KR20150133357A - Total management system of individual information code using user's authentication based on bionic information, and generation method of individual information code using user's authentication of bionic information - Google Patents

Total management system of individual information code using user's authentication based on bionic information, and generation method of individual information code using user's authentication of bionic information Download PDF

Info

Publication number
KR20150133357A
KR20150133357A KR1020140059765A KR20140059765A KR20150133357A KR 20150133357 A KR20150133357 A KR 20150133357A KR 1020140059765 A KR1020140059765 A KR 1020140059765A KR 20140059765 A KR20140059765 A KR 20140059765A KR 20150133357 A KR20150133357 A KR 20150133357A
Authority
KR
South Korea
Prior art keywords
code
information
personal
data
user
Prior art date
Application number
KR1020140059765A
Other languages
Korean (ko)
Inventor
최상태
김제응
Original Assignee
최상태
김제응
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 최상태, 김제응 filed Critical 최상태
Priority to KR1020140059765A priority Critical patent/KR20150133357A/en
Publication of KR20150133357A publication Critical patent/KR20150133357A/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F15/00Digital computers in general; Data processing equipment in general
    • G06F15/16Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Abstract

The present invention relates to an individual-related-code integrated management system utilizing a biometric-information proof and a method for generating a personal-related code using the biometric-information proof. A first aspect of the present invention is a method of managing a personal information management system including a user terminal 1, a code provider server 10, a personal information system server 20, a personal code management server 30, a communication network 40 and a search terminal 50 In the personal related code integrated management system, the code provider server (10) has a function of verifying the user of the user terminal (1) "Image data" digitizing the image, "voice data" digitizing the voice expressed through the vocal cords of the human body, and "digital scan data" scanning the national identification card proving the identity of the individual. Proof digital information data "that is the subject of the proof-of-concept digital information code, and in addition to image data, voice data, and digital scan data, A code metadata building module 11 for collecting all the information and cataloging the information into an index, building related metadata, and storing it in the database 10a; And a personal identification code integrated management system using the proof of biometric information including the personal identification code.
The second aspect of the present invention is a method for providing digital information, comprising the steps of: a code provider server (10) constructing proof digital information data in a database (10a); The code provider server 10 encapsulates and encrypts the international standard country code, the international standard language code, and the international standard code information and the additional information among the proof-of-identity digital information data to generate a C-code corresponding to a character code represented by letters and numbers ; And a third step of the code provider server 10 encapsulating the personal code name corresponding to the C-code and the user-specified web page address to generate Link code; And a method of generating a personal-related code using the proof of the biometric information.
Accordingly, the first effect of the present invention is that it is possible to modify or change the individual related code based on nationality, language, place of birth and name, and can be applied to the system by linking the related code designated as standard to the modified code In addition, the communication link between the code provider and the code holder provides convenience of connecting to a predetermined web page without inputting a separate communication address through the code converter.
In addition, the second effect of the present invention can provide a personal information management system managed by an individual with respect to personal information.
In addition, the third effect of the present invention is that it is easy to construct big data by utilizing the personal public information code disclosed by the individual, and can provide personalized information to the individual.

Description

[0001] The present invention relates to a method for generating an individual-related code using an individual-related-code integrated management system and a biometric information authentication certificate using the biometric information authentication certificate, user's authentication of bionic information}

The present invention relates to an individual-related code integrated management system and a method for generating a personal-related code using the biometric-information authentication certificate using the biometric-information authentication certificate. More specifically, the present invention relates to a biometric- The government uses biometric identification to authenticate the biometric information to store it as a digital information on a web page irrespective of geographical restrictions, and to certify the identity internationally. And relates to a method for generating an individual-related code using the proof.

The means of identifying and certifying the current individual is a mandatory identification card issued by the government. In Korea, the identification card is used to certify the identity of each individual.

However, the national identification card is used by a nation to manage individual citizens, and no means of proving that each individual is a citizen is being used.

For example, if you go to a foreign country and lose your passport, the resident registration card is used in Korea, but it can not be used overseas, so there is no way to prove that you are officially in the field.

As a solution to these limitations, it is worth noting that everyone has biometric information that can identify them.

In other words, if biometric information that can be commonly used and verified globally and the government can store the digital information in a web page irrespective of geographical restrictions and use it internationally by using a national identification card authenticating the biometric information, , It would be convenient to prove that you are yourself both at home and abroad.

[Related Technical Literature]

1. System and Method for Authenticating Users Using Biometrics (Patent Application No. 10-2012-0096791)

2. A method for authenticating a user using a user device, a digital system for the same, and an authentication system using the same (Patent Application No. 10-2014-0003252)

SUMMARY OF THE INVENTION The present invention has been made to solve the above problems, and it is an object of the present invention to provide a biometric information authentication system for providing a universal international code capable of proving each individual personally by utilizing biometric information for proof of identity by overcoming the limitations of a resident registration card Related code integrated management system and a method of generating a personal-related code using the biometric information authentication certificate.

In addition, the present invention provides an integrated management system for a person-related code that utilizes a biometric information authentication certificate for presenting an algorithm for effectively constructing and displaying C-code and Link code corresponding to a verification means, To provide a method for generating related code.

The present invention not only provides a management method for storing, controlling, searching, sharing, and utilizing the proof-of-proof digital information data in addition to the C-code and Link code corresponding to the proof means, The present invention is intended to provide a method for generating an individual related code using an integrated management system of personal related codes utilizing biometric information authentication and biometric information authentication.

However, the objects of the present invention are not limited to the above-mentioned objects, and other objects not mentioned can be clearly understood by those skilled in the art from the following description.

In order to accomplish the above object, an integrated personal identification code management system using biometric information identification according to an embodiment of the present invention includes a user terminal 1, a code provider server 10, a personal information system server 20, In the personal-related code integrated management system including the personal code management server 30, the communication network 40 and the search terminal 50, the code provider server 10 includes means for verifying the user of the user terminal 1 "Image data" that digitizes face, iris, and fingerprint images, which are external characteristics of the body organization that can recognize each individual person, "voice data" that digitizes the voice expressed through the vocal cords of the human body, Proof digital information data "that proves that the user is a person by combining" digital scan data "that scanned a resident registration card that proves an individual's identity, and sets image data, voice data, Metadata building code module (11) In addition to the data listed in your proof digital information collecting all the relevant personal code currently used in the sub-category of class index code and build the related metadata stored in the database (10a); .

At this time, the code provider server 10 encapsulates and encrypts the international standard country code, the international standard language code, the international standard code information, and the additional information in the person-related code among the personally identifiable digital information data to generate a character code A C-code encapsulation module 14 for generating a C-code corresponding to the C-code; A Link code encapsulation module 15 for encapsulating the personal code name corresponding to the C-code and the user-specified web page address to generate Link code; .

In addition, the code provider server 10 includes a code introduction and disclosure association information management module 12 for performing disclosure setting of a security level for a predetermined one by the user for information management among the proof digital information data; And a private access designator designating module (13) for performing group-specific accessor designation setting according to group disclosure setting for a person previously designated by the user for information management of digital proof data of the principal; .

The Link code encapsulation module 15 accesses the C-code by linking an address in the user terminal 10 or the search terminal 50 or accesses the address string input or scans it with a digital camera, Link code is generated to access data.

After access by the user terminal 1 or the search terminal 50, the personal code management server 30 receives the personal code name included in the Link code from the user terminal 1 or the search terminal 50 A code converter 31 for converting the personal code name to a personal web page address indicating the user of the user terminal 1 upon receiving and returning the personal code name to the user terminal 1 or the search terminal 50 via the communication network 40; .

In addition, the personal code management server 30 transmits, in a reverse order to the personal code name corresponding to the address code, a private code name corresponding to the personal code name of the Link code A special type inverse character processor 32 for providing font type inverse characters; .

In addition, the personal code management server 30 includes a Red password processor 33 for performing transmission processing for Red Password with a cautionary warning message to a business operator terminal in case of providing unauthorized financial transactions and important information; .

In addition, the personal code management server 30 recognizes the issuer's personal identification card of the issuer authentication code by scanning, receives the face identification of the issuance target person using the smartphone of the issuance target person, The user is provided with the fingerprint recognition of the person to be issued using the smartphone of the person to be issued and receives the voice recognition of the person to be issued using the smartphone of the person to be issued and then transmits the acquired identification card data, A personal identification code generator (34) for storing the data, the fingerprint identification data, and the speech recognition data as the proof digital information data and then issuing the Link code as the personal identification code; .

In order to accomplish the above object, a method for generating a personal relation code using a biometric information authentication certificate according to an embodiment of the present invention is characterized in that the code provider server 10 transmits, to the database 10a, step; The code provider server 10 encapsulates and encrypts the international standard country code, the international standard language code, and the international standard code information and the additional information among the proof-of-identity digital information data to generate a C-code corresponding to a character code represented by letters and numbers ; And a third step of the code provider server 10 encapsulating the personal code name corresponding to the C-code and the user-specified web page address to generate Link code; .

At this time, the first step is a step for the code provider server 10 to authenticate the user of the user terminal 1 by means of authentication of the face, iris, and fingerprint images, which are external characteristics of the body organization, "Digital data", "voice data" digitizing voice expressed through the vocal cords of the human body, and "digital scan data" scanning the national identification card proving the identity of the individual, Proof digital information data ", and in addition to image data, voice data, and digital scan data, all of the personal-related codes currently used in the subcategory of the proof-of-concept digital information code class are collected, indexed into indexes, And stored in the database 10a.

Also, between the first step and the second step, the code provider server 10 sets the security level of the identity proof digital information data in a step-by-step manner for the information previously designated by the user for information management ; And the code provider server 10 performs setting of the group unit accessor designation according to the group disclosure setting for the information specified by the user in advance for the information management of the digital proof of identity data; Is further preferably performed.

Also, in the third step, the code provider server 10 accesses the C-code by linking the address from the user terminal 10 or the search terminal 50, or accesses the address string or scans it with a digital camera It is preferable to generate the Link code so as to approach the proof-of-proof digital information data.

The individual related code integrated management system utilizing the biometric information authentication certificate according to the embodiment of the present invention and the individual related code generating method utilizing the biometric information authentication certificate can integrate all the codes for proving the current user Provides a possible effect.

That is, the first effect of the present invention is that it is possible to modify or change the individual related code based on nationality, language, place of birth and name, In addition, the communication link between the code provider and the code holder provides convenience to connect to a predetermined web page without inputting a separate communication address through the code converter.

According to another embodiment of the present invention, an individual-related code integrated management system and a personal-related code generation method using the biometric-information principal authentication using the biometric-information authentication certificate include: It is not necessary to have a separate personal information or contact information, and it is possible to prevent an accident that a code provider stores and keeps personal information. That is, the second effect of the present invention can provide a personal information management system that is managed by an individual with respect to personal information.

In addition, according to another embodiment of the present invention, an individual related code integrated management system utilizing a biometric information authentication certificate and a personal association code generating method using biometric information authentication certificate can be provided by inputting a QR code or a web page address It provides the effect that the user can connect to the web page through the code converter without using the specified character. As a result, the third effect of the present invention is that it is easy to construct big data using the personal public information code disclosed by the individual, and can provide personalized information to the individual.

BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 is a diagram illustrating an integrated management system for personal information using biometric information authentication according to an embodiment of the present invention; FIG.
FIG. 2 is a schematic diagram showing an example of a personal information management system according to a first embodiment of the present invention. The personal information system server 20 and the personal code management server 30 constitute an individual related code integrated management system utilizing the biometric- FIG. 5 is a diagram showing the concept of integrated management of individual related codes using proofs.
FIG. 3 is a diagram for explaining a process in which an individual-related-code integrated management using a biometric-information proof is performed on a code provider server 10 in an individual-related code integrated management system utilizing the proof of biometric information of FIG. to be.
FIGS. 4 to 7 are views for explaining a UI screen implemented in the integrated management system for personal information using biometric information authentication according to an exemplary embodiment of the present invention.
FIG. 8 is a diagram showing an example of a personal information management system using personal identification digital information data formed in the database 10a by the code metadata building module 11 of the code provider server 10, And is a diagram for explaining the process of issuing a public electronic document by the document owner server (60).
FIG. 9 is a flowchart illustrating a method of generating a personal-related code using biometric information authentication according to an exemplary embodiment of the present invention.
FIG. 10 to FIG. 12 are reference drawings showing a method for generating an individual-related code using an individual-related-code integrated management system and biometric-information authentication using a biometric-information authentication certificate according to another embodiment of the present invention.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS Hereinafter, a detailed description of preferred embodiments of the present invention will be given with reference to the accompanying drawings. In the following description of the present invention, detailed description of known functions and configurations incorporated herein will be omitted when it may make the subject matter of the present invention rather unclear.

In the present specification, when any one element 'transmits' data or signals to another element, the element can transmit the data or signal directly to the other element, and through at least one other element Data or signal can be transmitted to another component.

BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 is a diagram illustrating an integrated management system for personal information using biometric information authentication according to an embodiment of the present invention; FIG. FIG. 2 is a schematic diagram showing an example of a personal information management system according to a first embodiment of the present invention. The personal information system server 20 and the personal code management server 30 constitute an individual related code integrated management system utilizing the biometric- FIG. 5 is a diagram showing the concept of integrated management of individual related codes using proofs.

FIG. 3 is a flow chart illustrating a process in which an individual-related-code integrated management using a biometric-information proof is performed on a code provider server 10 in a personal-related-code integrated management system using the biometric- FIG.

4 to 7 are views for explaining a UI screen implemented in the personal related code integrated management system utilizing the biometric information authentication according to the embodiment of the present invention. FIG. 8 is a diagram showing an example of a personal information management system using personal identification digital information data formed in the database 10a by the code metadata building module 11 of the code provider server 10, And is a diagram for explaining the process of issuing a public electronic document by the document owner server (60).

Herein, a module may mean a functional and structural combination of hardware for carrying out the technical idea of the present invention and software for driving the hardware. For example, the module may mean a logical unit of a predetermined code and a hardware resource for executing the predetermined code, and it does not necessarily mean a physically connected code or a kind of hardware. Can be easily deduced to the average expert in the field of < / RTI >

Referring to FIG. 1, the personal related code integrated management system using the biometric information authentication certificate includes a user terminal 1, a code provider server 10, a personal information system server 20, a personal code management server 30, A communication network 40, and a search terminal 50.

The code provider server 10 includes a code meta data construction module 11, a code introduction and disclosure association information management module 12, a secret access designator designation module 13, a C-code encapsulation module 14, a Link code An encapsulation module 15, a search logic ring module 16 and a database 10a.

The search terminal 50 may include a wire search terminal 50a or a wireless search terminal 50b and includes a link code search site CUCK module 51. [

First, the code metadata building module 11, the code introduction and disclosure related information management module 12, the private access designator designation module 13, the C-code encapsulation module 14 ), A link code encapsulation module (15), and a search logic ring (16) module.

The code meta data construction module 11 is a module for establishing the code meta data of the user terminal 1 by means of the means for proving the user of the user terminal 1 in the form of "image data" obtained by digitizing face, iris, , "Proof of identity digital information data" that proves that the combination of "voice data" digitized voice expressed through the vocal cords of the human body, and "digital scan data" which scanned the national identification card proving the identity of the individual Build.

To this end, the code metadata building module 11 receives facial image data, iris image data, fingerprint image data, voice data, and digital scan data from the personal information system server 20 via the communication network 40, And then stores it in the database 10a for C-code and Link code generation according to encapsulation, thereby completing preparation for Link code generation as a private code.

Also, in this specification, the database 10a may mean functional and structural combination of software and hardware for storing information corresponding to each database. The database 10a may be implemented as at least one table, and may further include a separate DBMS (Database Management System) for searching, storing, and managing information stored in the database. Also, it can be implemented in various ways such as a linked-list, a tree, and a relational database, and includes all data storage media and data structures capable of storing information corresponding to a database.

In addition to image data, voice data, and digital scan data, the code metadata construction module 11 collects all the "personal-related codes" currently in use in the subcategories of the principal proof digital information code class, And stores them in the database 10a.

Here, the code metadata building module 11 stores the code metadata in the object space web page area of the personal code management server 30 which integrates and manages the code on the database 10a, Output, and storage.

In addition, the code meta data construction module 11 integrates all codes related to the user and performs an integrated index construction as shown in [Table 1] below.

Use codes by sector grant
code
IP tracking time
Stamp
Messenger Related data storage folder
Issuer Field Issued Name Usage country
nation
right
Resident registration number National identification number A01
Passport number Foreign traveler
National identity card
A02
Health insurance number Medical insurance A03 National pension number National pension A04 Accident insurance number Industrial accident insurance A05 Employment Insurance Number Employment Insurance A06 Qualification
right
Technical qualification number Credentials B01
License number Name of license B02 Academic certificate number Proof of education B03 Career ID Proof of career B04 property
right
Fluid property number Proof of property C01
Proof of movable property CO2 Intellectual Property Number Proof of industrial property rights C03 Proof of copyright C04 Tax payment
duty
Company Registration Number Proof of tax D01
Tax payment number Proof of tax payment D02 Enterprise finance Deposits, savings Account Number E01 stock Stock number E02 bond Bond number E03 fund Fund Number E04 insurance Insurance number E05 Pension Pension number E06 money Currency number E07 Communication Communication Wireline telephone number F01 Mobile communication Mobile phone number F02 domain Domain address F03 Internet IP Internet address F04 Network IP Network communication address F05 Homepage URL Homepage address F06 Cloud URL Cloud Web browser address F07 post Zip code F08 Public institutions dues Electricity Electric bill payment code G01 Capital Water bill payment code G02 gas Gas bill payment code G03 Other

Then, the code metadata building module 11 may collect metadata for personal supplementary information among personal association codes related to social, cultural, spiritual, and physical body as shown in [Table 2] below and store the collected metadata in the database 10a.

Information classification Grant code Physical information age blood type Blood pressure weight Waist circumference Bust kidney Engaged industry 1) International standard industry classification
2) Korean standard industry classification
Job information 1) International standard job classification
2) Korean standard job classification
Residence Information Residential address
(International postal code search)
Other

In addition, the code metadata building module 11 may collect the notation method (title code assignment) indicating the authentication means for authentication of the principal and collect it in the database 10a as shown in the following Table 3. [

country Write your own code
Subcode
country
code
(Information
Producer nationality)
language
code
(Information production
language)

User code
Classification code Classification with the same name User name Korea KO KR International postal code Arabia
2 digits
Recording method

English alphabet
User name representation in lower case
division 1) List personalized codes that are currently in use and give them separate codes. Access to the code provider is made accessible to the code.

Related to that code
Use the code's messenger and storage folder to communicate

2) Set social, cultural, mental, and body related codes such as personal hobbies to be public and private for searching and sharing
Providing personalized information
United States of America US EN England GB EN France FR FR Germany DE DE Russia RU RU China CN ZH Japan JP JA Iran IR FA etc
ISO 3166 national standard classification
standard
English alphabet
Capitalized
English alphabet
Capitalized

The code introduction and disclosure related information management module 12 performs the publicity setting management of the security level specified by the user in advance for the information management among the identity proof digital information data collected by the code metadata building module 11 .

That is, the code introduction and disclosure related information management module 12 sets the expiration date for public data disclosure through the time stamp as well as setting public information for the public information data among the proof ID digital information data, When accessing the set data, information about file destruction can be managed.

The private access designator designation module 13 can designate the group accessor by performing the group disclosure setting among the pieces of proof digital information data collected by the code metadata building module 11. [ That is, the private access designator designating module 13 can set the private user data to be disclosed only to the authorized access designator through accessor designation.

The C-code encapsulation module 14 extracts the international standard code and the international standard language code from the personal association code of the user terminal 1 stored in the database 10a by the code metadata building module 11, Encodes and encrypts the international standard code information and the additional information of the character code and the C code corresponding to the character code represented by the number.

More specifically, since the C-code is formed so as to be easy to distinguish from common characters, the two-digit international standard country code is denoted by capital letters and the two-letter international standard language code is denoted by capital letters , Indicating the address of the user by indicating the international postal code, the name of the individual registered in the country, and the name of the individual registered in the country, in 2-digit Arabic numerals, And international use is written in English).

The C-code thus generated may be the same as "KOKR123-456-01 Hong Kil-dong", where KO is nationality, KR is the language used, 123-456 is the international postal code, 01 is the same name, .

Alternatively, the C-code may be generated for objects other than humans in another embodiment of C-code generation according to input of C-code information. In this case, the code metadata building module 11 The information of the stored object related metadata may be composed of the following items 1) to 9).

1) Classification - Classification of existing and nonexistent (1) Substance - Major classification - Middle classification - Sub classification - User classification, 2 - Non-substance - (ISO standard, related international standard, national standard (based on language used for writing code), personal code currently in use in Korea, ), 4) location information (Google Earth coordinate information, international postal code information), 5) object intelligence communication information (sense IP, user international information code) 8) Information control (1) Document timestamp - File destruction when expiration date and specific items are accessed. (2) General information (1) Recorded as text, images, Etc.) ② Document History - Document path and change extraction), 9) Additional function Information on visitors 5), 6) can be created as a user selection to operate the user terminal 1, and as described above, the C- The code and the Link code described below can be used as general purpose verification codes.

The link code encapsulation module 15 accesses the address by linking the address in the search terminal 50 with respect to the C-code generated by the C-code encapsulation module 14, accesses the address string input, And is formed to facilitate information access.

The link code is formed by encapsulating the link name for linking using the C-code in accordance with the designation of the user operating the user terminal 1, C-code formed by the public-use code data and the user-specified web page address.

On the other hand, the web page address, which is the name of the link designated by the user, can be defined by the letters of each country within 2 to 10 digits, and is formed of a combination of letters and numbers to form a subcode. That is, the personal code name corresponding to the subcode associated with the C-code is preferably represented by a serial number made up of a combination of Arabic numerals and English alphabets.

Here, the Link code designates the link name of the Web page URL (Uniform Resource Locator) with respect to the name of the C-code, and corresponds to the code name expressed by the character recognized by the user of the user terminal 1. [

Accordingly, the Link code is recognized as the information corresponding to the personal code name corresponding to the sub code by the user, and the address of the web page expressed by the hypertext is recognized by the computer terminal.

In addition, the link code corresponds to "Object International Standard Code Integrated Metadata Web page link address" which shows Web pages related to linked Web pages and metadata information by a computer terminal.

Accordingly, the Link code is used by all the administrators related to the user from the international standard classification code, such as the employee number, resident registration number, medical insurance, card, bankbook, telephone number, passport number, car number, membership number, Provides the advantage of encoding everything you use.

In other words, Link code can protect user's personal information by integrating and encapsulating various object information code of user's requested by the administrator into international standard classification metadata, and can only check user's code where user's code is needed Do not allow users to own personal information.

As a simplified example for understanding the link code, an example of converting the homepage address (URL) into Link code is to convert the official homepage of the Sochi Olympic Games as shown in FIG. 4 into "RUEN, sochi2014". In the converted Link code, we can see that the first two digits of the RU, expressed in capital letters of the English alphabet, are the Russian country code and EN is the 2-digit language code. Able to know. This is an example where the web page currently being used is converted into link code only for web page URL without C-code data.

Next, the search logic ring module 16 changes the address of the web page to the user name by providing the search using the link code for the user terminal 1 and the search terminal 50, . The search logic ring module 16 utilizes link codes to form accurate information groups by searching and sharing link code metadata between users.

In addition, the search logic ring module 16 performs a link code management function to perform accessor designation and timestamp operation. That is, the search logic Ling module 16 searches the database 10a and the link code (Link code) by the code meta data building module 11 as shown in the following Table 4 for searching and sharing link code metadata among users. The personal code name of the Link code generated by the encapsulation module 15 can be utilized.

division address title Subcategory function
Save personal information data Stored on the personal code web page on the personal code management server 30 Your personal code name
1) Biometric information
2) Integrated code
3) Additional information
1) IP tracking
2) Time stamp
3) Messenger
4) Data storage folder
5) Specifying the access specifier for each code

Next, the personal code management server 30 includes a code converter 31 and a dedicated font inverse character processor 32, a red password processor 33, a personal authentication code generator 34 and a temporary password issuer 35 .

First, the code converter 31 acquires the link code from the user terminal 1 or the search terminal 50 after access to the personal code management server 30 by the user terminal 1 or the search terminal 50 A function of converting the personal code name into a personal web page address indicating the user of the user terminal 1 and returning it to the user terminal 1 or the search terminal 50 via the communication network 40 upon receipt of the included personal code name .

[Table 5] shows the code conversion process performed by the code converter 31 separately.

Personal information web page address Personal information server domain address + personal information web page address Code conversion Convert the personal code name corresponding to the address code to the web page address in the link code (personal code KOKR123-456-01 Hong Gil-dong + personal code name) Enrollment Registration of search list = registration of search list on personal code management server 30 Search  When a search word is entered on the personal code management server 30, it is directly connected to the personal information web page

Next, the special type inverse character processor 32 performs a function of directly connecting to a personal information web page matched with the personal code name upon input in the reverse order to the personal code name corresponding to the address code.

In other words, the link code uses the "special font reverse character". In the personal code name of the link code, important contents can be indicated as dedicated characters by using a special font reverse character, and a terminal which does not have an application that does not support a special font reverse character recognizes as an error, It is possible to implement a non-licensor access blocking function.

FIG. 5 shows that a special font reverse character is actually implemented, and corresponds to a modification of the characters used in each country by the horizontal flip technique. A password that designates an access designator using a special typeface character that expresses alphabets and Arabic numerals of the world's languages in reverse (expresses the alphabet of each country horizontally in place of the syllable where the alphabet is located) The name of the personal code in which the link is placed is represented by a dedicated reverse-character typeface, making it impossible to access a system that does not support the font.

In addition, it can be used for passwords and links so that the public can easily recognize that a link to a web page is hung on the basis of the recognition of a special font reverse character.

The red password processor 33 performs a transmission process for the Red Password in the unauthorized financial transaction and important information notification in the case of providing important information. Here, Red Password works in the same way as the password function, but a danger warning is displayed on the place where the password is used, and it is formed so that all relational network systems such as document tracking and account tracking are monitored and recorded.

As a more specific example, if the official password is "12345", it is recommended that the red password, which is a dangerous password, is designated by specifying only one digit from "13345" to 2-> 3.

The method of releasing the risk for the red password by the red password handler 33 is to visit the financial institution within the designated time (the time specified by the user) and release it after authenticating the user. If the red password is not released within the time specified by the user, And is used to start the follow-up action.

Next, the principal authentication code generator 34 of the personal code management server 30 can issue the principal authentication code. More specifically, the principal's authentication code generator 34 recognizes, by a scan, the issuer's personal identification card of the principal's authentication code in the first step, and receives the face identification of the person to be issued using the smartphone of the person to be issued in the second step, In the third step, the issuer's iris recognition is provided using the smartphone of the issuer. In the fourth step, the issuer's fingerprint recognition is provided using the smartphone of the issuer. In the fifth step, To be provided using the smartphone of the person to be issued.

After that, the authentication code generator 34 stores the identification information, the facial recognition data, the iris recognition data, the fingerprint identification data, and the voice recognition data, which are acquired by the first through fifth steps, respectively, , And the Link code is issued as the authentication code.

Next, the principal authentication code generator 34 acquires principal identifying digital information data metadata. Here, the proof-of-proof digital information data metadata may include code accessor IP tracking and recording, equipped with a timestamp function, and accessible information only at the designated time.

The identity verification code generator (34) issues an access designator temporary password to the requesting individual information requestor. To this end, the identity verification code generator 34 has a function of: 1) requesting an information requester ID or code request such as a personal information requester business registration certificate and identification card, 2) storing the identification certificate in the verification document browsing folder, 3) 4) Only search is possible. Locking device can not capture, store or print any information. When the disclosure request is made, it will notify the requestor of the disclosure. do.

The temporary password issuing device 35 of the personal code management server 30 issues the access designation temporary password to the administrator requesting the personal information of the user stored in the database 10a. That is, the temporary password issuing device 35 requests the submission of the business registration certificate and the business entity link code of the manager requesting the personal information to the first step, stores the personal code name of the business link code in the second step, Expiration date, provision of temporary password with tracing of document history, personal information request Administrator access to information provider Link code Confirm personal information, step 4, automatic expiration of temporary password after expiration of expiration date, withdrawal of membership, Termination of the temporary password based on the termination and erasure time.

Next, the Link code search site CUCK module 51 of the search terminal 50 provides the UI screen as shown in FIG. 6 to the wire search terminal 50a on the search initial screen, and the link search site CUCK module 51 7 < / RTI >

Referring to FIG. 6, the link code search site CUCK module 51 may implement a search program initial screen as a wallpaper of the wireline search terminal 50a.

Here, the upper center of the UI screen is used as a communication window with users such as an event, a notice, and an advertisement video (a user-customized advertisement). That is, the central interruption of the UI screen is implemented in such a manner that a user searches for a product without searching for a merchandise sales person through a search for a user to input an advertisement search word and a search word related advertisement, And search for people who match the code for each region). Next, the bottom part of the UI screen realizes real-time view and statistics of my code users. On the left side of the UI screen, the user's family, relatives, and other loved ones are implemented. When each picture image (picture) is clicked, Implement a personal code shortcut left-side extension. The right side of the UI screen realizes a right side expansion such as a hobby, a living, a workplace, a school, a finance, an e-mail, a portal site, a life group, a photograph, a picture image or a pictogram and a document folder of the wire search terminal 50a.

Referring again to FIG. 2, a lock is established between the user's web page on the personal code management server 30 and the code converter 31, thereby protecting the verification means.

A lock is also established between the database 10a of the code provider server 10 and the web page of the user on the personal code management server 30 so that only the code manager or the authorized access designator .

More specifically, it is equipped with a lock function that can only retrieve information by the LOCK function and can not take information out of the code. The access designator password input character is written in a special font reverse character designed separately, and the red password processor 33) Password for password protection in the password Protection for the verification means is implemented by implementation of Red Password.

Here, Red password is a password that is given to the person in charge to provide important information and financial transaction that is not confirmed. It is a password that receives a warning notice. It works the same as the password function, but a danger warning is displayed on the place where the password is used. All relationship network systems, such as account tracking, are used to be monitored and recorded.

Next, referring to FIG. 8, when an online connection to the document owner server 60 for issuing a public electronic document is performed, the document owner (document authority and issuing authority) and the authentication (security company) institution server 70 ) And the document claimant terminal 80 concurrently access the electronic document link code authentication system 90 at the same time.

Thereafter, the document owner server 60 authenticates the issuer by remote control. In the first step, the document-ownership server 60 transmits a personal identification number (Link code personal information registration password and a personal identification card) to the document owner server 60, ), The issuer fingerprint recognition (smartphone) as the fourth step, and the voice recognition (smartphone) as the issuance target person in the fifth step, and a final confirmation process by the certification authority server 70 is added in the sixth step .

9 is a flowchart showing a method for generating a personal-related code using the biometric information authentication based on the personal-related code integrated management system utilizing the biometric information authentication certificate described in Figs. 1 to 8 according to the embodiment of the present invention to be.

Referring to Figs. 1 to 9, the code provider server 10 constructs the proof-of-proof digital information data in the database 10a (S11). More specifically, the code provider server 10 has a function of verifying the user of the user terminal 1, which is an external feature of the body organization capable of recognizing each individual person, such as face, iris, Proof digital information data "that verifies the combination of" digital data "that is scanned with a national identification card proving the identity of the individual," voice data "that digitizes voice expressed through the vocal cords of the human body, ".

Here, in generating the proof-of-proof digital information data, the code provider server 10 collects all of the personal-related codes currently in use in the sub-category of the proof-of-proof digital information code class in addition to the image data, the voice data and the digital scan data, And stores the metadata in the database 10a.

After step S11, the code provider server 10 performs a step-by-step disclosure setting of the security level for the ones previously designated by the user for information management among the proof-of-proof digital information data (S12). More specifically, the code provider server 10 sets common data for public data, sets an expiration period for public data disclosure through time stamps, and performs information management for file digestion, etc., And performs a public setting for the user.

The code provider server 10 sets the group accessor designation according to the group disclosure setting for the information previously specified by the user for information management among the proof-of-proof digital information data (S13).

More specifically, the code provider server 10 performs the group disclosure setting for disclosure of the public data according to the request of the user terminal 1 among the proof-of-proof digital information data established in step S11, Is set to allow access only to authorized access specifiers through accessor designation.

After step S13, the code provider server 10 encapsulates and encrypts the international standard country code, the international standard language code, and the international standard code information and the additional information among the proof-of-proof digital information data to generate a character code And generates the corresponding C-code (S14).

After step S14, the code provider server 10 encapsulates the C-code and the personal code name to generate Link code (S15). More specifically, the code provider server 10 accesses the C-code by linking the address in the user terminal 10 or the search terminal 50, accesses the address string input, or scans the digital camera for data information access Link code is generated for easy. Here, the link code is formed by encapsulating the link name for linking using the C-code according to the designation of the user operating the user terminal 1. The C-code formed by the public-use code data among the collected related metadata Is formed by encapsulating the personal code name corresponding to the user-specified web page address.

10 to 12 are reference diagrams illustrating a method for generating a personal association code using the biometric information authentication system and the biometric information authentication system using the biometric information authentication system according to another embodiment of the present invention.

That is, FIG. 10 shows a structure of a modified example of the C-code, and FIGS. 11 and 12 are views showing a modified example in which a target object of C-code and Link code is changed into a thing.

The present invention can also be embodied as computer-readable codes on a computer-readable recording medium. A computer-readable recording medium includes all kinds of recording apparatuses in which data that can be read by a computer system is stored.

Examples of the computer-readable recording medium include a ROM, a RAM, a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device and the like, and also implemented in the form of a carrier wave (for example, transmission over the Internet) .

The computer readable recording medium may also be distributed over a networked computer system so that computer readable code can be stored and executed in a distributed manner. And functional programs, codes, and code segments for implementing the present invention can be easily inferred by programmers skilled in the art to which the present invention pertains.

As described above, preferred embodiments of the present invention have been disclosed in the present specification and drawings, and although specific terms have been used, they have been used only in a general sense to easily describe the technical contents of the present invention and to facilitate understanding of the invention , And are not intended to limit the scope of the present invention. It is to be understood by those skilled in the art that other modifications based on the technical idea of the present invention are possible in addition to the embodiments disclosed herein.

10: Code Provider Server
10a: Database
11: Module for building code metadata
12: code introduction and association related information management module
13: Closed access designator assignment module
14: C-code encapsulation module
15: Link code encapsulation module
16: Search Logic Ling module
20: Personal information system server
30: Personal code management server
31: Code converter
32: Dedicated font reverse character processor
33: Red password handler
34: Personal authentication code generator
35: Temporary password issuer
40: Network
50: Search terminal
50a: a wire search terminal
50b: wireless search terminal
51: Link code search site CUCK module
60: Document ownership server
70: Certification Authority server
80: document requesting terminal
90: Electronic document Link code authentication system

Claims (12)

In a personal-related code integrated management system including a user terminal 1, a code provider server 10, a personal information system server 20, a personal code management server 30, a communication network 40 and a search terminal 50 , The code provider server (10)
(1), which is an external characteristic of a body organization capable of recognizing a person of each person in the means of verifying the user of the user terminal (1), and "image data" in which the image of the face, iris, Proof digital information data "proving the identity of the user by combining" voice data "obtained by digitizing a voice to be digitized and" digital scan data " A code metadata building module 11 for collecting all of the personal-related codes currently used in the sub-category of the proof-of-proof digital information code class, in addition to the digital scan data, and building up the related metadata in the database 10a, ; And a personal identification code management system using the biometric information identification certificate.
The system according to claim 1, wherein the code provider server (10)
The C code that encodes and encrypts the international standard country code, the international standard language code, the international standard code information, and the additional information in the person-related code of the proof-of-person digital information data to generate the C-code corresponding to the character code -code encapsulation module 14; And
A Link code encapsulation module 15 for encapsulating the personal code name corresponding to the C-code and the user-specified web page address to generate Link code; And a personal information management system for managing the personal information of the user.
The system according to claim 2, wherein the code provider server (10)
A code introduction and disclosure association information management module 12 for performing disclosure setting of a security level in advance for a user designated by the user for information management among digital proof data of the user; And
A private access designator designating module (13) for performing group specific accessor designation setting according to the group public setting for a user previously designated by the user for information management of the digital proof data; And a personal information management system for managing the personal information of the user.
4. The method of claim 3, wherein the Link code encapsulation module (15)
Link code is generated so that the user terminal 10 or the search terminal 50 accesses the C-code by linking the address, accesses the address string input, or scans the digital camera for the identification digital information data An integrated management system for personal information related to biometric information using personal identification.
The personal code management server (30) according to claim 4,
Upon receiving the personal code name included in the Link code from the user terminal 1 or the search terminal 50 after the access by the user terminal 1 or the search terminal 50, A code converter 31 for converting the personal web page address into a personal web page address representing the user of the user terminal 1 and returning it to the user terminal 1 or the search terminal 50 via the communication network 40; And an integrated management system for the individual related code utilizing the biometric information authentication certificate.
The personal code management server (30) according to claim 5,
A special font reverse character processor that provides a special font reverse character for the personal code name of the Link code so that it is directly connected to the personal information web page matching the personal code name upon input in reverse order to the personal code name corresponding to the address code (32); And a personal information management system for managing the personal information using the biometric information authentication certificate.
The personal code management server (30) according to claim 6,
A Red password processor 33 for performing transmission processing for Red Password in a critical alert message to a business operator terminal in case of providing an unconfirmed financial transaction and important information; And a personal information management system for managing the personal information using the biometric information authentication certificate.
The personal code management server (30) according to claim 7,
The identification card of the person to be issued of the authentication code is recognized by the scan, the face recognition of the person to be issued is provided using the smartphone of the person to be issued, the iris recognition of the person to be issued is provided using the smartphone of the person to be issued, The face recognition data, the iris recognition data, the fingerprint recognition data, and the voice recognition data, which are obtained by using the smartphone of the person to be issued and provided by using the smartphone of the person to be issued, A personal identification code generator (34) for storing the personal identification digital information data and then issuing the Link code as a personal identification code; And a personal information management system for managing the personal information using the biometric information authentication certificate.
A first step of the code provider server 10 constructing the proof-of-proof digital information data in the database 10a;
The code provider server 10 encapsulates and encrypts the international standard country code, the international standard language code, and the international standard code information and the additional information among the proof-of-identity digital information data to generate a C-code corresponding to a character code represented by letters and numbers ; And
A third step of the code provider server 10 encapsulating the personal code name corresponding to the C-code and the user-specified web page address to generate Link code; Generating a personalized code using the biometric information authentication certificate.
The method according to claim 9,
The code provider server 10 has a function of verifying the user of the user terminal 1, the "image data" obtained by digitizing the face, iris, and fingerprint image, which are external characteristics of the body organization capable of recognizing individual persons, "Personal identification digital information data" proving that the person is a person is constructed by combining "voice data" digitizing voice expressed through vocal cords, which are internal organization of human body, and "digital scan data" scanning national identification card proving the identity of individual In addition,
In addition to image data, voice data, and digital scan data, all of the personal-related codes currently being used in the subcategories of the proof-of-information digital information code class are cataloged into indexes and related metadata is constructed and stored in the database 10a A method for generating a personal code using biometric information proof of identity.
The method of claim 9, further comprising, between the first step and the second step,
The code provider server 10 performs disclosure setting of the security level of the personal identification digital information data in advance for the information designated by the user for information management in advance; And
The code provider server 10 performs setting of the group accessor designation according to the group disclosure setting in advance of the user identification digital information data designated by the user for information management in advance; And generating a personalized code based on the proof of the biometric information.
[12] The method of claim 9,
The code provider server 10 accesses the C-code by linking an address in the user terminal 10 or the search terminal 50 or accesses the address string input or scans it with a digital camera to access the proof digital information data And generating a link code for the biometric information.
KR1020140059765A 2014-05-19 2014-05-19 Total management system of individual information code using user's authentication based on bionic information, and generation method of individual information code using user's authentication of bionic information KR20150133357A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
KR1020140059765A KR20150133357A (en) 2014-05-19 2014-05-19 Total management system of individual information code using user's authentication based on bionic information, and generation method of individual information code using user's authentication of bionic information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
KR1020140059765A KR20150133357A (en) 2014-05-19 2014-05-19 Total management system of individual information code using user's authentication based on bionic information, and generation method of individual information code using user's authentication of bionic information

Publications (1)

Publication Number Publication Date
KR20150133357A true KR20150133357A (en) 2015-11-30

Family

ID=54867834

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1020140059765A KR20150133357A (en) 2014-05-19 2014-05-19 Total management system of individual information code using user's authentication based on bionic information, and generation method of individual information code using user's authentication of bionic information

Country Status (1)

Country Link
KR (1) KR20150133357A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101885082B1 (en) * 2017-11-01 2018-08-03 정우열 Ubiquitous Code System
KR101961654B1 (en) * 2018-11-30 2019-03-27 성결대학교 산학협력단 Non-storage data recording system and non-storage data providing method by QR code
WO2022098189A1 (en) * 2020-11-09 2022-05-12 주식회사 고스트패스 Identity authentication system using user biometric information

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101885082B1 (en) * 2017-11-01 2018-08-03 정우열 Ubiquitous Code System
KR101961654B1 (en) * 2018-11-30 2019-03-27 성결대학교 산학협력단 Non-storage data recording system and non-storage data providing method by QR code
WO2022098189A1 (en) * 2020-11-09 2022-05-12 주식회사 고스트패스 Identity authentication system using user biometric information

Similar Documents

Publication Publication Date Title
US11928197B2 (en) Method for providing an authenticated digital identity
US10262191B2 (en) System and method for manufacturing and inspecting identification documents
CN110462658B (en) System and method for providing digital identity records to verify the identity of a user
US11063952B2 (en) Identity authentication and information exchange system and method
US9805213B1 (en) Identity validation and verification system and associated methods
CN111711520B (en) Authentication in ubiquitous environments
US8275995B2 (en) Identity authentication and secured access systems, components, and methods
Fu Integrated technologies of blockchain and biometrics based on wireless sensor network for library management
EP3756131A1 (en) Systems and methods for providing mobile identification of individuals
US8074878B1 (en) System and method of pre-approving applicants for visa processing using an emerging country's international travel approval control card
KR20150133357A (en) Total management system of individual information code using user's authentication based on bionic information, and generation method of individual information code using user's authentication of bionic information
JP2010072688A (en) Personal identification system using optical reading code
US10210684B2 (en) System and method for identity verification in a detention environment
US8944321B1 (en) Information processing using machine-readable codes
CA3183996A1 (en) Computer system, method, and device for verifying an immunization status
Warfel Identification Technologies: computer, optical, and chemical aids to personal ID
JP6371938B2 (en) Personal authentication system using fingerprint verification
US8826389B2 (en) Multi-media identity management system
JP4718131B2 (en) Personal information management system
US20230342440A1 (en) System for system for creating and storing verified digital identities
US20230254688A1 (en) Method of digitization and acquisition of sensitive data on mobile devices that ensures the safety and integrity of the data
Beynon-Davies Personal identification in the information age: the case of the national identity card in the UK
KR101812639B1 (en) Method and system for managing documents
Devi Biometric Data, Identification and Authentication in India-Legal Framework, Challenges and Impact
US20190124500A1 (en) Method of digitization and acquisition of sensitive data on mobile devices that ensures the safety and integrity of the data

Legal Events

Date Code Title Description
A201 Request for examination
E902 Notification of reason for refusal
E701 Decision to grant or registration of patent right