, extracts the requested information from the transmission request information in the corresponding data table, and transmits a second encryption code corresponding to the customer terminal And transmits the encrypted secondary key information and the extracted table information to the customer terminal
Data mediation server.
delete The method according to claim 6,
Wherein the unique identification information of the data encrypted by the first and second encryption codes generated by the code generation module is at least any one of a mobile phone number, a resident registration number, a passport number, and a mail address of the customer
Data mediation server.
delete delete delete
KR1020150079336A 2015-06-04 2015-06-04 Data brokering server and data brokering system using the same KR101646172B1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
KR1020150079336A KR101646172B1 (en) 2015-06-04 2015-06-04 Data brokering server and data brokering system using the same

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
KR1020150079336A KR101646172B1 (en) 2015-06-04 2015-06-04 Data brokering server and data brokering system using the same

Publications (1)

Publication Number Publication Date
KR101646172B1 true KR101646172B1 (en) 2016-08-08

Family

ID=56712050

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1020150079336A KR101646172B1 (en) 2015-06-04 2015-06-04 Data brokering server and data brokering system using the same

Country Status (1)

Country Link
KR (1) KR101646172B1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR102535470B1 (en) * 2022-11-15 2023-05-26 국방과학연구소 Distribution system of shared data in uav

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20070090768A (en) * 2006-03-02 2007-09-06 아르재 가부시키가이샤 Portable telephone, and portable telephone readable recording medium having a program for sending and receiving electronic mail
JP2008028869A (en) * 2006-07-24 2008-02-07 Nomura Research Institute Ltd Communication proxy system and communication proxy device
KR20130038894A (en) * 2013-03-21 2013-04-18 이윤규 Data processing terminal, method of processing data therof, data processing system and method of processing data thereof
KR20140088967A (en) * 2012-12-31 2014-07-14 주식회사 엘지유플러스 Identity module management method and apparatus for user equipment

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20070090768A (en) * 2006-03-02 2007-09-06 아르재 가부시키가이샤 Portable telephone, and portable telephone readable recording medium having a program for sending and receiving electronic mail
JP2008028869A (en) * 2006-07-24 2008-02-07 Nomura Research Institute Ltd Communication proxy system and communication proxy device
KR20140088967A (en) * 2012-12-31 2014-07-14 주식회사 엘지유플러스 Identity module management method and apparatus for user equipment
KR20130038894A (en) * 2013-03-21 2013-04-18 이윤규 Data processing terminal, method of processing data therof, data processing system and method of processing data thereof

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR102535470B1 (en) * 2022-11-15 2023-05-26 국방과학연구소 Distribution system of shared data in uav

Similar Documents

Publication Publication Date Title
US8712041B2 (en) Content protection apparatus and content encryption and decryption apparatus using white-box encryption table
CN107181714B (en) Verification method and device based on service code and generation method and device of service code
EP3038316B1 (en) Identity authentication system, apparatus, and method, and identity authentication request apparatus
CN107040519B (en) Data circulation method, device and system
CN101282218B (en) Method for ciphering and deciphering host computer and pickaback plane of split type terminal
US20150149765A1 (en) Method of anonymization
CN104365127B (en) Method for following the trail of mobile device in remote display unit
CN111131282B (en) Request encryption method and device, electronic equipment and storage medium
CN104243439A (en) File transfer processing method and system and terminals
CN101171860B (en) Security method and device for managing access to multimedia contents
KR20130030474A (en) System and method for communicating bewteen nfc terminals
CN109039997B (en) Secret key obtaining method, device and system
KR20150029664A (en) Payment gateway system using security code based on time stamp, and the operating method thereof
KR102245886B1 (en) Analytics center and control method thereof, and service providing device and control method thereof in co-operational privacy protection communication environment
CN116502254B (en) Method and device for inquiring trace capable of searching statistics
KR101646172B1 (en) Data brokering server and data brokering system using the same
US10506288B2 (en) DRM addition authentication
JP6192495B2 (en) Semiconductor device, information terminal, semiconductor element control method, and information terminal control method
KR101100726B1 (en) A Method of Transporting Certificate to Mobile Terminal
CN106972928B (en) Bastion machine private key management method, device and system
CN104580262A (en) Safety method applicable to wireless internet of things
CN113032802B (en) Data security storage method and system
WO2018043466A1 (en) Data extraction system, data extraction method, registration device, and program
US20200304291A1 (en) Information management system and method for the same
KR20180028705A (en) Security element operating with wireless router, the wireless router, and method of forming internet network using the security element

Legal Events

Date Code Title Description
E701 Decision to grant or registration of patent right
GRNT Written decision to grant
FPAY Annual fee payment

Payment date: 20190731

Year of fee payment: 4