KR20150133357A - Total management system of individual information code using user's authentication based on bionic information, and generation method of individual information code using user's authentication of bionic information - Google Patents
Total management system of individual information code using user's authentication based on bionic information, and generation method of individual information code using user's authentication of bionic information Download PDFInfo
- Publication number
- KR20150133357A KR20150133357A KR1020140059765A KR20140059765A KR20150133357A KR 20150133357 A KR20150133357 A KR 20150133357A KR 1020140059765 A KR1020140059765 A KR 1020140059765A KR 20140059765 A KR20140059765 A KR 20140059765A KR 20150133357 A KR20150133357 A KR 20150133357A
- Authority
- KR
- South Korea
- Prior art keywords
- code
- information
- personal
- data
- user
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
- G06F15/16—Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
Abstract
The present invention relates to an individual-related-code integrated management system utilizing a biometric-information proof and a method for generating a personal-related code using the biometric-information proof. A first aspect of the present invention is a method of managing a personal information management system including a user terminal 1, a code provider server 10, a personal information system server 20, a personal code management server 30, a communication network 40 and a search terminal 50 In the personal related code integrated management system, the code provider server (10) has a function of verifying the user of the user terminal (1) "Image data" digitizing the image, "voice data" digitizing the voice expressed through the vocal cords of the human body, and "digital scan data" scanning the national identification card proving the identity of the individual. Proof digital information data "that is the subject of the proof-of-concept digital information code, and in addition to image data, voice data, and digital scan data, A code metadata building module 11 for collecting all the information and cataloging the information into an index, building related metadata, and storing it in the database 10a; And a personal identification code integrated management system using the proof of biometric information including the personal identification code.
The second aspect of the present invention is a method for providing digital information, comprising the steps of: a code provider server (10) constructing proof digital information data in a database (10a); The code provider server 10 encapsulates and encrypts the international standard country code, the international standard language code, and the international standard code information and the additional information among the proof-of-identity digital information data to generate a C-code corresponding to a character code represented by letters and numbers ; And a third step of the code provider server 10 encapsulating the personal code name corresponding to the C-code and the user-specified web page address to generate Link code; And a method of generating a personal-related code using the proof of the biometric information.
Accordingly, the first effect of the present invention is that it is possible to modify or change the individual related code based on nationality, language, place of birth and name, and can be applied to the system by linking the related code designated as standard to the modified code In addition, the communication link between the code provider and the code holder provides convenience of connecting to a predetermined web page without inputting a separate communication address through the code converter.
In addition, the second effect of the present invention can provide a personal information management system managed by an individual with respect to personal information.
In addition, the third effect of the present invention is that it is easy to construct big data by utilizing the personal public information code disclosed by the individual, and can provide personalized information to the individual.
Description
The present invention relates to an individual-related code integrated management system and a method for generating a personal-related code using the biometric-information authentication certificate using the biometric-information authentication certificate. More specifically, the present invention relates to a biometric- The government uses biometric identification to authenticate the biometric information to store it as a digital information on a web page irrespective of geographical restrictions, and to certify the identity internationally. And relates to a method for generating an individual-related code using the proof.
The means of identifying and certifying the current individual is a mandatory identification card issued by the government. In Korea, the identification card is used to certify the identity of each individual.
However, the national identification card is used by a nation to manage individual citizens, and no means of proving that each individual is a citizen is being used.
For example, if you go to a foreign country and lose your passport, the resident registration card is used in Korea, but it can not be used overseas, so there is no way to prove that you are officially in the field.
As a solution to these limitations, it is worth noting that everyone has biometric information that can identify them.
In other words, if biometric information that can be commonly used and verified globally and the government can store the digital information in a web page irrespective of geographical restrictions and use it internationally by using a national identification card authenticating the biometric information, , It would be convenient to prove that you are yourself both at home and abroad.
[Related Technical Literature]
1. System and Method for Authenticating Users Using Biometrics (Patent Application No. 10-2012-0096791)
2. A method for authenticating a user using a user device, a digital system for the same, and an authentication system using the same (Patent Application No. 10-2014-0003252)
SUMMARY OF THE INVENTION The present invention has been made to solve the above problems, and it is an object of the present invention to provide a biometric information authentication system for providing a universal international code capable of proving each individual personally by utilizing biometric information for proof of identity by overcoming the limitations of a resident registration card Related code integrated management system and a method of generating a personal-related code using the biometric information authentication certificate.
In addition, the present invention provides an integrated management system for a person-related code that utilizes a biometric information authentication certificate for presenting an algorithm for effectively constructing and displaying C-code and Link code corresponding to a verification means, To provide a method for generating related code.
The present invention not only provides a management method for storing, controlling, searching, sharing, and utilizing the proof-of-proof digital information data in addition to the C-code and Link code corresponding to the proof means, The present invention is intended to provide a method for generating an individual related code using an integrated management system of personal related codes utilizing biometric information authentication and biometric information authentication.
However, the objects of the present invention are not limited to the above-mentioned objects, and other objects not mentioned can be clearly understood by those skilled in the art from the following description.
In order to accomplish the above object, an integrated personal identification code management system using biometric information identification according to an embodiment of the present invention includes a user terminal 1, a
At this time, the
In addition, the
The Link code encapsulation module 15 accesses the C-code by linking an address in the
After access by the user terminal 1 or the search terminal 50, the personal code management server 30 receives the personal code name included in the Link code from the user terminal 1 or the search terminal 50 A code converter 31 for converting the personal code name to a personal web page address indicating the user of the user terminal 1 upon receiving and returning the personal code name to the user terminal 1 or the search terminal 50 via the
In addition, the personal code management server 30 transmits, in a reverse order to the personal code name corresponding to the address code, a private code name corresponding to the personal code name of the Link code A special type inverse character processor 32 for providing font type inverse characters; .
In addition, the personal code management server 30 includes a
In addition, the personal code management server 30 recognizes the issuer's personal identification card of the issuer authentication code by scanning, receives the face identification of the issuance target person using the smartphone of the issuance target person, The user is provided with the fingerprint recognition of the person to be issued using the smartphone of the person to be issued and receives the voice recognition of the person to be issued using the smartphone of the person to be issued and then transmits the acquired identification card data, A personal identification code generator (34) for storing the data, the fingerprint identification data, and the speech recognition data as the proof digital information data and then issuing the Link code as the personal identification code; .
In order to accomplish the above object, a method for generating a personal relation code using a biometric information authentication certificate according to an embodiment of the present invention is characterized in that the
At this time, the first step is a step for the
Also, between the first step and the second step, the
Also, in the third step, the
The individual related code integrated management system utilizing the biometric information authentication certificate according to the embodiment of the present invention and the individual related code generating method utilizing the biometric information authentication certificate can integrate all the codes for proving the current user Provides a possible effect.
That is, the first effect of the present invention is that it is possible to modify or change the individual related code based on nationality, language, place of birth and name, In addition, the communication link between the code provider and the code holder provides convenience to connect to a predetermined web page without inputting a separate communication address through the code converter.
According to another embodiment of the present invention, an individual-related code integrated management system and a personal-related code generation method using the biometric-information principal authentication using the biometric-information authentication certificate include: It is not necessary to have a separate personal information or contact information, and it is possible to prevent an accident that a code provider stores and keeps personal information. That is, the second effect of the present invention can provide a personal information management system that is managed by an individual with respect to personal information.
In addition, according to another embodiment of the present invention, an individual related code integrated management system utilizing a biometric information authentication certificate and a personal association code generating method using biometric information authentication certificate can be provided by inputting a QR code or a web page address It provides the effect that the user can connect to the web page through the code converter without using the specified character. As a result, the third effect of the present invention is that it is easy to construct big data using the personal public information code disclosed by the individual, and can provide personalized information to the individual.
BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 is a diagram illustrating an integrated management system for personal information using biometric information authentication according to an embodiment of the present invention; FIG.
FIG. 2 is a schematic diagram showing an example of a personal information management system according to a first embodiment of the present invention. The personal
FIG. 3 is a diagram for explaining a process in which an individual-related-code integrated management using a biometric-information proof is performed on a
FIGS. 4 to 7 are views for explaining a UI screen implemented in the integrated management system for personal information using biometric information authentication according to an exemplary embodiment of the present invention.
FIG. 8 is a diagram showing an example of a personal information management system using personal identification digital information data formed in the database 10a by the code metadata building module 11 of the
FIG. 9 is a flowchart illustrating a method of generating a personal-related code using biometric information authentication according to an exemplary embodiment of the present invention.
FIG. 10 to FIG. 12 are reference drawings showing a method for generating an individual-related code using an individual-related-code integrated management system and biometric-information authentication using a biometric-information authentication certificate according to another embodiment of the present invention.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS Hereinafter, a detailed description of preferred embodiments of the present invention will be given with reference to the accompanying drawings. In the following description of the present invention, detailed description of known functions and configurations incorporated herein will be omitted when it may make the subject matter of the present invention rather unclear.
In the present specification, when any one element 'transmits' data or signals to another element, the element can transmit the data or signal directly to the other element, and through at least one other element Data or signal can be transmitted to another component.
BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 is a diagram illustrating an integrated management system for personal information using biometric information authentication according to an embodiment of the present invention; FIG. FIG. 2 is a schematic diagram showing an example of a personal information management system according to a first embodiment of the present invention. The personal
FIG. 3 is a flow chart illustrating a process in which an individual-related-code integrated management using a biometric-information proof is performed on a
4 to 7 are views for explaining a UI screen implemented in the personal related code integrated management system utilizing the biometric information authentication according to the embodiment of the present invention. FIG. 8 is a diagram showing an example of a personal information management system using personal identification digital information data formed in the database 10a by the code metadata building module 11 of the
Herein, a module may mean a functional and structural combination of hardware for carrying out the technical idea of the present invention and software for driving the hardware. For example, the module may mean a logical unit of a predetermined code and a hardware resource for executing the predetermined code, and it does not necessarily mean a physically connected code or a kind of hardware. Can be easily deduced to the average expert in the field of < / RTI >
Referring to FIG. 1, the personal related code integrated management system using the biometric information authentication certificate includes a user terminal 1, a
The
The search terminal 50 may include a wire search terminal 50a or a wireless search terminal 50b and includes a link code search site CUCK module 51. [
First, the code metadata building module 11, the code introduction and disclosure related
The code meta data construction module 11 is a module for establishing the code meta data of the user terminal 1 by means of the means for proving the user of the user terminal 1 in the form of "image data" obtained by digitizing face, iris, , "Proof of identity digital information data" that proves that the combination of "voice data" digitized voice expressed through the vocal cords of the human body, and "digital scan data" which scanned the national identification card proving the identity of the individual Build.
To this end, the code metadata building module 11 receives facial image data, iris image data, fingerprint image data, voice data, and digital scan data from the personal
Also, in this specification, the database 10a may mean functional and structural combination of software and hardware for storing information corresponding to each database. The database 10a may be implemented as at least one table, and may further include a separate DBMS (Database Management System) for searching, storing, and managing information stored in the database. Also, it can be implemented in various ways such as a linked-list, a tree, and a relational database, and includes all data storage media and data structures capable of storing information corresponding to a database.
In addition to image data, voice data, and digital scan data, the code metadata construction module 11 collects all the "personal-related codes" currently in use in the subcategories of the principal proof digital information code class, And stores them in the database 10a.
Here, the code metadata building module 11 stores the code metadata in the object space web page area of the personal code management server 30 which integrates and manages the code on the database 10a, Output, and storage.
In addition, the code meta data construction module 11 integrates all codes related to the user and performs an integrated index construction as shown in [Table 1] below.
code
Stamp
right
National identity card
right
right
duty
Then, the code metadata building module 11 may collect metadata for personal supplementary information among personal association codes related to social, cultural, spiritual, and physical body as shown in [Table 2] below and store the collected metadata in the database 10a.
2) Korean standard industry classification
2) Korean standard job classification
(International postal code search)
In addition, the code metadata building module 11 may collect the notation method (title code assignment) indicating the authentication means for authentication of the principal and collect it in the database 10a as shown in the following Table 3. [
Subcode
code
(Information
Producer nationality)
code
(Information production
language)
User code
2 digits
English alphabet
User name representation in lower case
Related to that code
Use the code's messenger and storage folder to communicate
2) Set social, cultural, mental, and body related codes such as personal hobbies to be public and private for searching and sharing
Providing personalized information
ISO 3166 national standard classification
standard
Capitalized
Capitalized
The code introduction and disclosure related
That is, the code introduction and disclosure related
The private access
The C-code encapsulation module 14 extracts the international standard code and the international standard language code from the personal association code of the user terminal 1 stored in the database 10a by the code metadata building module 11, Encodes and encrypts the international standard code information and the additional information of the character code and the C code corresponding to the character code represented by the number.
More specifically, since the C-code is formed so as to be easy to distinguish from common characters, the two-digit international standard country code is denoted by capital letters and the two-letter international standard language code is denoted by capital letters , Indicating the address of the user by indicating the international postal code, the name of the individual registered in the country, and the name of the individual registered in the country, in 2-digit Arabic numerals, And international use is written in English).
The C-code thus generated may be the same as "KOKR123-456-01 Hong Kil-dong", where KO is nationality, KR is the language used, 123-456 is the international postal code, 01 is the same name, .
Alternatively, the C-code may be generated for objects other than humans in another embodiment of C-code generation according to input of C-code information. In this case, the code metadata building module 11 The information of the stored object related metadata may be composed of the following items 1) to 9).
1) Classification - Classification of existing and nonexistent (1) Substance - Major classification - Middle classification - Sub classification - User classification, 2 - Non-substance - (ISO standard, related international standard, national standard (based on language used for writing code), personal code currently in use in Korea, ), 4) location information (Google Earth coordinate information, international postal code information), 5) object intelligence communication information (sense IP, user international information code) 8) Information control (1) Document timestamp - File destruction when expiration date and specific items are accessed. (2) General information (1) Recorded as text, images, Etc.) ② Document History - Document path and change extraction), 9) Additional function Information on visitors 5), 6) can be created as a user selection to operate the user terminal 1, and as described above, the C- The code and the Link code described below can be used as general purpose verification codes.
The link code encapsulation module 15 accesses the address by linking the address in the search terminal 50 with respect to the C-code generated by the C-code encapsulation module 14, accesses the address string input, And is formed to facilitate information access.
The link code is formed by encapsulating the link name for linking using the C-code in accordance with the designation of the user operating the user terminal 1, C-code formed by the public-use code data and the user-specified web page address.
On the other hand, the web page address, which is the name of the link designated by the user, can be defined by the letters of each country within 2 to 10 digits, and is formed of a combination of letters and numbers to form a subcode. That is, the personal code name corresponding to the subcode associated with the C-code is preferably represented by a serial number made up of a combination of Arabic numerals and English alphabets.
Here, the Link code designates the link name of the Web page URL (Uniform Resource Locator) with respect to the name of the C-code, and corresponds to the code name expressed by the character recognized by the user of the user terminal 1. [
Accordingly, the Link code is recognized as the information corresponding to the personal code name corresponding to the sub code by the user, and the address of the web page expressed by the hypertext is recognized by the computer terminal.
In addition, the link code corresponds to "Object International Standard Code Integrated Metadata Web page link address" which shows Web pages related to linked Web pages and metadata information by a computer terminal.
Accordingly, the Link code is used by all the administrators related to the user from the international standard classification code, such as the employee number, resident registration number, medical insurance, card, bankbook, telephone number, passport number, car number, membership number, Provides the advantage of encoding everything you use.
In other words, Link code can protect user's personal information by integrating and encapsulating various object information code of user's requested by the administrator into international standard classification metadata, and can only check user's code where user's code is needed Do not allow users to own personal information.
As a simplified example for understanding the link code, an example of converting the homepage address (URL) into Link code is to convert the official homepage of the Sochi Olympic Games as shown in FIG. 4 into "RUEN, sochi2014". In the converted Link code, we can see that the first two digits of the RU, expressed in capital letters of the English alphabet, are the Russian country code and EN is the 2-digit language code. Able to know. This is an example where the web page currently being used is converted into link code only for web page URL without C-code data.
Next, the search logic ring module 16 changes the address of the web page to the user name by providing the search using the link code for the user terminal 1 and the search terminal 50, . The search logic ring module 16 utilizes link codes to form accurate information groups by searching and sharing link code metadata between users.
In addition, the search logic ring module 16 performs a link code management function to perform accessor designation and timestamp operation. That is, the search logic Ling module 16 searches the database 10a and the link code (Link code) by the code meta data building module 11 as shown in the following Table 4 for searching and sharing link code metadata among users. The personal code name of the Link code generated by the encapsulation module 15 can be utilized.
2) Integrated code
3) Additional information
2) Time stamp
3) Messenger
4) Data storage folder
5) Specifying the access specifier for each code
Next, the personal code management server 30 includes a code converter 31 and a dedicated font inverse character processor 32, a
First, the code converter 31 acquires the link code from the user terminal 1 or the search terminal 50 after access to the personal code management server 30 by the user terminal 1 or the search terminal 50 A function of converting the personal code name into a personal web page address indicating the user of the user terminal 1 and returning it to the user terminal 1 or the search terminal 50 via the
[Table 5] shows the code conversion process performed by the code converter 31 separately.
Next, the special type inverse character processor 32 performs a function of directly connecting to a personal information web page matched with the personal code name upon input in the reverse order to the personal code name corresponding to the address code.
In other words, the link code uses the "special font reverse character". In the personal code name of the link code, important contents can be indicated as dedicated characters by using a special font reverse character, and a terminal which does not have an application that does not support a special font reverse character recognizes as an error, It is possible to implement a non-licensor access blocking function.
FIG. 5 shows that a special font reverse character is actually implemented, and corresponds to a modification of the characters used in each country by the horizontal flip technique. A password that designates an access designator using a special typeface character that expresses alphabets and Arabic numerals of the world's languages in reverse (expresses the alphabet of each country horizontally in place of the syllable where the alphabet is located) The name of the personal code in which the link is placed is represented by a dedicated reverse-character typeface, making it impossible to access a system that does not support the font.
In addition, it can be used for passwords and links so that the public can easily recognize that a link to a web page is hung on the basis of the recognition of a special font reverse character.
The
As a more specific example, if the official password is "12345", it is recommended that the red password, which is a dangerous password, is designated by specifying only one digit from "13345" to 2-> 3.
The method of releasing the risk for the red password by the
Next, the principal authentication code generator 34 of the personal code management server 30 can issue the principal authentication code. More specifically, the principal's authentication code generator 34 recognizes, by a scan, the issuer's personal identification card of the principal's authentication code in the first step, and receives the face identification of the person to be issued using the smartphone of the person to be issued in the second step, In the third step, the issuer's iris recognition is provided using the smartphone of the issuer. In the fourth step, the issuer's fingerprint recognition is provided using the smartphone of the issuer. In the fifth step, To be provided using the smartphone of the person to be issued.
After that, the authentication code generator 34 stores the identification information, the facial recognition data, the iris recognition data, the fingerprint identification data, and the voice recognition data, which are acquired by the first through fifth steps, respectively, , And the Link code is issued as the authentication code.
Next, the principal authentication code generator 34 acquires principal identifying digital information data metadata. Here, the proof-of-proof digital information data metadata may include code accessor IP tracking and recording, equipped with a timestamp function, and accessible information only at the designated time.
The identity verification code generator (34) issues an access designator temporary password to the requesting individual information requestor. To this end, the identity verification code generator 34 has a function of: 1) requesting an information requester ID or code request such as a personal information requester business registration certificate and identification card, 2) storing the identification certificate in the verification document browsing folder, 3) 4) Only search is possible. Locking device can not capture, store or print any information. When the disclosure request is made, it will notify the requestor of the disclosure. do.
The temporary password issuing device 35 of the personal code management server 30 issues the access designation temporary password to the administrator requesting the personal information of the user stored in the database 10a. That is, the temporary password issuing device 35 requests the submission of the business registration certificate and the business entity link code of the manager requesting the personal information to the first step, stores the personal code name of the business link code in the second step, Expiration date, provision of temporary password with tracing of document history, personal information request Administrator access to information provider Link code Confirm personal information, step 4, automatic expiration of temporary password after expiration of expiration date, withdrawal of membership, Termination of the temporary password based on the termination and erasure time.
Next, the Link code search site CUCK module 51 of the search terminal 50 provides the UI screen as shown in FIG. 6 to the wire search terminal 50a on the search initial screen, and the link search site CUCK module 51 7 < / RTI >
Referring to FIG. 6, the link code search site CUCK module 51 may implement a search program initial screen as a wallpaper of the wireline search terminal 50a.
Here, the upper center of the UI screen is used as a communication window with users such as an event, a notice, and an advertisement video (a user-customized advertisement). That is, the central interruption of the UI screen is implemented in such a manner that a user searches for a product without searching for a merchandise sales person through a search for a user to input an advertisement search word and a search word related advertisement, And search for people who match the code for each region). Next, the bottom part of the UI screen realizes real-time view and statistics of my code users. On the left side of the UI screen, the user's family, relatives, and other loved ones are implemented. When each picture image (picture) is clicked, Implement a personal code shortcut left-side extension. The right side of the UI screen realizes a right side expansion such as a hobby, a living, a workplace, a school, a finance, an e-mail, a portal site, a life group, a photograph, a picture image or a pictogram and a document folder of the wire search terminal 50a.
Referring again to FIG. 2, a lock is established between the user's web page on the personal code management server 30 and the code converter 31, thereby protecting the verification means.
A lock is also established between the database 10a of the
More specifically, it is equipped with a lock function that can only retrieve information by the LOCK function and can not take information out of the code. The access designator password input character is written in a special font reverse character designed separately, and the red password processor 33) Password for password protection in the password Protection for the verification means is implemented by implementation of Red Password.
Here, Red password is a password that is given to the person in charge to provide important information and financial transaction that is not confirmed. It is a password that receives a warning notice. It works the same as the password function, but a danger warning is displayed on the place where the password is used. All relationship network systems, such as account tracking, are used to be monitored and recorded.
Next, referring to FIG. 8, when an online connection to the document owner server 60 for issuing a public electronic document is performed, the document owner (document authority and issuing authority) and the authentication (security company) institution server 70 ) And the document claimant terminal 80 concurrently access the electronic document link code authentication system 90 at the same time.
Thereafter, the document owner server 60 authenticates the issuer by remote control. In the first step, the document-ownership server 60 transmits a personal identification number (Link code personal information registration password and a personal identification card) to the document owner server 60, ), The issuer fingerprint recognition (smartphone) as the fourth step, and the voice recognition (smartphone) as the issuance target person in the fifth step, and a final confirmation process by the
9 is a flowchart showing a method for generating a personal-related code using the biometric information authentication based on the personal-related code integrated management system utilizing the biometric information authentication certificate described in Figs. 1 to 8 according to the embodiment of the present invention to be.
Referring to Figs. 1 to 9, the
Here, in generating the proof-of-proof digital information data, the
After step S11, the
The
More specifically, the
After step S13, the
After step S14, the
10 to 12 are reference diagrams illustrating a method for generating a personal association code using the biometric information authentication system and the biometric information authentication system using the biometric information authentication system according to another embodiment of the present invention.
That is, FIG. 10 shows a structure of a modified example of the C-code, and FIGS. 11 and 12 are views showing a modified example in which a target object of C-code and Link code is changed into a thing.
The present invention can also be embodied as computer-readable codes on a computer-readable recording medium. A computer-readable recording medium includes all kinds of recording apparatuses in which data that can be read by a computer system is stored.
Examples of the computer-readable recording medium include a ROM, a RAM, a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device and the like, and also implemented in the form of a carrier wave (for example, transmission over the Internet) .
The computer readable recording medium may also be distributed over a networked computer system so that computer readable code can be stored and executed in a distributed manner. And functional programs, codes, and code segments for implementing the present invention can be easily inferred by programmers skilled in the art to which the present invention pertains.
As described above, preferred embodiments of the present invention have been disclosed in the present specification and drawings, and although specific terms have been used, they have been used only in a general sense to easily describe the technical contents of the present invention and to facilitate understanding of the invention , And are not intended to limit the scope of the present invention. It is to be understood by those skilled in the art that other modifications based on the technical idea of the present invention are possible in addition to the embodiments disclosed herein.
10: Code Provider Server
10a: Database
11: Module for building code metadata
12: code introduction and association related information management module
13: Closed access designator assignment module
14: C-code encapsulation module
15: Link code encapsulation module
16: Search Logic Ling module
20: Personal information system server
30: Personal code management server
31: Code converter
32: Dedicated font reverse character processor
33: Red password handler
34: Personal authentication code generator
35: Temporary password issuer
40: Network
50: Search terminal
50a: a wire search terminal
50b: wireless search terminal
51: Link code search site CUCK module
60: Document ownership server
70: Certification Authority server
80: document requesting terminal
90: Electronic document Link code authentication system
Claims (12)
(1), which is an external characteristic of a body organization capable of recognizing a person of each person in the means of verifying the user of the user terminal (1), and "image data" in which the image of the face, iris, Proof digital information data "proving the identity of the user by combining" voice data "obtained by digitizing a voice to be digitized and" digital scan data " A code metadata building module 11 for collecting all of the personal-related codes currently used in the sub-category of the proof-of-proof digital information code class, in addition to the digital scan data, and building up the related metadata in the database 10a, ; And a personal identification code management system using the biometric information identification certificate.
The C code that encodes and encrypts the international standard country code, the international standard language code, the international standard code information, and the additional information in the person-related code of the proof-of-person digital information data to generate the C-code corresponding to the character code -code encapsulation module 14; And
A Link code encapsulation module 15 for encapsulating the personal code name corresponding to the C-code and the user-specified web page address to generate Link code; And a personal information management system for managing the personal information of the user.
A code introduction and disclosure association information management module 12 for performing disclosure setting of a security level in advance for a user designated by the user for information management among digital proof data of the user; And
A private access designator designating module (13) for performing group specific accessor designation setting according to the group public setting for a user previously designated by the user for information management of the digital proof data; And a personal information management system for managing the personal information of the user.
Link code is generated so that the user terminal 10 or the search terminal 50 accesses the C-code by linking the address, accesses the address string input, or scans the digital camera for the identification digital information data An integrated management system for personal information related to biometric information using personal identification.
Upon receiving the personal code name included in the Link code from the user terminal 1 or the search terminal 50 after the access by the user terminal 1 or the search terminal 50, A code converter 31 for converting the personal web page address into a personal web page address representing the user of the user terminal 1 and returning it to the user terminal 1 or the search terminal 50 via the communication network 40; And an integrated management system for the individual related code utilizing the biometric information authentication certificate.
A special font reverse character processor that provides a special font reverse character for the personal code name of the Link code so that it is directly connected to the personal information web page matching the personal code name upon input in reverse order to the personal code name corresponding to the address code (32); And a personal information management system for managing the personal information using the biometric information authentication certificate.
A Red password processor 33 for performing transmission processing for Red Password in a critical alert message to a business operator terminal in case of providing an unconfirmed financial transaction and important information; And a personal information management system for managing the personal information using the biometric information authentication certificate.
The identification card of the person to be issued of the authentication code is recognized by the scan, the face recognition of the person to be issued is provided using the smartphone of the person to be issued, the iris recognition of the person to be issued is provided using the smartphone of the person to be issued, The face recognition data, the iris recognition data, the fingerprint recognition data, and the voice recognition data, which are obtained by using the smartphone of the person to be issued and provided by using the smartphone of the person to be issued, A personal identification code generator (34) for storing the personal identification digital information data and then issuing the Link code as a personal identification code; And a personal information management system for managing the personal information using the biometric information authentication certificate.
The code provider server 10 encapsulates and encrypts the international standard country code, the international standard language code, and the international standard code information and the additional information among the proof-of-identity digital information data to generate a C-code corresponding to a character code represented by letters and numbers ; And
A third step of the code provider server 10 encapsulating the personal code name corresponding to the C-code and the user-specified web page address to generate Link code; Generating a personalized code using the biometric information authentication certificate.
The code provider server 10 has a function of verifying the user of the user terminal 1, the "image data" obtained by digitizing the face, iris, and fingerprint image, which are external characteristics of the body organization capable of recognizing individual persons, "Personal identification digital information data" proving that the person is a person is constructed by combining "voice data" digitizing voice expressed through vocal cords, which are internal organization of human body, and "digital scan data" scanning national identification card proving the identity of individual In addition,
In addition to image data, voice data, and digital scan data, all of the personal-related codes currently being used in the subcategories of the proof-of-information digital information code class are cataloged into indexes and related metadata is constructed and stored in the database 10a A method for generating a personal code using biometric information proof of identity.
The code provider server 10 performs disclosure setting of the security level of the personal identification digital information data in advance for the information designated by the user for information management in advance; And
The code provider server 10 performs setting of the group accessor designation according to the group disclosure setting in advance of the user identification digital information data designated by the user for information management in advance; And generating a personalized code based on the proof of the biometric information.
The code provider server 10 accesses the C-code by linking an address in the user terminal 10 or the search terminal 50 or accesses the address string input or scans it with a digital camera to access the proof digital information data And generating a link code for the biometric information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020140059765A KR20150133357A (en) | 2014-05-19 | 2014-05-19 | Total management system of individual information code using user's authentication based on bionic information, and generation method of individual information code using user's authentication of bionic information |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020140059765A KR20150133357A (en) | 2014-05-19 | 2014-05-19 | Total management system of individual information code using user's authentication based on bionic information, and generation method of individual information code using user's authentication of bionic information |
Publications (1)
Publication Number | Publication Date |
---|---|
KR20150133357A true KR20150133357A (en) | 2015-11-30 |
Family
ID=54867834
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020140059765A KR20150133357A (en) | 2014-05-19 | 2014-05-19 | Total management system of individual information code using user's authentication based on bionic information, and generation method of individual information code using user's authentication of bionic information |
Country Status (1)
Country | Link |
---|---|
KR (1) | KR20150133357A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101885082B1 (en) * | 2017-11-01 | 2018-08-03 | 정우열 | Ubiquitous Code System |
KR101961654B1 (en) * | 2018-11-30 | 2019-03-27 | 성결대학교 산학협력단 | Non-storage data recording system and non-storage data providing method by QR code |
WO2022098189A1 (en) * | 2020-11-09 | 2022-05-12 | 주식회사 고스트패스 | Identity authentication system using user biometric information |
-
2014
- 2014-05-19 KR KR1020140059765A patent/KR20150133357A/en active IP Right Grant
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101885082B1 (en) * | 2017-11-01 | 2018-08-03 | 정우열 | Ubiquitous Code System |
KR101961654B1 (en) * | 2018-11-30 | 2019-03-27 | 성결대학교 산학협력단 | Non-storage data recording system and non-storage data providing method by QR code |
WO2022098189A1 (en) * | 2020-11-09 | 2022-05-12 | 주식회사 고스트패스 | Identity authentication system using user biometric information |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11928197B2 (en) | Method for providing an authenticated digital identity | |
US10262191B2 (en) | System and method for manufacturing and inspecting identification documents | |
CN110462658B (en) | System and method for providing digital identity records to verify the identity of a user | |
US11063952B2 (en) | Identity authentication and information exchange system and method | |
US9805213B1 (en) | Identity validation and verification system and associated methods | |
CN111711520B (en) | Authentication in ubiquitous environments | |
US8275995B2 (en) | Identity authentication and secured access systems, components, and methods | |
Fu | Integrated technologies of blockchain and biometrics based on wireless sensor network for library management | |
EP3756131A1 (en) | Systems and methods for providing mobile identification of individuals | |
US8074878B1 (en) | System and method of pre-approving applicants for visa processing using an emerging country's international travel approval control card | |
KR20150133357A (en) | Total management system of individual information code using user's authentication based on bionic information, and generation method of individual information code using user's authentication of bionic information | |
JP2010072688A (en) | Personal identification system using optical reading code | |
US10210684B2 (en) | System and method for identity verification in a detention environment | |
US8944321B1 (en) | Information processing using machine-readable codes | |
CA3183996A1 (en) | Computer system, method, and device for verifying an immunization status | |
Warfel | Identification Technologies: computer, optical, and chemical aids to personal ID | |
JP6371938B2 (en) | Personal authentication system using fingerprint verification | |
US8826389B2 (en) | Multi-media identity management system | |
JP4718131B2 (en) | Personal information management system | |
US20230342440A1 (en) | System for system for creating and storing verified digital identities | |
US20230254688A1 (en) | Method of digitization and acquisition of sensitive data on mobile devices that ensures the safety and integrity of the data | |
Beynon-Davies | Personal identification in the information age: the case of the national identity card in the UK | |
KR101812639B1 (en) | Method and system for managing documents | |
Devi | Biometric Data, Identification and Authentication in India-Legal Framework, Challenges and Impact | |
US20190124500A1 (en) | Method of digitization and acquisition of sensitive data on mobile devices that ensures the safety and integrity of the data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A201 | Request for examination | ||
E902 | Notification of reason for refusal | ||
E701 | Decision to grant or registration of patent right |