TW202336649A - System of designing integrated circuit device,integrated circuit device and operating method thereof - Google Patents

System of designing integrated circuit device,integrated circuit device and operating method thereof Download PDF

Info

Publication number
TW202336649A
TW202336649A TW111108641A TW111108641A TW202336649A TW 202336649 A TW202336649 A TW 202336649A TW 111108641 A TW111108641 A TW 111108641A TW 111108641 A TW111108641 A TW 111108641A TW 202336649 A TW202336649 A TW 202336649A
Authority
TW
Taiwan
Prior art keywords
person
storage space
personal
network storage
electronic chip
Prior art date
Application number
TW111108641A
Other languages
Chinese (zh)
Other versions
TWI840765B (en
Inventor
樂鴻 田
Original Assignee
香港商米沃有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 香港商米沃有限公司 filed Critical 香港商米沃有限公司
Priority to TW111108641A priority Critical patent/TWI840765B/en
Priority claimed from TW111108641A external-priority patent/TWI840765B/en
Publication of TW202336649A publication Critical patent/TW202336649A/en
Application granted granted Critical
Publication of TWI840765B publication Critical patent/TWI840765B/en

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

This invention is related to a method for transferring data carrying personal inner message, including associating an internet storage space with an electronic chip embedded in a personal item belonging to a first person, and associating the electronic chip with the first person and her/his first access authority to the internet storage space; accessing the internet storage space by the first person, and uploading a personal data to the internet storage space by the first person, with the personal data carrying an inner message of said first person; passing the personal item from the first person to a second person who is related to the first person, and authenticating the second user a second access authority to the internet storage space by the first person; and accessing the internet storage space via accessing the electronic chip by the second person, and retrieving the personal data by the second person. This invention also relates to corresponding system and apparatus. According to this invention, personal item and the emotion/memory carried there on are firmly and privately associated, reserved and passed.

Description

傳遞個人內心資訊的方法和系統Methods and systems for conveying personal inner information

本發明涉及一種傳遞個人內心資訊的方法,特別地,涉及一種傳遞承載個人內心資訊的資料的方法。本發明還涉及相應的系統。The present invention relates to a method of transmitting personal inner information, and in particular, to a method of transmitting data carrying personal inner information. The invention also relates to corresponding systems.

人們會將禮物贈予他們的親朋好友,這些禮物往往包含了個人的情感,具有重大的紀念意義。傳統方式中,人們會在禮物中夾入寫有箴言的紙條或者照片等承載個人情感與記憶的物品。但這些物品有可能會在長期保存中丟失,或被與禮物放置在不同的地方從而被忘記與禮物的聯繫。並且,由於受限於物品的物理形式,其承載的個人情感與記憶的方式也受到限制。隨著資訊技術的發展,人們會以電子資料的形式存放照片,不過這些照片又往往難以與特定的禮物聯繫在一起,並且其私密性也往往難以保證。People give gifts to their relatives and friends, and these gifts often contain personal emotions and have great commemorative significance. In the traditional way, people would include notes with mottos or photos and other items that carry personal emotions and memories in their gifts. However, these items may be lost during long-term storage, or may be placed in a different place from the gift and their connection with the gift may be forgotten. Moreover, due to the physical form of the object, the way it can carry personal emotions and memories is also limited. With the development of information technology, people will store photos in the form of electronic data. However, these photos are often difficult to associate with specific gifts, and their privacy is often difficult to guarantee.

需要一種方法,將贈送的禮物與其上承載的個人情感與記憶在時間長河中正確地、牢固地、並且以私密的方式聯繫及儲存起來。A method is needed to connect and store the gift and the personal emotions and memories it contains correctly, firmly, and privately over time.

現有技術中,會使用RFID與區塊鏈技術來儲存一些可溯源資訊。例如,CN110288354A公開了提供一種基於區塊鏈技術的標籤追溯系統,其製作RFID防偽標籤,並建立由智慧終端機展示的區塊鏈追溯系統,將RFID防偽標籤中產品資訊寫入區塊鏈追溯系統中;用戶可以將自動獲取的私密金鑰輸入智慧終端機通過智慧終端機訪問進區塊鏈追溯系統,區塊鏈系統將顯示產品來源資訊、生產資訊、以及其他需要追溯資訊;其以區塊鏈網路來對產品追溯資料記錄以保證資訊的真實性和可靠性。CN110458585A、 CN109377274A、CN110505239A 以及CN110597841A中也公開了類似的方法。但是,這些仍然沒有解決之前提出的問題。In existing technology, RFID and blockchain technology are used to store some traceable information. For example, CN110288354A discloses a label traceability system based on blockchain technology, which produces RFID anti-counterfeiting labels, establishes a blockchain traceability system displayed by smart terminals, and writes the product information in the RFID anti-counterfeiting labels into the blockchain traceability In the system; users can enter the automatically obtained private key into the smart terminal and access the blockchain traceability system through the smart terminal. The blockchain system will display product source information, production information, and other traceability information; it distinguishes The blockchain network records product traceability data to ensure the authenticity and reliability of the information. Similar methods are also disclosed in CN110458585A, CN109377274A, CN110505239A and CN110597841A. However, these still do not address the issues raised previously.

本發明將致力於解決上述問題,將個人物品上承載的個人內心資訊正確地、牢固地、私密地傳遞下去。本發明意義上的個人內心資訊,是指能夠觸動個人內心的資訊,比如引發個人情感、喚起個人回憶、對個人來說具有紀念意義、或賦予個人某種強烈動機的資訊。The present invention will be dedicated to solving the above problems and transmitting personal inner information carried on personal items correctly, firmly and privately. Personal inner information in the sense of the present invention refers to information that can touch an individual's heart, such as information that triggers personal emotions, evokes personal memories, is of commemorative significance to the individual, or gives the individual some strong motivation.

根據本發明的一個主要方面,提供一種用於傳遞承載個人內心資訊的資料的方法,其中包括以下步驟:According to a main aspect of the present invention, a method for transmitting data carrying personal inner information is provided, which includes the following steps:

將網路儲存空間與嵌入在屬於第一人的個人物品中的電子晶片相關聯,並將該電子晶片與第一人及其訪問該網路儲存空間的第一許可權相關聯;associating the network storage space with an electronic chip embedded in personal belongings belonging to the first person, and associating the electronic chip with the first person and his first permission to access the network storage space;

由第一人通過訪問該電子晶片而訪問該網路儲存空間,並由第一人向該網路儲存空間上傳承載其個人內心資訊的個人資料;The first person accesses the network storage space by accessing the electronic chip, and the first person uploads personal data carrying his/her personal inner information to the network storage space;

第一人將該個人物品轉移給與第一人有關係的第二人,並由第一人授予第二人對該網路儲存空間的第二存取權限;以及The first person transfers the personal items to a second person who is related to the first person, and the first person grants the second person second access rights to the network storage space; and

由第二用戶通過訪問該電子晶片而訪問該網路儲存空間,並由第二人獲取該個人資料。The second user accesses the network storage space by accessing the electronic chip, and the second person obtains the personal information.

優選地,該網路儲存空間是網頁連結。Preferably, the network storage space is a web link.

優選地,該第二人與第一人有情感上的聯繫。Preferably, the second person has an emotional connection with the first person.

優選地,該第二人與第一人有血緣關係。Preferably, the second person is related by blood to the first person.

優選地,該個人資料也承載第二人的個人內心資訊。Preferably, the personal data also carries the second person's personal inner information.

優選地,該個人資料是該一人發出的能夠在情感上觸動第二人的有意義的資訊。Preferably, the personal data is meaningful information sent by the one person that can emotionally touch the second person.

優選地,當第一人把該個人物品轉移給第二人時,也把該個人物品的所有權轉移給該第二人。Preferably, when the first person transfers the personal item to the second person, ownership of the personal item is also transferred to the second person.

優選地,對該網路儲存空間的第一存取權限包括在該空間上上傳、修改、讀取和刪除資料。Preferably, the first access right to the network storage space includes uploading, modifying, reading and deleting data on the space.

優選地,對該網路儲存空間的第一存取權限包括對其他用戶設定資料的存取權限和訪問密碼。Preferably, the first access permission to the network storage space includes the access permission and access password to other users' setting data.

優選地,對該網路儲存空間的第二存取權限包括在該空間上讀取資料。Preferably, the second access right to the network storage space includes reading data on the space.

優選地,對該網路儲存空間的第二存取權限包括設定用於該第二人的訪問密碼。Preferably, the second access permission to the network storage space includes setting an access password for the second person.

優選地,該第二存取權限與第一存取權限一致。Preferably, the second access permission is consistent with the first access permission.

優選地,對該網路儲存空間的第二存取權限是根據第一人與第二人的關係而個性化的。Preferably, the second access permission to the network storage space is personalized based on the relationship between the first person and the second person.

優選地,第二人的個性化的許可權是由第一人設定或批准的。Preferably, the second person's personalized permissions are set or approved by the first person.

優選地,訪問電子晶片包括使用特定姿勢來使電子晶片接近讀卡器。Preferably, accessing the electronic chip includes using a specific gesture to bring the electronic chip close to the card reader.

優選地,該特定姿勢是“輕叩”手勢Preferably, this particular gesture is a "tapping" gesture

優選地,該網路儲存空間與該電子晶片的關聯儲存在區塊鏈中。Preferably, the association between the network storage space and the electronic chip is stored in the blockchain.

優選地,該電子晶片與第一人身份及其存取權限的關聯儲存在區塊鏈中。Preferably, the association of the electronic chip with the first person's identity and its access rights is stored in the blockchain.

優選地,該電子晶片與第二人身份及其存取權限的關聯儲存在區塊鏈中。Preferably, the association between the electronic chip and the second person's identity and access rights is stored in the blockchain.

優選地,該電子晶片與訪問者身份及其存取權限的關聯儲存在區塊鏈中。Preferably, the association of the electronic chip with the visitor's identity and access rights is stored in the blockchain.

優選地,該電子晶片與訪問者身份及其存取權限的關聯在該訪問者獲得該嵌有該晶片的物品之前就完成。Preferably, the association of the electronic chip with the visitor's identity and access rights is completed before the visitor obtains the item embedded with the chip.

優選地,該電子晶片是加密的。Preferably, the electronic chip is encrypted.

本發明還提供一種用於傳遞承載個人內心資訊的資料的方法,其中包括以下步驟:The present invention also provides a method for transmitting data carrying personal inner information, which includes the following steps:

將網路儲存空間與嵌入在屬於第一人的個人物品中的電子晶片相關聯,並將該電子晶片與訪問該網路儲存空間的第一許可權相關聯;associating the network storage space with an electronic chip embedded in personal belongings belonging to the first person, and associating the electronic chip with a first permission to access the network storage space;

使用第一許可權訪問該網路儲存空間,並向該網路儲存空間上傳承載該第一人個人內心資訊的個人資料;Use the first permission to access the network storage space and upload personal data carrying the first person's personal inner information to the network storage space;

授予訪問該網路儲存空間的第二許可權,並將該電子晶片與第二許可權相關聯;以及Grant a second permission to access the network storage space and associate the electronic chip with the second permission; and

使用第二許可權訪問該網路儲存空間,並獲取該個人資料。Use secondary permissions to access the network storage space and obtain the personal data.

優選地,由第一人設定訪問該網路儲存空間的第二許可權。Preferably, the first person sets the second permission to access the network storage space.

根據本發明的另一方面,提供一種用於傳遞承載個人內心資訊的資料的方法,其中包括以下步驟:According to another aspect of the present invention, a method for transmitting data carrying personal inner information is provided, which includes the following steps:

由第一人訪問該網路儲存空間,並由第一人向該網路儲存空間上傳承載其個人內心資訊的個人資料;The first person accesses the online storage space, and the first person uploads personal data carrying his/her personal inner information to the online storage space;

將網路儲存空間與嵌入在屬於第一人的個人物品中的電子晶片相關聯,並將該電子晶片與第一人及其訪問該網路儲存空間的第一許可權相關聯;associating the network storage space with an electronic chip embedded in personal belongings belonging to the first person, and associating the electronic chip with the first person and his first permission to access the network storage space;

第一人將該個人物品轉移給與第一人有關係的第二人,並由第一人授予第二人對該網路儲存空間的第二存取權限;以及The first person transfers the personal items to a second person who is related to the first person, and the first person grants the second person second access rights to the network storage space; and

由第二人通過訪問該電子晶片而訪問該網路儲存空間,並由第二人獲取該個人資料。The second person accesses the network storage space by accessing the electronic chip, and the second person obtains the personal information.

根據本發明的又一方面,提供一種用於傳遞承載個人內心資訊的資料的方法,其中包括以下步驟:According to another aspect of the present invention, a method for transmitting data carrying personal inner information is provided, which includes the following steps:

由第一人訪問該網路儲存空間,並由第一人向該網路儲存空間上傳承載其個人內心資訊的個人資料;The first person accesses the online storage space, and the first person uploads personal data carrying his/her personal inner information to the online storage space;

將網路儲存空間與嵌入在屬於第一人的個人物品中的電子晶片相關聯,並將該電子晶片與第一人及其訪問該網路儲存空間的第一許可權相關聯;associating the network storage space with an electronic chip embedded in personal belongings belonging to the first person, and associating the electronic chip with the first person and his first permission to access the network storage space;

第一人將該個人物品轉移給與第一人有關係的第二人;以及The first person transfers the personal item to a second person who is related to the first person; and

由第二人通過訪問該電子晶片而訪問該網路儲存空間,並由第二人獲取該個人資料。The second person accesses the network storage space by accessing the electronic chip, and the second person obtains the personal information.

根據本發明的另一方面,提供一種傳遞承載個人內心資訊的資料的系統,其包括:According to another aspect of the present invention, a system for transmitting data carrying personal inner information is provided, which includes:

具有紀念意義的物品,commemorative items,

嵌入在個人物品中的電子晶片,electronic chips embedded in personal belongings,

關聯到該電子晶片的網路儲存空間,以及the network storage space associated with the electronic chip, and

用於訪問該網路儲存空間的第一許可權First permission to access this network storage space

其中,該電子晶片與訪問該網路儲存空間的第一許可權相關聯;並且第一訪問者能夠利用該第一許可權訪問該網路儲存空間並在該網路儲存空間上傳承載第一訪問者個人內心資訊的個人資料。Wherein, the electronic chip is associated with a first permission to access the network storage space; and the first visitor can use the first permission to access the network storage space and upload and carry the first access in the network storage space Personal data of personal inner information.

優選地,該系統還包括使用第一許可權上傳到該網路儲存空間的承載個人內心資訊的個人資料。Preferably, the system also includes personal data carrying personal inner information uploaded to the network storage space using the first permission right.

優選地,該系統還包括用於訪問該網路儲存空間的第二許可權,並且該電子晶片還與第二許可權相關聯。Preferably, the system further includes a second permission for accessing the network storage space, and the electronic chip is also associated with the second permission.

優選地,第二訪問者能夠利用該第二許可權訪問該網路儲存空間,並獲取該個人資料。Preferably, the second visitor can use the second permission to access the network storage space and obtain the personal information.

根據本發明的又一方面,提供一種傳遞承載個人內心資訊的資料的唇膏,其包括:According to another aspect of the present invention, a lipstick is provided that delivers data carrying personal inner information, which includes:

殼體shell

嵌入在殼體上的電子晶片,以及an electronic chip embedded in the housing, and

貼合在殼體上並蓋住電子晶片的塑膠蓋;A plastic cover that fits on the casing and covers the electronic chip;

其中,in,

該電子晶片關聯到網路儲存空間,並關聯到用於訪問該網路儲存空間的第一許可權;並且第一訪問者能夠利用該第一許可權訪問該網路儲存空間並在該網路儲存空間上傳承載第一訪問者個人內心資訊的個人資料。The electronic chip is associated with the network storage space and is associated with the first permission for accessing the network storage space; and the first visitor can use the first permission to access the network storage space and access the network storage space on the network. The storage space uploads personal data that carries the first visitor's personal inner information.

優選地,所述電子晶片是NFC標籤。Preferably, the electronic chip is an NFC tag.

優選地,所述殼體包括底部殼體和上部殼體,所述上部殼體以螺紋或卡扣的形式安裝在所述底部殼體上。Preferably, the housing includes a bottom housing and an upper housing, and the upper housing is installed on the bottom housing in the form of threads or snaps.

優選地,塑膠蓋設置在上部殼體上,靠近唇膏的中段。Preferably, the plastic cover is provided on the upper shell, close to the middle section of the lipstick.

優選地,塑膠蓋是圓形的。Preferably, the plastic cover is round.

優選地,殼體是金屬的,而塑膠蓋下方還有一條細縫。Preferably, the housing is made of metal and there is a thin slit under the plastic cover.

優選地,細縫延伸到上部殼體的下端。Preferably, the slit extends to the lower end of the upper housing.

根據本發明,解決了將禮物與其上承載的個人情感與記憶相聯繫,並長時間地、牢固地並且私密地保存和傳遞的問題。According to the present invention, the problem of linking a gift with the personal emotions and memories carried thereon and preserving and delivering it firmly, securely and privately for a long time is solved.

通過結合附圖進行閱讀,將會更好地瞭解以上概述以及以下詳細描述。為了便於說明,附圖中示出本公開的某些實施例。但是,應當理解,本發明並不局限於所示的準確佈置和工具。結合到本說明書中並且構成其部分的附圖示出按照本發明的系統和設備的實現,並且連同本描述一起用來說明按照本發明的優點和原理。The above overview and the following detailed description will be better understood by reading in conjunction with the accompanying drawings. For ease of illustration, certain embodiments of the present disclosure are illustrated in the drawings. It should be understood, however, that this invention is not limited to the precise arrangements and instrumentalities shown. The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate implementations of systems and apparatus in accordance with the invention and together with the description serve to explain the advantages and principles in accordance with the invention.

在詳細說明本發明的至少一個實施例之前,要理解,本發明並不局限於它在以下描述中提出或者在附圖中示出的構造的細節以及組件的佈置的應用。提供附圖和書面描述,以指導本領域的技術人員進行和使用對其尋求專利保護的本發明。本發明適用於其他實施例並且能夠按照各種方式來實施和執行。本領域的技術人員將會理解,為了清楚起見和便於瞭解,並非示出一商業實施例的所有特徵。本領域的技術人員還將會理解,結合本發明的方面的實際商業實施例的開發將要求許多實現特定判定來取得開發人員的商業實施例的最終目標。雖然這些工作會是複雜和費時的,但是這些工作是獲益於本公開的領域的技術人員例行任務。Before at least one embodiment of the present invention is explained in detail, it is to be understood that this invention is not limited in its application to the details of construction and the arrangement of components set forth in the following description or illustrated in the drawings. The drawings and written description are provided to teach one skilled in the art to make and use the invention for which patent protection is sought. The invention is capable of other embodiments and of being practiced and carried out in various ways. Those skilled in the art will appreciate that, for the sake of clarity and ease of understanding, not all features of a commercial embodiment are shown. Those skilled in the art will also appreciate that the development of actual commercial embodiments incorporating aspects of the present invention will require many implementation-specific decisions to achieve the developer's ultimate goal of a commercial embodiment. Although these efforts may be complex and time-consuming, they are routine tasks for those skilled in the art having the benefit of this disclosure.

另外,要理解,本文所採用的用語和術語是為了便於描述,而不應當被視作限制。例如,單數術語、例如“一”、“一個”的使用不是意在限制項的數量。另外,非限制性地諸如“頂部”、“底部”、“左”、“右”、“上”、“下”、“向下”、“向上”、“側”之類的關係術語的使用為了清楚起見而具體參照附圖用於本描述中,而不是意在限制本發明或者所附申請專利範圍。此外,應當理解,本發明的特徵的任一個可單獨地或者與其他特徵結合使用。通過閱讀附圖和詳細描述,本領域的技術人員將會清楚地知道本發明的其他系統、方法、特徵和優點。預計所有這類其他系統、方法、特徵和優點都包含在本描述之內,包含在本發明的範圍之內,並且受到所附申請專利範圍保護。In addition, it is to be understood that the phraseology and terminology employed herein are for convenience of description and should not be regarded as limiting. For example, use of singular terms such as "a" and "an" is not intended to limit the number of items. In addition, the use of relational terms such as, without limitation, "top", "bottom", "left", "right", "upper", "lower", "down", "upward", "side" Specific reference is made to the drawings in this description for the sake of clarity and is not intended to limit the scope of the invention or the appended claims. Furthermore, it is to be understood that any of the features of the invention may be used alone or in combination with other features. Other systems, methods, features, and advantages of the present invention will become apparent to those skilled in the art upon review of the accompanying drawings and detailed description. It is intended that all such other systems, methods, features and advantages be included within this description, be within the scope of the invention, and be protected by the patent claims of the appended claims.

本說明書中描述的主題的實施例以及功能性操作,可選地能夠實現在數位電路、或電腦軟體、韌體、硬體中,包括在本說明書中公開的結構及其等同結構,或其中一個或多個的結合。本說明書中描述的主題的實施例可以例如實現在一個或多個電腦程式產品中,例如一個或多個電腦指令模組,其編碼在電腦可讀媒體中,用於被資料處理裝置執行,或控制其運行。The embodiments and functional operations of the subject matter described in this specification can optionally be implemented in digital circuits, or computer software, firmware, or hardware, including the structures disclosed in this specification and their equivalent structures, or one of them or a combination of more than one. Embodiments of the subject matter described in this specification may be implemented, for example, in one or more computer program products, such as one or more computer instruction modules encoded in a computer-readable medium for execution by a data processing device, or control its operation.

圖1示意性顯示了根據本發明的一個實施例的傳遞承載個人情感的資料的方法。Figure 1 schematically shows a method for transmitting data carrying personal emotions according to one embodiment of the present invention.

概括地來說,該方法100主要包括幾個步驟:首先,在步驟101中,將嵌入在屬於第一用戶的個人物品中的電子晶片與一處網路儲存空間相關聯,並將第一用戶及其訪問該網路空間的許可權與該電子晶片相關聯;其次,在步驟102中,由第一用戶訪問該網路空間,上傳承載其個人情感的資料;再次,在步驟103中,第一用戶將物品轉移給第二用戶,並使第二用戶具有對該網路空間的存取權限;最後,在步驟104中,第二用戶訪問該網路空間,並獲取承載第一用戶個人情感的資料。下文將以更具體的形式描述本發明的方法。In summary, the method 100 mainly includes several steps: first, in step 101, associate the electronic chip embedded in the personal belongings belonging to the first user with a network storage space, and associate the first user's and its permission to access the cyberspace is associated with the electronic chip; secondly, in step 102, the first user accesses the cyberspace and uploads data carrying his or her personal emotions; thirdly, in step 103, the first user A user transfers items to a second user and gives the second user access rights to the cyberspace; finally, in step 104, the second user accesses the cyberspace and obtains the personal emotions of the first user. information. The method of the present invention will be described in a more specific form below.

將電子晶片,例如NFC/RFID晶片(詳見下文)植入到物品中,該物品優選地是一種禮品,比如任何消費者產品,例如口紅。晶片的植入位置,最好是在物品的表面。優選地,在物品表面上用塑膠蓋密封住該晶片,防止其脫落或漏水,同時還能保證對該晶片進行無線方式的讀取。該晶片與某一網路儲存空間相關聯,例如,與某一http網路位址(或網頁連結)關聯。An electronic chip, such as an NFC/RFID chip (see details below), is implanted into an item, preferably a gift, such as any consumer product, such as lipstick. The implantation position of the chip is preferably on the surface of the object. Preferably, the wafer is sealed with a plastic cover on the surface of the object to prevent it from falling off or leaking, while also ensuring that the wafer can be read wirelessly. The chip is associated with a certain network storage space, for example, with an http network address (or web link).

第一位用戶,在例如購買了該禮品後,獲得對該電子晶片的存取權限,進而獲得對該網路儲存空間的存取權限。該許可權包括對該網路儲存空間上傳、修改、刪除資料,設定對資料的存取權限、訪問密碼等。第一位用戶可以將她/他購買該物品或使用該物品時的感受,或者其他想要表達的情感,以視頻、音訊、文字或其他形式記錄成資料並上傳在該網路空間中。記錄或上傳的動作可以通過手機,例如某個APP操作,對資料的管理(例如讀、寫、讀寫的許可權等)也可以通過手機操作。The first user, for example, after purchasing the gift, obtains access rights to the electronic chip and then obtains access rights to the network storage space. This permission includes uploading, modifying, and deleting data to the network storage space, setting access rights to the data, access passwords, etc. The first user can record her/his feelings when purchasing or using the item, or other emotions she/he wants to express, into data in the form of video, audio, text or other forms and upload it to the network space. The actions of recording or uploading can be operated through a mobile phone, such as an APP, and the management of data (such as reading, writing, permissions for reading and writing, etc.) can also be operated through a mobile phone.

第一位用戶,可以將該禮品“給”第二位用戶。當然,這裡的“給”含義很廣,可以包括賣、租,甚至包括以遺贈的方式。第二位用戶可能僅僅擁有禮品的使用權,而不擁有所有權。“送”的同時,第一位用戶還可以將該晶片的存取權限開放或轉移給第二位用戶。伴隨著晶片存取權限的開放或轉移,網路儲存空間的存取權限也可以對該第二位用戶開放或轉移。當然,需要明白,在一些實施形式中,該晶片可能關聯多個網路儲存空間,那麼並不一定是所有的網路儲存空間的存取權限都開放或轉移給該第二位用戶。The first user can "give" the gift to the second user. Of course, "give" here has a broad meaning and can include selling, renting, or even bequeathing. The second user may only have the right to use the gift, but not ownership. At the same time as "sending", the first user can also open or transfer the access rights of the chip to the second user. Along with the opening or transfer of chip access rights, the access rights of the network storage space can also be opened or transferred to the second user. Of course, it should be understood that in some implementation forms, the chip may be associated with multiple network storage spaces, so not all access rights to the network storage spaces may be opened or transferred to the second user.

該第二位用戶對網路儲存空間中的資料,也並不一定具備像第一位用戶那麼多的許可權。一般來說,可能只具有唯讀許可權。在優選的實施方式中,可以根據第二位用戶與第一位用戶的關係,而對該第二位用戶設定個人定制化的許可權,使之使用時能夠以個人定制化的方式獲取第一位用戶儲存的承載個人情感和/或回憶的資料。第二位用戶對網路儲存空間和其中資料的訪問也可以通過手機操作。這種個人定制化的許可權,可以通過個人定制化的秘鑰來獲取,或者通過個人的身份認證獲取。優選的情況下,第二位用戶的定制化許可權,需要由第一位用戶來制定或者批准。The second user does not necessarily have as many permissions as the first user to the data in the network storage space. Typically, only read-only permissions may be available. In a preferred embodiment, a personalized permission right can be set for the second user based on the relationship between the second user and the first user, so that the second user can obtain the first user in a personalized way when using it. Data stored by a user that carries personal emotions and/or memories. The second user's access to the network storage space and the data therein can also be operated through the mobile phone. This kind of personally customized permission can be obtained through a personally customized secret key, or through personal identity authentication. Preferably, the second user's customized permissions need to be formulated or approved by the first user.

應當明白,由於第二位用戶與第一位用戶的關係,很可能第一位用戶儲存的承載其個人情感和/或回憶的資料,也會觸發第二位用戶的個人情感和/或回憶。從這個角度來說,該資料也承載了第二位用戶的個人情感和/或回憶。It should be understood that due to the relationship between the second user and the first user, it is likely that the information stored by the first user that carries his or her personal emotions and/or memories will also trigger the second user's personal emotions and/or memories. In this sense, the profile also carries the personal emotions and/or memories of the second user.

在另一些實施形式中,第一位用戶可能在購買之前就獲得對該網路儲存空間的存取權限。在其購買該禮品後,禮品中的電子晶片才與該網路儲存空間相關聯。在第一位用戶獲得該禮品後,第一位用戶獲得對該電子晶片的存取權限,但其仍然可以不通過訪問電子晶片來訪問該網路儲存空間。不過,優選地,在第一位用戶將該禮品“給”第二位用戶時,依然設置成,將該晶片的存取權限開放或轉移給第二位用戶,而伴隨著晶片存取權限的開放或轉移,網路儲存空間的存取權限也對該第二位用戶開放或轉移。當然,在一些示例中,該晶片的存取權限和/或該網路儲存空間的存取權限也可以設置成對任何第二位用戶都是開放的,這樣第二位用戶不需要特別許可權就可以訪問該網路儲存空間。In other implementations, the first user may be granted access to the network storage prior to purchase. After he purchases the gift, the electronic chip in the gift is associated with the network storage space. After the first user obtains the gift, the first user obtains access rights to the electronic chip, but he or she can still access the network storage space without accessing the electronic chip. However, preferably, when the first user "gives" the gift to the second user, it is still set to open or transfer the access rights of the chip to the second user, and along with the change of the chip access rights Open or transfer, the access rights of the network storage space are also open or transferred to the second user. Of course, in some examples, the access rights of the chip and/or the access rights of the network storage space can also be set to be open to any second user, so that the second user does not need special permissions. You can access the network storage space.

在本發明的優選實施形式中,電子晶片選取的是一種NFC(near-filed communication)標籤,其具有晶片組和天線。而NFC讀卡器大規模的整合在智慧手機中,這使得通過手機對禮品中的晶片進行訪問十分方便。NFC標籤可以在短距離內(一般是10cm內,優選小於2cm)發送可讀信號。對NFC的讀取,只需要將讀卡器移動到離NFC較近的距離以獲取信號。但一般來說,需要使用特定的“輕拍”手勢來使標籤和手機上的讀卡器靠近。在優選的實施形式中,也通過這種特定的手勢來使物品承載更多的個人情感。當然,這也能避免近距離內的不希望的讀取。In a preferred implementation form of the present invention, the electronic chip is an NFC (near-filed communication) tag, which has a chip set and an antenna. NFC card readers are integrated into smartphones on a large scale, which makes it very convenient to access the chips in gifts through mobile phones. NFC tags can send readable signals within a short distance (usually within 10cm, preferably less than 2cm). To read NFC, you only need to move the card reader closer to the NFC to obtain the signal. But generally speaking, a specific "tap" gesture is required to bring the tag and the reader on the phone into close proximity. In a preferred embodiment, this specific gesture is also used to make the object carry more personal emotions. Of course, this also avoids unwanted reads at close range.

具體而言,本發明優選採用NXP公司的NFC晶片組:NTAG213 或SLIX2。這些晶片組,具有大於1000位元的用戶記憶體。也使得本發明可以利用區塊鏈技術,例如,由VeChain公司提供的區塊鏈協議(詳見下文)。整個標籤,包括天線部分的尺寸,在本發明的優選實施形式中,設置成貼合前述物品(例如唇膏)的外形。例如,選用能夠適合放在直徑10mm的圓圈中的標籤。這個尺寸能夠保證不破壞物品本身的設計,同時還確保良好的信號讀取功率。Specifically, the present invention preferably uses the NFC chipset of NXP Company: NTAG213 or SLIX2. These chipsets have more than 1000 bits of user memory. It also enables the present invention to utilize blockchain technology, for example, the blockchain protocol provided by VeChain (see below for details). The entire label, including the antenna portion, is sized, in a preferred embodiment of the invention, to fit the shape of the aforementioned article (eg, lipstick). For example, choose a label that can fit inside a 10mm diameter circle. This size ensures that the design of the item itself is not compromised while also ensuring good signal reading power.

在優選的實施形式中,用唇膏作為禮品。標籤可以用任何適當方式固定在唇膏上。優選地,標籤植入在一個塑膠部件中,而該塑膠部件可以進一步卡在唇膏盒主體上,或者,該標籤也可以粘貼在盒主體的一個內部部件上,而面向該可以進一步卡在唇膏盒主體上的塑膠部件。這樣一來,無論唇膏盒主體部分採用什麼材料,都可以保證標籤信號的強度。這一點,對產品材料有可能衰減/遮罩天線信號的情況下(例如金屬),尤其有效率。在另一個優選實施例中,標籤還可以黏在唇膏盒主體的表面上。另外,如果合體表面是金屬的看,可以在金屬表面和標籤之間使用保護性物質(例如鐵氧體)。In a preferred embodiment, the lipstick is given as a gift. The label may be affixed to the lipstick in any suitable manner. Preferably, the label is embedded in a plastic part, and the plastic part can be further stuck on the lipstick box body, or the label can also be affixed to an internal part of the box body, and the label can be further stuck on the lipstick box. Plastic parts on the main body. In this way, no matter what material is used for the main part of the lipstick box, the strength of the label signal can be guaranteed. This is especially effective where the product material has the potential to attenuate/mask the antenna signal (e.g. metal). In another preferred embodiment, the label can also be adhered to the surface of the lipstick box body. Alternatively, if the joint surface is metallic, a protective substance (such as ferrite) can be used between the metal surface and the label.

參見圖2,其顯示了優選實施例中的唇膏2,其具有底部殼體21和上部殼體22兩部分殼體,上部殼體22通過螺旋或卡扣的方式固定在底部殼體21上。在上部殼體22上,靠近唇膏的中段,設有一個圓形的塑膠蓋23,NFC標籤(未示出)即安裝在上部殼體22上,由塑膠蓋23蓋住。塑膠蓋23下方還有一條細縫24,延伸到上部殼體22的下端。這條細縫24有利於增強NFC標籤的信號強度。當然,需要明白,在其他實施形式中也可以不要這條細縫。Referring to Figure 2, it shows the lipstick 2 in the preferred embodiment, which has two parts: a bottom shell 21 and an upper shell 22. The upper shell 22 is fixed on the bottom shell 21 by screws or buckles. On the upper housing 22, close to the middle section of the lipstick, there is a circular plastic cover 23. The NFC tag (not shown) is installed on the upper housing 22 and covered by the plastic cover 23. There is also a thin slit 24 below the plastic cover 23, extending to the lower end of the upper housing 22. This thin slit 24 is beneficial to enhance the signal strength of the NFC tag. Of course, it should be understood that this thin slit may not be required in other implementation forms.

能讓用戶上傳內容的工具可以是任何智慧設備(手機、平板、電腦等)。人機界面可以是網站、原生APP或任何“前端”程式。在優選的實施形式中,使用了微信的環境(小程式、公眾號)。優選地,一旦在微信小程式中購買了物品,購買者就可以生產/上傳內容(文字、視頻、照片、音訊等),並將該內容與該物品關聯起來;內容與物品的關聯優選地會在物品組裝發貨之前完成。而物品以及其植入的NFC晶片組是帶有ID的,並與後端的購買指令/客戶關聯。當然,物品以及NFC晶片組的ID與用戶身份的關聯可以在用戶收到物品後進行;而內容的生產、上傳也可以在此關聯後進行。The tool that allows users to upload content can be any smart device (mobile phone, tablet, computer, etc.). The human-machine interface can be a website, a native APP, or any "front-end" program. In a preferred implementation form, the WeChat environment (mini program, official account) is used. Preferably, once an item is purchased in the WeChat applet, the buyer can produce/upload content (text, video, photo, audio, etc.) and associate the content with the item; the association between the content and the item will preferably be Completed before items are assembled and shipped. The item and its embedded NFC chipset are ID-coded and associated with the purchase order/customer on the backend. Of course, the association between the ID of the item and the NFC chipset and the user's identity can be carried out after the user receives the item; and the production and uploading of content can also be carried out after this association.

為保證對產品許可權的正確獲取,可以使用多種方式,例如除了NFC之外的加密硬體。在優選實施形式中,使用區塊鏈技術,例如,使用VeChain公司的區塊鏈技術。NFC晶片組由VeChain預先程式設計,並且每一個都賦予獨一的ID,稱作VID。在優選的方式中,產品所有者(購買者)與VID的聯繫會寫在區塊鏈中。To ensure correct acquisition of product licenses, various methods can be used, such as encryption hardware in addition to NFC. In a preferred implementation form, blockchain technology is used, for example, the blockchain technology of VeChain Company is used. NFC chipsets are pre-programmed by VeChain, and each one is given a unique ID, called VID. In the preferred approach, the connection between the product owner (purchaser) and the VID is written on the blockchain.

根據VeChain協定的授權過程包括使用特定的下載到用戶手機上的APP。該APP授予用戶許可權,例如通過微信帳號,手機號等。APP模仿NFC讀卡器並讀取產品的NFC。然後在區塊鏈上驗證,產品是否是初始的(VID驗證),並驗證該用戶是否是產品所有者。一旦授權完成,用戶獲得新的存取權限;例如,上傳特定的內容(文字、圖片、視頻、音訊……),並僅在授權後獲取它們。優選地,允許用戶保護私人資訊,以防止任何掃描該NFC標籤的人讀取到隱私資料。The authorization process according to the VeChain protocol involves the use of a specific APP downloaded to the user’s mobile phone. The APP grants users permission rights, such as through WeChat account, mobile phone number, etc. The APP imitates an NFC card reader and reads the product's NFC. It is then verified on the blockchain that the product is original (VID verification) and that the user is the owner of the product. Once authorization is completed, the user gains new access rights; for example, uploads specific content (text, pictures, videos, audio...) and obtains them only after authorization. Preferably, the user is allowed to protect private information to prevent anyone scanning the NFC tag from reading the private information.

對於VeChain區塊鏈來說,每一個NFC都會以加密形式設定一個ID(VID)。VID的存在記錄在區塊鏈中。例如,當準備購買時,在發貨之前,VID(加密在NFC中,而NFC又嵌入在物品中)即與訂單及購買者的身份(例如姓名)關聯。這種關聯也記錄在區塊鏈中。因為不可變更,VID/產品和購買者/所有者的關聯是作為所有權證據寫入在區塊鏈中的。這使得檢查帶加密VID的物品的許可權成為可能。NFC讀卡器(例如,手機)也用來獲取NFC中的資訊(包括VID),並在區塊鏈中檢查該VID是否存在,以及對應的VID具有何種許可權。For the VeChain blockchain, each NFC will be set with an ID (VID) in encrypted form. The existence of the VID is recorded in the blockchain. For example, when a purchase is made, the VID (encrypted in the NFC embedded in the item) is associated with the order and the buyer's identity (such as name) before shipping. This association is also recorded in the blockchain. Because it is immutable, the association between VID/product and buyer/owner is written in the blockchain as proof of ownership. This makes it possible to check the permissions of items with encrypted VIDs. NFC card readers (for example, mobile phones) are also used to obtain the information in NFC (including VID) and check whether the VID exists in the blockchain and what permissions the corresponding VID has.

在其他的實施形式中,VID也可以不加密在NFC晶片中,而是通過用戶的手機(例如,APP)在VeChain上註冊獲取。該VID然後與用戶的身份資訊(例如姓名)相關聯,並在用戶獲得相應許可權後與用戶的許可權相關聯。In other implementation forms, the VID may not be encrypted in the NFC chip, but may be obtained by registering on VeChain through the user's mobile phone (for example, APP). This VID is then associated with the user's identity information (such as name) and, if the user obtains the appropriate permissions, associated with the user's permissions.

本領域的技術人員將會理解,可對上述實施例進行變更,而不背離其廣義的發明概述。因此要理解,本文所公開的本發明並不局限於所公開的具體實施例,而是意在涵蓋如所附申請專利範圍所限定的本發明的精神和範圍之內的所有變體。另外,即使是按照本發明中所公開的實施例來解讀所附申請專利範圍所限定的本發明的精神和範圍,除非申請人明確做出特別說明,否則不應當適用捐獻原則對本發明的本發明的精神和範圍進行取捨。Those skilled in the art will appreciate that changes may be made to the embodiments described above without departing from the broad summary of the invention. It is therefore to be understood that the invention disclosed herein is not limited to the specific embodiments disclosed, but is intended to cover all modifications within the spirit and scope of the invention as defined by the appended claims. In addition, even if the spirit and scope of the invention as defined by the appended patent application are interpreted in accordance with the embodiments disclosed in the invention, the principle of contribution should not be applied to the invention unless the applicant specifically states otherwise. Make trade-offs based on spirit and scope.

100:用於傳遞承載個人內心資訊的資料的方法 101:將嵌入在屬於第一用戶的個人物品中的電子晶片與一處網路儲存空間相關聯,並將第一用戶及其訪問該網路空間的許可權與該電子晶片相關聯 102:由第一用戶訪問該網路空間,上傳承載其個人情感的資料 103:第一用戶將物品轉移給第二用戶,並使第二用戶具有對該網路空間的存取權限 104:第二用戶訪問該網路空間,並獲取承載第一用戶個人情感的資料 2:唇膏 21:底部殼體 22:上部殼體 23:塑膠蓋 24:細縫 100:Methods used to deliver data carrying personal inner information 101: Associating an electronic chip embedded in a personal item belonging to the first user with a network storage space, and associating the first user and his permission to access the network space with the electronic chip 102: The first user accesses the online space and uploads data carrying his or her personal emotions. 103: The first user transfers the item to the second user and gives the second user access rights to the network space. 104: The second user accesses the online space and obtains information carrying the first user’s personal emotions. 2: lipstick 21: Bottom shell 22:Upper shell 23:Plastic cover 24:Small seam

圖1示意性顯示了根據本發明的一個實施例的傳遞承載個人情感的資料的方法。 圖2示意性顯示了根據本發明的一個優選實施例的唇膏。 Figure 1 schematically shows a method for transmitting data carrying personal emotions according to one embodiment of the present invention. Figure 2 schematically shows a lipstick according to a preferred embodiment of the invention.

100:用於傳遞承載個人內心資訊的資料的方法 100:Methods used to deliver data carrying personal inner information

101:將嵌入在屬於第一用戶的個人物品中的電子晶片與一處網路儲存空間相關聯,並將第一用戶及其訪問該網路空間的許 可權與該電子晶片相關聯 101: Associate the electronic chip embedded in the personal belongings belonging to the first user with a network storage space, and associate the first user and his permission to access the network space. Can be associated with the electronic chip

102:由第一用戶訪問該網路空間,上傳承載其個人情感的資料 102: The first user accesses the online space and uploads data carrying his or her personal emotions.

103:第一用戶將物品轉移給第二用戶,並使第二用戶具有對該網路空間的存取權限 103: The first user transfers the item to the second user and gives the second user access rights to the network space.

104:第二用戶訪問該網路空間,並獲取承載第一用戶個人情感的資料 104: The second user accesses the online space and obtains information carrying the first user’s personal emotions.

Claims (13)

一種用於傳遞承載個人內心資訊的資料的方法,包括: 將網路儲存空間與嵌入在屬於第一人的個人物品中的電子晶片相關聯,並將該電子晶片與該第一人及其訪問該網路儲存空間的第一許可權相關聯; 由該第一人訪問該網路儲存空間,並由該第一人向該網路儲存空間上傳承載其個人內心資訊的個人資料; 該第一人將該個人物品轉移給與該第一人有關係的第二人,並由該第一人授予該第二人對該網路儲存空間的第二存取權限;以及 由該第二人通過訪問該電子晶片而訪問該網路儲存空間,並由該第二人獲取該個人資料。 A method for delivering information that carries personal inner information, including: associating the network storage space with an electronic chip embedded in personal belongings belonging to a first person, and associating the electronic chip with the first person and his first permission to access the network storage space; The first person accesses the online storage space, and the first person uploads personal data carrying his/her personal inner information to the online storage space; The first person transfers the personal items to a second person who is related to the first person, and the first person grants the second person second access rights to the network storage space; and The second person accesses the network storage space by accessing the electronic chip, and the second person obtains the personal information. 如請求項1所述的方法,其中所述網路儲存空間是網頁連結。The method of claim 1, wherein the network storage space is a web link. 如請求項1所述的方法,其中,所述個人資料也承載所述第二人的個人內心資訊。The method of claim 1, wherein the personal data also carries the second person's personal inner information. 如請求項1所述的方法,其中,對該網路儲存空間的所述第一存取權限包括在該空間上上傳、修改、讀取和刪除資料。The method of claim 1, wherein the first access permission to the network storage space includes uploading, modifying, reading and deleting data on the space. 如請求項1所述的方法,其中,對該網路儲存空間的所述第一存取權限包括對其他用戶設定資料的存取權限和訪問密碼。The method of claim 1, wherein the first access permission to the network storage space includes access permission to other users' setting data and access passwords. 如請求項1所述的方法,其中,對該網路儲存空間的所述第二存取權限是根據所述第一人與所述第二人的關係而個性化的。The method of claim 1, wherein the second access permission to the network storage space is personalized based on the relationship between the first person and the second person. 如請求項6所述的方法,其中,所述第二人的個性化的許可權是由所述第一人設定或批准的。The method of claim 6, wherein the personalized permission rights of the second person are set or approved by the first person. 如請求項1所述的方法,其中,所述網路儲存空間與所述電子晶片的關聯儲存在區塊鏈中。The method of claim 1, wherein the association between the network storage space and the electronic chip is stored in a blockchain. 如請求項1所述的方法,其中,所述電子晶片與訪問者的身份及其存取權限的關聯儲存在區塊鏈中。The method of claim 1, wherein the association between the electronic chip and the visitor's identity and access rights is stored in the blockchain. 如請求項9所述的方法,其中,所述電子晶片與所述訪問者身份及其存取權限的關聯在該訪問者獲得該嵌有該晶片的物品之前就完成。The method of claim 9, wherein the association of the electronic chip with the visitor's identity and its access rights is completed before the visitor obtains the item embedded with the chip. 如請求項1所述的方法,其中,所述第一人通過訪問該電子晶片而訪問該網路儲存空間。The method of claim 1, wherein the first person accesses the network storage space by accessing the electronic chip. 一種用於傳遞承載個人內心資訊的資料的方法,包括: 由第一人訪問網路儲存空間,並由該第一人向該網路儲存空間上傳承載其個人內心資訊的個人資料; 將該網路儲存空間與嵌入在屬於該第一人的個人物品中的電子晶片相關聯,並將該電子晶片與該第一人及其訪問該網路儲存空間的第一許可權相關聯; 該第一人將該個人物品轉移給與該第一人有關係的第二人,並由該第一人授予該第二人對該網路儲存空間的第二存取權限;以及 由該第二人通過訪問該電子晶片而訪問該網路儲存空間,並由第二人獲取該個人資料。 A method for delivering information that carries personal inner information, including: The first person accesses the network storage space, and the first person uploads personal data carrying his/her personal inner information to the network storage space; associating the network storage space with an electronic chip embedded in personal belongings belonging to the first person, and associating the electronic chip with the first person and his first permission to access the network storage space; The first person transfers the personal items to a second person who is related to the first person, and the first person grants the second person second access rights to the network storage space; and The second person accesses the network storage space by accessing the electronic chip, and the second person obtains the personal information. 一種用於傳遞承載個人內心資訊的資料的方法,其中包括以下步驟: 由第一人訪問網路儲存空間,並由該第一人向該網路儲存空間上傳承載其個人內心資訊的個人資料; 將該網路儲存空間與嵌入在屬於該第一人的個人物品中的電子晶片相關聯,並將該電子晶片與該第一人及其訪問該網路儲存空間的第一許可權相關聯; 該第一人將該個人物品轉移給與該第一人有關係的第二人;以及 由該第二人通過訪問該電子晶片而訪問該網路儲存空間,並由該第二人獲取該個人資料。 A method for delivering data carrying personal inner information, which includes the following steps: The first person accesses the network storage space, and the first person uploads personal data carrying his/her personal inner information to the network storage space; associating the network storage space with an electronic chip embedded in personal belongings belonging to the first person, and associating the electronic chip with the first person and his first permission to access the network storage space; the first person transfers the personal item to a second person related to the first person; and The second person accesses the network storage space by accessing the electronic chip, and the second person obtains the personal information.
TW111108641A 2022-03-09 Method for transferring personal inner message TWI840765B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW111108641A TWI840765B (en) 2022-03-09 Method for transferring personal inner message

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW111108641A TWI840765B (en) 2022-03-09 Method for transferring personal inner message

Publications (2)

Publication Number Publication Date
TW202336649A true TW202336649A (en) 2023-09-16
TWI840765B TWI840765B (en) 2024-05-01

Family

ID=

Similar Documents

Publication Publication Date Title
JP5818122B2 (en) Personal information theft prevention and information security system process
US10021087B2 (en) Method and system for providing a secure communication channel to portable privatized data
TWI358670B (en) Rfid tag, operating method of rfid tag, and operat
CN107408254A (en) The electronic installation and its operating method of electronic payment function are provided
BR112013000494B1 (en) method, unit of payments and system for conducting payments with electronic credits
US20220108305A1 (en) Systems and methods for consent management by issuers on behalf of cardholders
CN107408251A (en) The electronic equipment and its operating method of electronic payment function are provided
CN102955746A (en) Read-only mode mobile storage device and data access method thereof
US20160180314A1 (en) Methods to secure RFID transponder Data
CN107067250A (en) For performing the method and apparatus paid
KR20090072717A (en) New data storage usb disc, computer interface usb device and method by flash memory's bad patten
KR20230142505A (en) URL-based authentication for payment cards
TWI840765B (en) Method for transferring personal inner message
TW202336649A (en) System of designing integrated circuit device,integrated circuit device and operating method thereof
CN216822164U (en) Lipstick
US9965661B2 (en) Sensory totem badge capable of transmitting individualized information
KR20220035318A (en) Verified reviews using contactless cards
JP2024508998A (en) Method and system for transmitting personal internal information
TW202127832A (en) Mobile device, verification terminal device and identity verification method
US10104550B2 (en) Induction type ornament with private message transmission
Orme Can biometrics secure the Internet of Things?
JP5330970B2 (en) Meeting material data management system
US20120310837A1 (en) Method and System For Providing Authenticated Access to Secure Information
CN105743856B (en) Management method and its computer system for cloud server system
TW201118643A (en) Method and system for processing data, and storage device controller