WO2009122730A1 - 物品処理方法 - Google Patents
物品処理方法 Download PDFInfo
- Publication number
- WO2009122730A1 WO2009122730A1 PCT/JP2009/001505 JP2009001505W WO2009122730A1 WO 2009122730 A1 WO2009122730 A1 WO 2009122730A1 JP 2009001505 W JP2009001505 W JP 2009001505W WO 2009122730 A1 WO2009122730 A1 WO 2009122730A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- value
- article
- encryption
- information
- message
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
Definitions
- the present invention relates to an article processing method.
- This application is an application related to the following international applications and claiming priority from the following international applications. With respect to designated countries for which incorporation by reference of a document is permitted, the contents described in the following application are incorporated into the present application by reference, and are made a part of this application. 1. International Application Number PCT / JP2008 / 056442 Filing date March 31, 2008
- Patent Document 1 describes a technique for transmitting an encrypted message from the sender side to the receiver side, and a technique for decrypting on the receiver side.
- media that transmit messages are less durable to the environment than articles.
- the environmental resistance of the media carrying the message is lower. Therefore, the medium for recording the message is more fragile and short lived than the article.
- the medium for transmitting the message was lost, it was difficult for the gift giver to keep the message that he wanted to send along with the gift for a long time and to leave it in the hand of the giver.
- the message may be left as it is on the article by imprinting the message on the article as it is, since the space on which the article can be imprinted is limited, the amount of information that can be described is limited. As a result, it was possible to imprint only a message with a small amount of information, compared to the donor's original desire.
- an article processing method which an article processing system encrypts at least one copy of grant information given to an article, and an offer information acquisition part with which an article processing system is provided acquires offer information And an arithmetic encryption processing step of acquiring an arithmetic encryption value by shortening at least a part of the addition information as calculation target addition information by using a hash function as the calculation encryption device included in the article processing system;
- An association control unit included in the processing system includes an associating step of correlating the arithmetic encryption value with the item, and the additional information includes a message that the store, the brand, the designer or the producer appends to the item to the item, and the purchaser to the item Including at least one of the message to be added, and the message that the gift giver will give to the gift with the goods;
- the association control unit is a process of imprinting or printing on the article or article, printing in the form of a bar code, or electronically recording the computed cryptographic value as an im
- the arithmetic encryption processing step is a hash value operation step in which the arithmetic encryption device calculates a hash value from the arithmetic target assignment information, and the arithmetic encryption device adds an arbitrary character to the hash value, reduces any character, and any An intermediate operation of any number of digits that can be imprinted or printed on the article by performing at least one of character repositioning, arbitrary function operation, arbitrary character conversion, arbitrary radix conversion, and arbitrary hash calculation
- An intermediate operation value operation step for obtaining a value and an operation encryption value generation step for operating an operation encryption value from the intermediate operation value may be included.
- the operation target assignment information includes a non-variable character string portion that is not allowed to be changed and a character string that includes a variable character string portion that is allowed to be changed.
- the operation cryptographic device determines from operation target assignment information including at least the product ID.
- the associating control unit may associate the calculated encryption value with the article by a process of imprinting or printing the calculated encryption value on the article.
- the marking value generation device provided in the article processing system further includes a marking value generation step of generating a character string to be marked or printed on the item, and in the associating step, the association control unit is generated in the marking value creating step.
- a character string which is a character string and is not stamped in another article is stored in the encryption value correspondence database in association with the calculation encryption value, and is stored in the encryption value correspondence database in association with the calculation encryption value.
- An imprint value generating device provided in the article processing system generates a character string to be imprinted or printed on the article, and an imprint device provided in the article processing system generates the character string generated in the imprint value generation step
- the method further includes an imprinting step of imprinting or printing on the article as an imprinting value, wherein the imprinting value generating step and the imprinting step are performed before the providing information acquiring step and the associating step, and in the associating step, the associating control unit
- the marking value may be associated with the calculation encryption value by recording the marking value stamped on the article received by the recipient in the encryption value correspondence database in association with the calculation encryption value.
- the character string to be stamped or printed on the article generated by the stamp value generation device may be a random number value or a pseudo random number value.
- the calculation target assignment information may be stored in the item processing system, and may include in part a string hidden from the customer, the buyer, the gift giver or the gift giver.
- An assignment information reacquisition step in which the assignment information obtaining unit obtains new assignment information to be given to the article on which the stamp value is already stamped, and the arithmetic encryption device calculates at least a part of the new assignment information
- the re-association step of recording the operation encryption value acquired in the operation encryption value re-acquisition step in the encryption value correspondence database.
- the association control unit determines at least the product ID included in the calculation target assignment information.
- the processing value of the object processing method is to assign the object of calculation by correlating the calculation encryption value and the article by a process of imprinting or printing the calculation encryption value on the article or the article, printing in bar code form, or recording electronically.
- the dedicated web page creation unit provided in the article processing system is dedicated to create a dedicated web page that receives an exchange between the gift giver and the gift giver.
- the security code output unit included in the web page creation step and the article processing system outputs a security code that is generated from the calculation result of the hash value calculation step and that is different from the calculation encryption value and allows access to the dedicated web page Security code output step, security code reception unit included in the item processing system receives the security code delivered with the item from the gift giver or the gift receiver, and authentication unit included in the item processing system receives Security Based on the code, it may further comprise an authentication step of authenticating access to a dedicated web page.
- the message acquisition unit of the article processing system is a predetermined save that the gift giver, the gift giver, and the inheritor who inherited the goods desires to save
- FIG. 1 is a schematic view showing a network configuration between a store having an article manufacturing system, a gift giver of an article, a gift giver, a successor of an article, and a store.
- FIG. 2 is a block diagram showing an internal configuration of an article manufacturing system 100. It is a schematic diagram which shows the article by which the marking value was stamped. The flowchart in the case of imprinting a marking value on articles is shown. It is a schematic diagram in the case of generating an encryption from operation object message. It is an example of the calculation object message. It is an example in case the blank in the text sentence of operation object message is changed. This is an example of a return greeting message from a giver to a giver.
- FIG. 1 is a schematic view showing a network configuration between a store having an article manufacturing system, a gift giver of an article, a gift giver, and a successor of the article.
- the store has an article manufacturing system 100 that encrypts and imprints at least a portion of the original message on the article.
- the article manufacturing system 100 is connected to the shop terminal 65, the gift giver terminal 70, the gift giver terminal 80, and the inheritor terminal 85 via the communication network 20.
- the article manufacturing system 100 includes a general-purpose web server 10, an arithmetic encryption device 30, an issued encryption value database 40, an encryption value correspondence database 42, a dedicated web server 50, an archive database 60, an imprint value generation device 92, and an imprint device 90.
- the public facing web server 10 is operated by a retailer on the communication network 20.
- the gift giver terminal 70 is an article that can be attached to an article selected from the article selected by the gift giver from an article capable of shortening, encoding and imprinting a message relating to a gift stored in the general purpose web server 10 Information on the message is sent to the retailer's public web server 10 by e-mail or the like.
- the arithmetic encryption device 30 is operated by the store and encrypts the message by the function calculation specified for each store.
- the arithmetic encryption device 30 generates an arithmetic encryption value by shortening or encrypting part or all of an original message (hereinafter referred to as an original message) related to giving a gift.
- the issued encryption value database 40 stores the calculation encryption value stamped as the stamp value, the gift client's customer information such as the name of the gift giver, the address, etc., and the giver client information such as the name of the gift giver, the address.
- the marking device 90 marks the generated calculated cryptographic code value on the article as a marking value.
- the article manufacturing system 100 records, on an electronic medium, information identifying at least the original message sent from the gift giver terminal 70 and the message to be computed. An article on which an imprint value has been imprinted and an electronic medium are delivered to the recipient.
- the article is preferably a precious metal, a gem, a watch, a durable furniture, an engraving, or the like having a long durability.
- the original message to be given to the gift from the gift giver of the goods to the gift giver or the original message to be shared among the limited members such as engagement and marriage is digitized at the gift giver terminal 70.
- the article manufacturing system 100 digitizes the original message.
- the arithmetic encryption device 30 performs a certain encryption operation using at least a part of the original message acquired from the gift recipient as a calculation target message, and shortens it to a degree that can be imprinted on an article.
- the marking device 90 marks the stamp value on the article as a unique unique code value issued by the dealer.
- the goods are provided to a gift recipient or a limited member such as engagement or marriage.
- the gift receiver terminal 80 transmits, to the public web server 10, a confirmation message input from the gift receiver.
- the general purpose web server 10 sends the confirmation message sent from the gift receiver terminal 80 to the arithmetic encryption device 30.
- the general purpose web server 10 outputs the confirmation calculation encryption value generated based on the confirmation message in the calculation encryption device 30 to the gift receiver terminal 80.
- the gift giver confirms that the confirmation calculation encryption value output to the gift giver terminal 80 and the stamp value stamped on the article are the same. Thus, the giver understands that the calculation target message provided by the giver is encrypted for the stamp value.
- the archive database 60 uses the stamp value as a part of the access key, an original message sent from the gift giver to the gift giver, an identifier of the message to be calculated, an identification information of a member authorized to access, long-term retention information, retention period, Is stored.
- the dedicated web server 50 accepts authentication of access to the dedicated web page or the inherited web page from the gift giver terminal 70, the gift giver terminal 80, or the inheritor terminal 85.
- the dedicated web server 50 acquires the information stored in the archive database 60 based on the access authentication when it is determined that the access authentication is correct.
- the dedicated web server 50 creates a dedicated web page or an inherited web page that includes the information stored in the archive database 60.
- the dedicated web server 50 provides the dedicated web page or the inherited web page to the gift giver terminal 70, the gift giver terminal 80, or the inheritor terminal 85 to which the access authentication has been transmitted.
- the amount of information of the original message can be increased compared to when the original message is directly imprinted on the article. In this way, the original message incidental to the article can be made into an expressive creation.
- information such as voices, images, photos, moving pictures, etc. can be incorporated into an original message attached to an article.
- the symbol of the original message between the giver and the giver is imprinted on the gift as an imprint value to give a close presence
- the original message that the giver wants to convey is deeply in the heart of the giver for a long time
- the intentional transfer between the giving parties, which is the original purpose of the giving act is achieved more effectively, and the value of the goods is increased.
- the effect of daily feeling the original message between the giver and the giver can be enhanced.
- the dealer can use a dealer-specific operation routine using a hash function. Furthermore, different calculation routines can be used for each gift effective date to specify the time when the gifting activity occurred in the eternal time, and give special meaning to the gifting activity to the gifting party and the successor of the goods. . Also, this enables the gift giver and the gift giver to make it possible to check the calculated encryption value of the message and the stamp value only at the shop site. This allows the dealer to retain the customer and maintain a continuous relationship of trust with the customer who wants the dealer to survive for a long time.
- the stamp value generated by the stamp value generator 92 may be already stamped at the time of manufacture of the article.
- the general purpose web server 10 may record the operation encryption value obtained by the operation encryption device 30 in the encryption value correspondence database 42 in association with the imprint value imprinted on the article to be presented to the gift recipient. .
- the article manufacturing system 100 since it is possible to associate the imprint value with the arithmetic encryption value, it is possible to confirm the authenticity of the message accompanying the gift.
- the article manufacturing system 100 generates an original message when the stamp value is stamped before the article to be given to the gift recipient is determined, such as when the stamp value is stamped on the article when the article is manufactured. Can function as an article processing system that encrypts
- the arithmetic encryption device 30 may generate the arithmetic encryption value not only from the original message but also from the assignment information given to the article and given meaning to the article.
- the grant information it is possible to exemplify a message that the item store, a brand, a manufacturer, a designer, or a producer appends to the item, a message that the purchaser appends to the item, and the like.
- the given information may be anything as long as it is assigned to each of the articles, but in order to identify the articles, the same contents as the given information given to the other articles are identical. It is preferable to avoid the generation of the arithmetic encryption value of.
- the grant information may be information that is provided to the recipient of the item incidentally to the item, but may also include electronic media, email, or a form provided to the recipient at a website.
- Arithmetic encryption apparatus 30 calculates an imprint value to be imprinted on an article to which the product ID is assigned, by computing an arithmetic encryption value from the assignment information acquired by general-purpose web server 10.
- the article manufacturing system 100 can also function as a verification system for an article that verifies whether the article is a forgery or the like.
- the system can be a deterrent against forgery of goods.
- the article In order to increase the deterrence against forgery, it is desirable for the article to be stamped with a more random and unique stamp value. Further, in order to increase the forgery deterrentity, it is preferable that the parameter determined by the cardinality and the number of digits of the stamp value be significantly larger than the total number of issued articles. Since the space that can be stamped on an article is limited, if you convert the operation encryption value generated in hexadecimal by the hash function to 32 base, for example, the 15 digit encryption value is converted to the 12 digit encryption value, An equivalent stamp value parameter can be obtained with a smaller number of imprinted digits.
- the parameter value of the stamp value corresponding to this example is 32 to the 12th power (1, 152, 921, 504, 606, 846, 976), which corresponds to 19 decimal digits.
- the fact that the stamp value randomly added by the forger by chance is the same as the issued stamp value is low due to the large number of parameters, and the expected effect of the forgery is lowered, and The probability of hash collisions of cryptographic values is also reduced.
- the information that must be acquired before the forger of the article deduces the stamp value to be supported from a certain product ID is the operation target assignment information, the hash function used, and the intermediate operation. It includes functions used, characters changed / added in intermediate operation processes, character conversion, radix conversion, and conversion of character strings by character string correspondence table including random numbers, etc., among which forger is required It is only after obtaining all the relevant information that the deductable stamp value generation means can be obtained.
- the above-mentioned stamp value generation process has an extremely wide area where the dealer can arbitrarily decide, and that rules can be changed with time, and a method that does not clearly indicate to the customer all the calculation target assignment information for generating the calculation encryption value.
- the forger determines "a moving target that includes various variables that can not be specified" and corresponding to the product ID.
- the salesperson or the shopper of the store can read it with naked eyes without using a dedicated reading device, the stamped value can be determined as a forged product simply by accessing the general-purpose web server 10 of the store if it is not a regular product. .
- the most realistic measure for achieving the purpose for the forger is to buy or illegally obtain a genuine product and copy the product ID and the imprint value attached to the article to a plurality of forged products as they are.
- the store salesperson, the prospective purchaser or The buyer refers to the store's issued encrypted value database 40 via the communication network to see whether the article having the same imprint value as the article has already been sold or has been notified of a forged accident, and the record is referred to If you can, you can expect early discrimination of counterfeit accident products.
- forged accident product refers to any item that has the same stamp value and is claimed against the item regardless of whether the item is genuine or counterfeit when multiple items are found or referred from different sources. I assume.
- the shopper confirms that the purchaser or the prospective purchaser agrees that the imprinted value generated from the “message that the store adds to the article” and the imprinted value imprinted on the article match. It is a psychological effect that enhances the motivation of the buyer's PC. In that sense, “message from dealer” is the appreciation of product ID from the dealer, brand, designer, producer, etc. to the customer in order to increase the customer's psychological satisfaction of holding genuine products. Although it is preferable that a message be described, in order to determine the genuine product, the “message that the dealer appends to the item” may be information on a certificate including a product ID or a certificate, or the product ID itself. .
- a prospective purchaser or a purchaser who intends to purchase at a store or purchase an internet sale accesses the retailer's public web server 10 and the issued encrypted value database 40 via a communication network to inquire or purchase a genuine item
- the inquiry history of the stamp value and the transaction history are accurately recorded, and as a result, the customer and the dealer cooperate to suppress the forgery.
- the stamp value of the article can be linked to the purchase history, so the store and the prospective purchaser can easily refer to the past history of the stamp value, and the article sold in the past is It has the effect of deterring being marketed as "new".
- the dealer can increase the registration rate of purchaser information, and has a secondary effect that can be effectively used for subsequent marketing activities.
- one of the features of the present invention is effective to encourage the purchaser to voluntarily cooperate with the dealer to participate in the counterfeit prevention measures, and as a result, the purchase registration rate is increased and the stamped value of the forgery is increased. It is to make it embossed. Furthermore, the seemingly random stamp value to be stamped (printed) can not be deducted without the calculation target assignment information. In order to increase the deterrence of counterfeiting, it is necessary to avoid the situation where a large amount of counterfeit products can be manufactured at low cost, and to increase the manufacturing cost.
- a feature of the present invention is that even a very small amount of forgery, such as a single forgery, for a valid product ID can be easily identified.
- the person in charge of the service desk inputs the grant information using a dedicated password, and after obtaining information about the normality of the article from the arithmetic encryption device 30 and the issued stamp value database 40, the result is before the purchase decision of the prospective purchaser It can be expected that the distribution of counterfeit goods in internet sales and the deterrence of the victim's sacrifice of good intentions can be expected by telling them.
- the standard hash functions MD5 32 digits
- SHA-1 40 digits
- SHA-256 64 digits
- CRC32 8 digits
- CRC32 has a relatively small stamp value parameter of 4, 294, 967, 296.
- it has a hash similar to other standard hash functions. Since the algorithm is publicly available, it is possible to easily imitate the method of generating the cryptographic cryptographic value.
- the dealer can select an arbitrary function including a hash function, and can determine the dealer-specific arithmetic algorithm of any number of imprinted digits, and is effective forgery Product measures can be realized.
- a singularity of the present invention is to deduce from a message containing a definite value (e.g. product ID) an unpredictable arithmetic cryptographic value with a hash function and an arbitrary algorithm.
- a definite value e.g. product ID
- the final operation encryption value is associated with a random number (imprinted value) using a correspondence table, and the random number (imprinted value) is printed
- the correspondence table is a correspondence table between the unpredictable value and the unpredictable value.
- the dealer could, for example, change the arithmetic target assignment information or algorithm from the next month without changing the stamp value generation base. It becomes a singular point of the invention. In that sense, it is further preferable to specify and specify the issue year or month or version level of the article for which the operation object assignment information, algorithm, conversion table, etc. to be used are determined as the auxiliary information when obtaining the operation encryption value.
- changing the computation target assignment information includes performing arbitrary data addition, deletion, or change to the computation target assignment information without changing the original assignment information.
- the product ID and the arithmetic encryption value may be provided together with the article, for example, printed on an attachment such as a package of the article.
- the product ID and the operation encryption value may be recorded in an electronic tag such as an RFID.
- the product ID and the arithmetic encryption value may be recorded in the electronic tag and provided as an appendage of the article in a format compliant with the EPCglobal standard. Recording of the product ID and the arithmetic encryption value in the electronic tag may be performed by the association control unit 107. If the product ID and the bit length of the operation encryption value are longer than the bit length for the product ID defined by the EPCglobal standard, the product ID or operation encryption value is recorded as incidental information of the EPCglobal specification. Good.
- the association control unit 107 may print the product ID and the arithmetic encryption value in the form of a barcode on the package of the article or the like.
- the product ID and the operation encryption value can be provided together with the article in a machine-readable form.
- the calculation encryption value can be calculated from the product ID read out from the electronic tag or the barcode. Then, by comparing the calculated arithmetic encryption value with the marking value read from the electronic tag or the barcode, it can be easily determined whether the article is normal.
- the message processing method assumes is that the message encryption involves the purchaser's own operationally encrypting the message attached to the item and associating it with the stamp value. For example, using the article manufacturing system to obtain the arithmetic encryption value and the imprint value and imprint it on the article, using words of encouragement, a motto, words of love for family and pets, etc. it can.
- This step may be the next step in the case where the operation encryption value of the message from the store has already been associated with the stamp value as described above.
- the newly generated operation encryption value of the give information given by the buyer is By correlating with the stamp value in the encryption value correspondence database 42, the stamp value is deduced from the new assignment information.
- the dealer can increase the purchaser registration rate, which is an important key against counterfeit goods. it can.
- an article manufacturing system 100 will first be described as an embodiment of the present invention in which an imprint value is generated from an original message accompanying a gift and imprinted. After that, an embodiment etc. which can easily realize confirmation of the authenticity of the article by creating an imprint value from a message from the store to the customer will be described.
- FIG. 2 is a block diagram showing an internal configuration of the article manufacturing system 100.
- the general-purpose web server 10 includes an assignment information acquisition unit 103, a assignment information reception unit 105, an association control unit 107, a security code output unit 108, an arithmetic encryption value output unit 110, and a media recording unit 112.
- the arithmetic cryptographic device 30 has a hash function holding unit 302.
- the dedicated web server 50 includes an access key accepting unit 502, a security code accepting unit 504, an authenticating unit 506, an inherited web page creating unit 508, an inherited web page output unit 510, a dedicated web page creating unit 512, and a dedicated web page output unit 514.
- the assignment information acquisition unit 103 has a message acquisition unit 102.
- the assigned information receiving unit 105 includes a message receiving unit 104.
- the association control unit 107 includes a marking control unit 106.
- the message acquisition unit 102 acquires an original message to be given to the gift giver from the gift giver along with the goods.
- the message acquisition unit 102 preferably acquires an original message including at least a character string.
- the message acquiring unit 102 acquires information for selecting whether or not to store the original message in the archive database 60, and stores the original message in the archive database 60 when receiving information for selecting to store.
- the message acquiring unit 102 further authenticates a member who is permitted to access the archive database 60 when a member authorized to access the dedicated web page or the inherited web page acquires predetermined storage information desired to be stored for a long time. Stores information and storage information. That is, the message acquisition unit 102 acquires that the gift receiver terminal 70 has selected to access the dedicated web page or the inherited web page.
- the archive database 60 stores journals, literary creations, legends, family trees, voice messages, family photos, images, videos, etc. as storage information.
- the arithmetic encryption device 30 generates an arithmetic encryption value by shortening the arithmetic target message with a hash function.
- the hash function holding unit 302 holds a hash function specified for each store and a function for converting the calculated hash value.
- the arithmetic encryption device 30 may generate a conversion function of a different hash value for each issue date of the article, and cause the hash function storage unit 302 to store the conversion function.
- the arithmetic cryptographic device 30 refers to the issued stamp value stored in the issued cryptographic value database 40. If there is an issued stamp value identical to the operation encryption value generated from the operation target message, the operation encryption device 30 changes the position of blanks included in the text of the operation target message or adds or removes blanks. By generating different final operation target messages without changing non-blank characters of the character string, a unique final operation encryption value that is not present in the issued cryptographic value database 40 is generated.
- the arithmetic cryptographic device 30 changes at least a part of the character string of the part to be calculated in the original message and shortens it with the hash function. Obtain an operation encryption value different from any operation encryption value already associated with any other item. Specifically, the operation target assignment information is not changed by the party who has given the assignment information.
- the party who has given the assignment information and "the invariable character string portion forming the meaning of at least a part of the assignment information" changes The arithmetic cryptographic device 30 generates a unique arithmetic encryption value in the event of a hash collision, including “a variable character string portion that does not form the meaning of the attached information, having an arbitrary number of digits”
- the proposal of the partial change of "the variable character string part which does not form the meaning of” is made, and the change license request is issued to the gift giver who gave the original message (the grant information).
- the arithmetic cryptographic device 30 After receiving the notification of approval from the gift giver, who is the party of the creation of the grant information, the arithmetic cryptographic device 30 makes the change and generates a unique final arithmetic encryption value.
- the arithmetic encryption value can be made a unique value by blank adjustment to the original message
- the arithmetic encryption value can also be made a unique value by a method other than the blank adjustment.
- a predetermined symbol other than blank may be added to the end or the beginning of the original message until the operation encryption value becomes a unique value.
- the symbols referred to here may be concepts including characters.
- the dealer can set all the stamp values issued by the dealer as one and only one value. In this way, the gift giver and the gift giver can psychologically realize that the imprint value attached to the article is the only one in the world among the articles issued by the store. Also, the distributor can identify the gift giver and the gift giver from the encrypted value imprinted on the article. Therefore, if the gift giver loses the article, the finder can contact the store, and the store can identify the gifting party from the stamped value of the found item.
- the arithmetic encryption device 30 When the message acquiring unit 102 receives, from the gift giver terminal 70, information for selecting to store the original message, the arithmetic encryption device 30 generates an arithmetic encryption value, and generates a dedicated web page or an inherited web page. Generate security code that grants access.
- the arithmetic cryptographic device 30 generates a security code by shortening and encrypting the message to be computed using a hash function.
- the arithmetic cryptographic device 30 preferably generates the arithmetic cryptographic value and the security code into different values.
- the marking control unit 106 controls the marking device 90 that marks the arithmetic encryption value on the article as the marking value, and stores the marked marking value in the issued encryption value database 40.
- the marking control unit 106 stores the marking value in the issued encryption value database 40 and the archive database 60.
- the media recording unit 112 records, on an electronic medium, the original message acquired by the message acquisition unit 102, information identifying a message to be calculated, and the security code output by the security code output unit 108.
- the electronic media is delivered to the gift recipient along with the item on which the imprint value has been imprinted.
- the message accepting unit 104 accepts the confirmation message input from the gift giver or the successor.
- Arithmetic encryption device 30 generates a confirmation arithmetic encryption value from the confirmation message using the hash function specified for each store and the arithmetic function that converts the calculated hash value.
- the arithmetic encryption value output unit 110 transmits the confirmation arithmetic encryption value to the gift receiver terminal 80 or the inheritor terminal 85.
- the access key accepting unit 502 accesses the dedicated web page. Accept key input.
- the access key receiving unit 502 receives an imprint value stamped on an article as an access key.
- the security code receiving unit 504 receives a security code from the gift receiver terminal 80 or the gift receiver terminal 70.
- the access key accepting unit 502 accepts an input of an access key to the dedicated web page.
- the security code accepting unit 504 accepts a security code from the gift giver terminal 70 or the gift giver terminal 80.
- the authentication unit 506 authenticates the access to the dedicated web page based on the received access key, the security code, and the security code stored in the issued encryption value database 40.
- the dedicated web page creation unit 512 acquires the gift giver information and the gift giver information stored in the archive database 60 based on the access key and the security code.
- the dedicated web page creation unit 512 creates a dedicated web page on the basis of the obtained gift giver information and gift giver information.
- the dedicated web page output unit 514 outputs the generated dedicated web page to the gift giver terminal 70 or the gift giver terminal 80 that has transmitted the security code.
- the dedicated web page output unit 514 may store the input in the archive database 60 when there is an input from the gift giver terminal 70 or the gift giver terminal 80 via the dedicated web page.
- the dedicated web page creation unit 512 may include the access key in a URL (Uniform Resource Locator).
- the dedicated web page creation unit 512 may specify the address of the file stored in the archive database 60 using the access key.
- the dedicated web page output unit 514 may transfer a thank-you message to the message obtaining unit 102 when there is an input of a thank-you message from the giver.
- Arithmetic encryption device 30 may generate a etiquette arithmetic encryption value by shortening the etiquette subject message including at least a text sentence among the tribute messages by using a hash function.
- the marking device 90 may mark the return operation cryptographic value as a return stamp value on a return item given to the gift giver.
- the dedicated web server 50 takes one year after registration as a dedicated site holding period for the gifting party, exchanges messages between the gifting giver and the gifting party, pastes text, voice, images, photos, moving pictures, etc. Period of time.
- the dedicated web server 50 sets the retention period as a period for receiving a return message from the gift giver to the gift giver on the dedicated website.
- the media recording unit 112 may record the response acceptance period on the dedicated website on the electronic media sent to the gift giver and the gift giver.
- the security code output unit 108 outputs the response acceptance period to the media recording unit 112 based on the response acceptance period acquired from the gift giver terminal 70 by the message acquisition unit 102.
- the message acquisition unit 102 may receive from the gift giver terminal 70 a selection for access to the dedicated web server site, and may obtain an input of a response acceptance period.
- the public web server 10 notifies the gift giver and the gift giver that the response acceptance period is one year, and if there is no reply during that time, the gift giver knows that the gift giver has not sent a reply. It will be.
- the message acquiring unit 102 may acquire, from the gift giver terminal 70, an extension of the response acceptance period. For example, the message acquisition unit 102 acquires extension of the response acceptance period from the gift giver terminal 70 when the gift giver wants to save for a long period of one year or more.
- the message acquisition unit 102 extends the response acceptance period stored in the archive database 60. This extends the 'waiting' period of the gift giver and informs the gift giver that the gift is waiting for the gift giver's reply.
- the recipient can reproduce and confirm the gift giver's original message including text, voice, photos, etc. on a dedicated web page. Further, by encrypting the message sent together with the article by using the arithmetic encryption device 30, it can be confirmed that the message matches the stamp value, so that the authenticity of the original message can be confirmed. Also, the recipient can decipher the meaning of the enciphered encrypted value as a gift of the recipient.
- the article manufacturing system 100 may further receive a message and an article to be returned from the gift receiver terminal 80 to the gift giver.
- the access key accepting unit 502 acquires the inherited web page. Accept the input of the access key to the page.
- the access key receiving unit 502 receives an imprint value stamped on an article as an access key.
- the security code accepting unit 504 accepts a security code from the gift giver terminal 70, the gift giver terminal 80, or the inheritor terminal 85.
- the authentication unit 506 acquires, from the archive database 60, authentication information including a calculated cryptographic value.
- the authentication unit 506 authenticates the access key, the security code, and the authentication information, and permits access to the inherited web page. Also, the authentication unit 506 authenticates the access key, the security code, and the authentication information, and permits the change of the stored information.
- the inheritance web page creation unit 508 creates an inheritance web page including saved information.
- the inherited web page output unit 510 outputs the created inherited web page to the gift giver terminal 70, the gift giver terminal 80, or the inheritor terminal 85.
- the inherited web page output unit 510 may receive the information to be added to the stored information from the inheritor terminal 85 and update the stored information stored in the archive database 60.
- the store can store stored information such as videos on a computer for a long time. In this way, it is possible to allow a descendant who inherits a long-lived article such as a precious metal to access the stored information as part of the access key. As a result, the descendants of the gift give birth to a sense of unity with the distributor, and the distributor can acquire a customer group who desires the entity to last for a long time. Furthermore, if the computer system of the store is redundant and resistant to disasters, the family information of the gifting party can be reliably maintained over a long period of time, and it is possible to provide an archive service of stored information related to the family. It becomes.
- FIG. 3 is a schematic view showing an article on which an imprint value is imprinted.
- Article 3000 has an imprint value 3010.
- the imprint value 3010 is imprinted on the article 3000 as a value to which the operation target message is shortened by the hash function.
- the stamp value has a value of "3c2395401".
- FIG. 4 shows a flowchart in the case of imprinting the operation encryption value on the article.
- the gift giver chooses an item from the list of articles that can be enciphered with the encryption provided by the store at the store or on the Internet.
- general purpose web server 10 creates an order reception site for ordering an item for gift giver terminal 70.
- the gift giver terminal 70 accesses the order receiving site (step 990).
- the gift giver terminal 70 sends to the public facing web server 10 a selection input of an item which can be imprinted with the arithmetic encryption value, which is input from the gift giver (step 1000).
- the giver hands over to the store the message data to the giver, such as text, voice, photos, etc., which he wishes to accompany the goods, or enters into the “gift message acceptance format” via the communication network 20 and sends it to the store.
- the gift giver terminal 70 sends an input of an original message to be given to the gift giver along with the item to the public facing web server 10 together with the selection input of the item (step 1100).
- the public-facing web server 10 performs identity verification to confirm that the original message has been sent from the gift giver himself.
- the general purpose web server 10 may have a person identification unit (not shown).
- the personal identification unit issues an ID and a password to the gift giver terminal 70 when the selection input of the article is received.
- the personal identification unit may authenticate the issued ID and password when the original message is received. This may be done in order to prevent the message attached to the gifting act from being abused for purposes other than the original purpose of gifting.
- the message acquiring unit 102 After receiving the content of the original message, the message acquiring unit 102 confirms the operation target message to be the operation target and checks the content of the operation target message (step 1200). That is, the dealer confirms that the original message received from the gift giver is not a threat to the gift giver or slander. When the message to be computed belongs to the class of intimidation or slander, the message acquiring unit 102 transmits information to the gift giver terminal 70 indicating that the transaction is not possible (step 1210). Then, the public facing web server 10 does not start the transaction with the gift giver (step 1300).
- the article manufacturing system 100 utilizes the one-way nature of the hash function, the inability to restore the original data from the imprinted value may be abused, sometimes resulting in a threat or slander message, or a poor quality message. . Therefore, the dealer declares that the giving act is not threatened or slander, and obtains the customer's consent and trust. This is a process in the store when the present embodiment is embodied, and when the store sells an article using the present embodiment, the store obtains the prior consent of the customer to perform the filtering.
- the message acquiring unit 102 checks that there is no typographical error in the text sentence among the calculation target messages (step 1400). If the message acquisition unit 102 finds a typographical error, the message acquirer 102 informs the gift giver terminal 70 that there is a typographical error and a correction. The message acquisition unit 102 corrects the text when the correction agreement is transmitted from the gift giver terminal 70. Thereby, the message acquisition unit 102 determines the operation target message to be encrypted (step 1500).
- the message acquiring unit 102 receives, from the gift giver terminal 70, via the dedicated web server 50, a selection as to whether or not to access a dedicated web page or an inherited web page. That is, the message acquisition unit 102 acquires from the gift giver terminal 70 whether the original message is to be stored in the archive database 60. When the message acquiring unit 102 acquires the selection to access the dedicated web page or the inherited web page, the period for providing the dedicated web page or the inherited web page from the gift giver terminal 70 and the input method of the charge To get
- the message acquisition unit 102 When acquiring the selection to access the dedicated web page or the inherited web page, stores information for identifying the decided original message and the operation target message in the archive database 60. In addition, the message acquisition unit 102 receives the storage information from the gift giver terminal 70 and stores the storage information in the archive database 60.
- the message acquisition unit 102 acquires customer order information such as a payment method, delivery destination information, delivery method, delivery date, price, etc. by selecting a optional item such as a gift card or gift shield describing a message.
- the message acquisition unit 102 acquires customer information of a gift giver and a gift giver as gift giver information, and records the received information in a storage device (not shown).
- the message acquiring unit 102 acquires the selection to access the dedicated web page or the inherited web page, the message acquiring unit 102 stores the gift giver information and the gift giver information in the archive database 60.
- the arithmetic encryption device 30 shortens and encrypts an operation target message including at least a text sentence by using a hash function. Thereby, the arithmetic encryption device 30 generates an arithmetic encryption value (step 1600).
- the dealer recommends that the text be unique. For example, it may be recommended to give the date of the gifting date as a string.
- the dealer decides the message to be calculated by determining the file type and file to be included in the encryption calculation in consultation with the gift giver.
- Arithmetic encryption device 30 can obtain each hash value from each of files such as digitized text, voice, image, and moving picture by using a hash function for encryption.
- the retailer recommend that the text be an operation target.
- the cryptographic cryptographic device 30 determines that the text sentence included in the computational target message Change or adjust the blank position of.
- the arithmetic encryption device 30 generates an operation target message for generating a final arithmetic encryption value different from all the issued imprint values, and determines the arithmetic encryption value. (Step 1700).
- the arithmetic encryption device 30 When the message acquisition unit 102 receives a selection for accessing a dedicated web page from the gift giver terminal 70, the arithmetic encryption device 30 generates a security code for accessing the dedicated website along with the arithmetic encryption value. The arithmetic cryptographic device 30 sends the security code to the security code output unit 108. The marking control unit 106 stores the operation encryption value in the issued encryption value database 40 and the archive database 60.
- the media recording unit 112 acquires information for identifying the original message and the operation target message from the message acquisition unit 102, and then records the information in the electronic medium 3100.
- the media recording unit 112 acquires the security code from the security code output unit 108 and then records the security code on the electronic medium.
- the media recording unit 112 may further record an access method to the dedicated web server 50, an ID, and a password. The dealer may pass on to the gift giver and the gift giver in the guidebook the access method to the dedicated web server 50, the ID, the password, and the security code.
- the marking control unit 106 issues gift information and gift giver information together with the calculation encryption value.
- the value is stored in the value database 40. This makes it possible to avoid future duplicate imprinting values and to notify the gift giver in case of a lost item delivery.
- the article 3000, an electronic medium on which the original message is recorded, an optional gift card, and a gift shield are delivered to the recipient as a gift set or delivered to the gift giver and then handed over to the recipient (Ste 1910).
- a method for connecting the gift giver terminal 70 or the gift giver terminal 80 to the public web server 10 of the retail store's encryption system is provided to the gift giver along with the gift set.
- the gift giver terminal 70 or the gift giver terminal 80 accesses the arithmetic encryption device 30 via the general purpose web server 10
- the gift imprint from the gift giver terminal 70 or the gift giver terminal 80, the gift of the article pertaining to the gift giver You may enter information such as the date and the name of the gift.
- the general purpose web server 10 may authorize the operation encryption device 30 to access by authenticating the input information and the information recorded in the storage device (not shown). Thereby, the dealer can prevent the manufacture of the imitation.
- the message acquisition unit 102 When the message acquisition unit 102 acquires, from the gift giver terminal 70, a selection to access an inherited web page or a dedicated web page, the message acquisition unit 102 obtains stored information from the gift giver. The message acquisition unit 102 stores the original message in the archive database 60 together with the stored information (step 1900).
- FIG. 5 is a schematic diagram in the case of generating an encryption from a message to be calculated.
- the arithmetic encryption device 30 shortens / encrypts the operation target message 2000 into a first hash value 2100 of 64-digit hexadecimal number using, for example, the hash function SHA-256.
- the arithmetic cryptographic device 30 performs an operation of adding 1 to each of the hexadecimal numbers to the first hash value 2100 as a function specified for each store, and then arranges the first digit of the generated value to generate an intermediate operation value 2200.
- the function specified for each store may be any function, and may be a function specified for each article manufacturing system.
- the arithmetic encryption device 30 creates an 8-digit second hash value 2300 using the intermediate operation value 2200 and the hash function CRC32.
- the arithmetic encryption device 30 appends the first character of the first hash value 2100 to the second hash value 2300 as the ninth digit 2500 of the arithmetic encryption value, and generates a final arithmetic encryption value 2400 of nine digits in total.
- the invention is not limited to this, and the arithmetic cryptographic device 30 may use any combination of functions for shortening and encrypting using a hash function.
- the probability that the above-mentioned hexadecimal 9 digit hash value will be identical by chance from different original data that is, the probability of a hash collision is 1/16, or 1 / 68,719,47,736. Become. Assuming that the number of issued imprint values is 100,000 annually, the cumulative number of issued 100 million in 100 years, and the probability of hash collision in the 101st year is about 0.0146%. Therefore, the operation encryption target message involved in giving of about 14.6 for 100,000 new issues in the 101st year becomes an expected value of the hash collision. The probability of hash collision in the first year is 0.000146%, and about 0.146 is the expected value of hash collision for 100,000 new issues.
- the operation encryption device 30 corrects the operation target message based on the original message acquired from the gift provider terminal. In this case, the arithmetic encryption device 30 generates the arithmetic encryption value after adjusting the position of the blank of the text included in the arithmetic target message. In addition, the arithmetic cryptographic device 30 sets a four-digit hexadecimal number 2500 from the second digit to the fifth digit of the SHA-256 arithmetic result as a security code.
- Arithmetic encryption device 30 can increase the number of digits of the imprint value. As an example, the arithmetic encryption device 30 can easily increase the number of digits and reduce the possibility of hash collision by selecting a digit to be newly added from the SHA-256 arithmetic encryption value of the arithmetic target message.
- the media recording unit 112 records information for identifying an original message and a message to be calculated on the electronic medium 3100.
- An electronic media 3100 and a gift card / gift shield 3200 are provided to the gift giver and the gift giver as an option for the item 3000.
- the message accepting unit 104 acquires a copy of the operation target message recorded in the electronic medium 3100 or a manually input message from the gift giver terminal 70, the gift giver terminal 80, or the inheritor terminal 85.
- the arithmetic encryption device 30 obtains an arithmetic encryption value based on the acquired message, and outputs the arithmetic encryption value to the arithmetic encryption value output unit 110.
- the gift giver, the gift giver or the successor can confirm the authenticity of the message by confirming that the outputted arithmetic encryption value and the inscription value match.
- FIG. 6 is an example of the operation target message.
- the arithmetic cryptographic device 30 obtains the arithmetic result of Table 1 by the hash function SHA-256.
- the arithmetic cryptographic device 30 adds 1 to each digit of the arithmetic result of the hash function SHA-256 to obtain the arithmetic result of Table 2.
- the arithmetic encryption device 30 obtains the calculation result of “3c239540” by the hash function CRC32. Then, the arithmetic encryption device 30 obtains “3c2395401” as the arithmetic encryption value. Also, the arithmetic encryption device 30 obtains “fb30” as the security code.
- FIG. 7 is an example when the blank of the first message is changed.
- the arithmetic cryptographic device 30 obtains the arithmetic result of Table 3 by the hash function SHA-256.
- the arithmetic cryptographic device 30 adds 1 to each digit of the calculation result of the hash function SHA-256 to obtain the calculation result of Table 4.
- the arithmetic encryption device 30 obtains the calculation result of “69f 96efc” by the hash function CRC32. Then, the arithmetic encryption device 30 obtains “69f96efc9” as the arithmetic encryption value. Also, the arithmetic encryption device 30 obtains “d8e0” as the security code.
- FIG. 8 is an example of a reply message from a gift giver to a gift giver.
- the arithmetic cryptographic device 30 obtains the calculation result of Table 5 by the hash function SHA-256.
- the arithmetic cryptographic device 30 adds 1 to each digit of the arithmetic result of the hash function SHA-256 to obtain the arithmetic result of Table 6.
- the arithmetic encryption device 30 obtains the calculation result of “d822597c” by the hash function CRC32. Then, the arithmetic encryption device 30 obtains “d822597 c2” as the arithmetic encryption value.
- FIG. 9 shows an example of processing of the arithmetic cryptographic device 30 in the case of encrypting a file of a different file format.
- the arithmetic encryption device 30 first encrypts each file with the hash function SHA-256 to obtain each first hash value. Thereafter, the arithmetic encryption device 30 combines the first hash values to obtain an arithmetic encryption value as a second hash value.
- FIG. 10 is an example of a display screen of a dedicated web page or an inherited web page.
- the dedicated web server 50 selectively provides the gift giver terminal 70 and the gift giver terminal 80 with text, images, voice, and the like.
- the general-purpose web server 10 When the general-purpose web server 10 receives a response to the gift giver along with a response to the gift giver from the gift giver terminal 80, the message from the gift giver stored in the archive database 60 is combined with the reply to calculate the operation encryption value. It may be generated. Thereby, the respective messages can be shared between the gift giver and the gift giver, and a sense of oneness can be raised.
- the association control unit 107 may associate the character string generated by the marking value generation device 92 for marking with the operation encryption value to mark the item.
- the character string may include a random number or a pseudorandom number generated from a random number generation device or a pseudorandom number generation device included in the stamp value generation device 92.
- Arithmetic encryption device 30 generates a unique arithmetic encryption value of the number of digits that can be imprinted on the article using a unique algorithm determined by the store using the given assignment information, and imprints the article or an imprint value generation device Correspond to the string. It is necessary and sufficient that the same operation encryption value uniquely determined by the number of printable digits can be generated when the assignment information input to the operation encryption device 30 is the same, and the algorithm used for the process is Anything is fine. Also, there is no need to decrypt the assignment information from the final operation encryption value, and the function used in that sense may be a one-way function.
- the hash function used by the arithmetic cryptographic device 30 for shortening / encrypting the assignment information can calculate the value of the hash calculation result and further obtain the hash value. Arithmetic process of arbitrary hash function operation, function operation of hash value, character conversion, combination, addition and subtraction and position change, radix conversion, conversion to other character string including random number using conversion table, etc. in intermediate operation step It may be used for
- the character string of the alphabet is illustrated as the imprint value, but as a character representing the imprint value, not only the alphabet but naturally also characters of various languages such as Arabic characters and Greek characters are included be able to.
- the imprint value can be represented by a combination of characters of various languages.
- the marking value can also be represented by various marks other than characters.
- the mark representing the imprint value may be a geometric figure such as a square figure, a triangle figure or the like.
- the article manufacturing system 100 as an embodiment of the article processing system for generating and imprinting a stamp value from an original message or the like has been described.
- an embodiment of an article processing system will be described in which the arithmetic encryption value and the marking value are associated with each other when the marking value is already marked on the article.
- the product is stamped with a stamp value at the time of manufacture.
- the random number value generated by the marking value generation device 92 as the marking value to be marked on the article is marked on the article by the marking device 90.
- FIG. 11 shows a flow chart in the case of associating the operation encryption value with the article on which the marking value has already been stamped.
- the steps other than step 1800 and step 1900 are the same as the steps shown in FIG. Therefore, the description will be omitted except for step 1820 and step 1920 which replace step 1800 and step 1900.
- the association control unit 107 changes the process to the process of imprinting the imprint value described in FIG. 4 and the like, the imprint value imprinted on the gifted article, and the arithmetic encryption value And the corresponding (step 1820). Specifically, the association control unit 107 stores the unique operation encryption value determined in step 1610 in the encryption value correspondence database 42 in association with the unique imprint value imprinted on the gifted article. (Step 1920). As described above, the association control unit 107 stores the stamp value stamped on the article received by the recipient of the article in the cryptographic value correspondence database 42 in association with the arithmetic cryptographic value.
- the marking by the marking device 90 may be performed at least before the additional information acquiring unit 103 acquires the additional information as described above, but may be performed after the additional information acquiring unit 103 acquires the additional information.
- the generation of the marking value by the marking value generation device 92 may be performed at least before the giving information acquisition unit 103 acquires the provision information as described above, after the provision information acquisition unit 103 acquires the provision information ( For example, after the operation encryption value is generated, etc.).
- the association control unit 107 is the imprinted value generated by the imprinted value generation device 92, and associates the imprinted value not imprinted on the other article with the operation encryption value to obtain the encrypted value correspondence database 42. By storing them in the table, it is possible to secure the uniqueness between the stamp value and the arithmetic encryption value.
- FIG. 12 schematically shows the process of associating a stamp value and an arithmetic encryption value.
- the encryption value correspondence database 42 stores a plurality of imprint values imprinted on manufactured articles and operation encryption values associated therewith.
- the encryption value correspondence database 42 does not store the corresponding operation encryption value for the imprint value in the case where the imprint is performed before obtaining the operation encryption value.
- the lower case letter of the arithmetic encryption value is simply changed to upper case letters, and the stamp value is used as it is.
- the marking value generation device 92 first generates a marking value and marks it on an article, and after receiving the assignment information, calculates a calculation encryption value, and the marking value and calculation encryption value are in the encryption value correspondence database 42. It is related.
- the association control unit 107 stores the operation encryption value “3c2395401” in the encryption value correspondence database 42 in association with the marking value “42AF 311 B6”.
- the article 3000 on which the marking value "42AF 311B6" is stamped is associated with the operation encryption value from the additional information attached to the article 3000.
- “to associate the calculated cryptographic code value with the article” means “stamp the article with the calculated cryptographic code value as the stamped value”, and “make the stamped value associated with the calculated cryptographic code value the article”. It is a concept including “engraving” and “associating an imprint value imprinted on an article with a calculated encryption value”. Further, the “stamp value associated with the arithmetic encryption value” may be a random value generated independently of the assignment information. Furthermore, “an imprint value stamped on an article” may partially include a non-random value such as a random value or a serial number on the premise that the value is unique.
- FIG. 13 shows a flowchart of the confirmation process by the gift giver.
- the giver accesses the confirmation site created by the general purpose web server 10 using the giver terminal 80 (step 4100).
- the gift giver inputs at least a portion of the original message into the message input format as a confirmation message using the gift giver terminal 80 (step 4200).
- the gift receiver terminal 80 transmits the confirmation message to the public facing web server 10.
- the assigned information accepting unit 105 included in the general purpose web server 10 acquires the confirmation message transmitted from the gift giver terminal 80 and sends the confirmation message to the arithmetic encryption device 30.
- the arithmetic encryption device 30 generates an arithmetic encryption value based on the confirmation message (step 4300).
- the arithmetic encryption device 30 determines whether or not an arithmetic encryption value identical to the generated arithmetic encryption value is stored in the issued encryption value database 40 (step 4400). If it is determined in step 440 that the same calculated encryption value is stored in the issued encryption value database 40, the imprinted value stored in the encryption value correspondence database 42 in association with the calculated encryption value. Are extracted as the verification operation encryption value (step 4500). The arithmetic encryption value output unit 110 transmits the confirmation arithmetic encryption value extracted in step 4500 to the gift receiver terminal 80 (step 4600).
- step 4400 If it is determined in step 4400 that the same calculated encryption value is not stored in the issued encryption value database 40, the general purpose web server 10 sends an error message to the gift receiver terminal in step 4700. Send (step 4700). This makes it possible to confirm the authenticity of the original message.
- the assignment information receiving unit 105 receives, from the owner of the article, calculation target assignment information which is at least a part of the original message attached to the article as a confirmation original message. Then, if the confirmation original message is the same as the calculation target original message, the arithmetic encryption device 30 outputs the same confirmation arithmetic encryption value as the arithmetic encryption value stamped on the article.
- FIG. 14 is a flow chart of an example in which the store adds a message to be added to the article as the assignment information.
- the product ID forms a unique item identifier, and is described in the item code attached to the item together with the product code and the product name.
- a salesperson facing a customer who is considering the purchase of an item writes a message attached to the item by the store displayed on the store terminal 65 connected to the general-purpose web server 10 of the store Enter the password, the product code of the item, and the product ID in the “Message to customer” screen ( Figure 15), and the stamp value associated with the operation encryption value of “message to customer” that is the grant information
- the article manufacturing system of the dealer outputs to the shop terminal.
- the salesperson visually confirms with the customer that the stamped value matches the stamped value of the target article, and proves that the article is genuine.
- each step will be described in correspondence with the steps of the flowchart.
- the distributor or brand factory receives the product ID of the product, the product code, and the product name prior to shipment of the product, “Message to customer” 4000 as a message attached to the product and “Message to the customer”
- a 15-character hexadecimal arithmetic cryptographic value is calculated using the character string (FIG. 15) combining the additional characters “? **?” 4010 not displayed on the screen as arithmetic target addition information, and the radix conversion to a 32 decimal number
- “0” of a part of the characters is converted into “w” to make a final operation encryption value, and is imprinted on the article as an imprint value.
- the product ID, product code, and product name of the article are printed on the attached product tag, and the article is shipped together with the article to the store.
- the product ID may be imprinted or printed on the article itself.
- the last character a of the product ID "82159501a" of this example is "the number of arbitrary digits that the party who created the grant information approves the change as a result of the hash collision occurring in the operation encryption value of" message for customer " Is added as a modified part of the "variable character string part” that does not form the meaning of the assignment information.
- the shop staff 65 connected to the web server 10 for general purpose “customer to the customer”
- the screen of "message” (FIG. 15) is displayed (step 5010).
- the sales representative inputs the dedicated password assigned by the store, the product code "BBK16" of the article, and the product ID "82159501a” (step 5020).
- the general purpose web server 10 After authenticating the legitimacy of the request (step 5030), the general purpose web server 10 returns the "message to the customer" displayed by adding the product item name of the article also serving as the request acceptance confirmation to the shop terminal. If the general purpose web server 10 notifies the shop terminal that the product ID has not been issued as a genuine product at this stage, it is judged as a forged accident product, and the process proceeds to the forged accident product response step.
- the salesperson After confirming that the sent product name “BlueOcean Pendant” matches the item, the salesperson transfers “message to the customer” to the additional information acquisition unit 103 of the general purpose web server 10 as part of the additional information. And issue an operation request for the stamp value of "Message to customer". At this time, however, the password does not form the grant information (step 5040).
- Arithmetic encryption device 30 is not displayed on the screen of the “store message” held by provision information acquisition unit 103 prepared for this applicable business in advance, with “message to the customer” in which the product code, product ID, and product name are input.
- the SHA-256 hash value (Table 7) is acquired with the character string obtained by combining the additional character string “? **?” As calculation target addition information.
- the arithmetic cryptographic device 30 then performs an intermediate operation.
- 1 is added to the value of each digit of the hash value of Table 7 to generate a 64-character string having only the value of the first digit (Table 8).
- Hash calculation of CRC32 is performed on the values of Table 8 to obtain “638a5d0c”. Furthermore, the 7-digit character string copied from a predetermined position (positions 57 to 63) of the character string obtained by adding 1 to the values in Table 7 (Table 8) is the 9th digit of the CRC32 calculated value. Add to the 15th digit from. As a result, an intermediate operation value “638a5d0c83e3a5d” of 15 digits is obtained. Next, the arithmetic encryption device 30 performs radix conversion of the intermediate encryption value from hexadecimal to 32 and some character conversion (for example, conversion of 0 to w), and the final arithmetic encryption value is a 12-digit 32-digit number. To obtain "ce55q343seiw”.
- the association control unit 107 obtains the stamp value “CE55Q343SEIW” associated with the operation encryption value in the encryption value correspondence database 42 (step 5050).
- the marking value may be the arithmetic encryption value itself, but may be a unique character string generated in advance by the marking value generation device 92.
- the marking value is the same as the operation encryption value, but a rule is provided to capitalize the alphabet in the marking characters.
- Step 5060 After confirming that the stamped value is properly issued from the store and that the article with the stamped value is not sold in the issued encrypted value database 40 (general-use web server 10) (Step 5060) If there is no problem as a new genuine product, the stamp value is returned to the store terminal (Step 5070). If the stamp value is either not properly issued or there is a record that has been sold in the past, the process proceeds to the counterfeit accident product response step (step 5080).
- the associating control unit 107 records forged accident information such as the stamp value of the corresponding article, the date of the accident, and the store information in the issued encrypted value database 40, and creates the alarm report. Do.
- the salesperson After the stamp value is sent to the store terminal 65 in step 5070, the salesperson confirms that the stamp value stamped on the article at the counter matches the stamp value sent from the general-purpose web server 10 (step 5072). If there is a match, the intended purchaser is presented and visually checked to understand that it is a new genuine product (step 5090).
- the store delivers the product tag to the customer, along with the goods, the product code, the product ID, and the password for the customer being covered with thin paper.
- the URL of the website where "Messages to Customers" is posted and a booklet that describes how to use.
- the shop system updates the sales confirmation column in the issued encrypted value database 40 of the shop article manufacturing system, and the shop code is recorded on the date when the stamp value is sold. Step 5110).
- the store terminal 65 connected to the general purpose web server 10 of the store and explained the flow chart which asks for the stamp value of the article, from the viewpoint of security, it connects to the store use web server (not shown) You may do a series of similar processing.
- the purchaser can use the terminal at home to connect to the general-purpose web server 10 of the store to confirm the legitimacy of the goods.
- the buyer After returning home, the buyer removes the shielding film of the product tag and obtains the password, and then enters the password, product ID, and product code on the “Message to customer” screen provided by the dealer, and is part of the information provided to the public. It is transferred to the additional information acquisition unit 103 of the web server 10.
- the assignment information reception unit 105 uses the character string obtained by combining the acquired “message to the customer” and the additional characters “? **?” Not displayed on the screen prepared for the application as the operation target assignment information. Transfer to device 30, resulting in the imprint value.
- the operation encryption of “the message that the customer adds to the article” is presented as an option And whether to associate the message with the stamp value stamped on the article.
- the operation encryption is performed by the same processing as the processing described in connection with steps 1100 to S1610 of FIG.
- the value is calculated.
- the calculated encryption value is recorded in association with the marking value stamped on the article and the encryption value correspondence database 42.
- the customer can also update the message added to the article by the store after the stamp value and the calculated encryption value are associated with each other and recorded in the encryption value correspondence database 42.
- the home-use web server 10 is accessed using a home terminal, and a new arithmetic encryption value is calculated by the same processing as the processing described in connection with steps 1100 to S1610 in FIG. 4. .
- the encrypted value correspondence database 42 records the new calculated encrypted value in association with the stamp value stamped on the article.
- the arithmetic encryption device 30 calculates at least a part of the new message As the assignment information, the operation encryption value is acquired by shortening with a hash function. Then, the operation encryption value is recorded in the encryption value correspondence database 42 in association with the imprint value already imprinted or printed on the article to which the new message is to be applied.
- the product ID and the operation encryption value are printed on the two-dimensional barcode 4240 on the surface of the package.
- the store barcode reader is connected to the store local server in real time, and transfers the read product ID and the calculated encryption value to the store local server.
- the store local server is installed with an algorithm for generating the calculation encryption value downloaded from the drug manufacturer's center system, and addition information other than the product ID for generating calculation target addition information, and the calculation encryption of the latest forged accident product Holds the value information.
- the store local server combines the product ID acquired from the barcode reader with the additional information other than the product ID to be held, obtains the calculation target addition information, and then acquires the calculation encryption value, and the calculation encryption value acquired from the barcode reader Verify that it matches.
- an electronic tag in which a product ID and an arithmetic encryption value are recorded may be mounted on a medicine package, and a store may be equipped with an RFID reader.
- the additional information receiving unit 105 determines final additional information to be calculated and obtains an arithmetic encryption value. Furthermore, after confirming in the issued encryption value database 40 that the operation encryption value is not a forged accident product, the operation encryption value is transferred to the purchaser. The purchaser confirms the result of whether the arithmetic encryption value “T4JL8W83BGNL” 4230 printed on the package matches the arithmetic encryption value transferred from the general purpose web server 10, and determines the regularity of the corresponding medicine package.
- drug manufacturers and stores can determine the normality of articles without keeping the correspondence table between product IDs printed on packages and calculated encryption values in the database of the system, and the risk is simple and simple Strong anti-counterfeit measures can be taken.
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Economics (AREA)
- Theoretical Computer Science (AREA)
- Marketing (AREA)
- General Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- Strategic Management (AREA)
- Quality & Reliability (AREA)
- Tourism & Hospitality (AREA)
- Entrepreneurship & Innovation (AREA)
- Operations Research (AREA)
- Human Resources & Organizations (AREA)
- Accounting & Taxation (AREA)
- Development Economics (AREA)
- Finance (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Storage Device Security (AREA)
- Information Transfer Between Computers (AREA)
Abstract
Description
1.国際出願番号PCT/JP2008/056442 出願日 2008年3月31日
Claims (13)
- 物品処理システムが、物品に付与される付与情報の少なくとも一部を暗号化する物品処理方法であって、
前記物品処理システムが備える付与情報取得部が、前記付与情報を取得する付与情報取得ステップと、
前記物品処理システムが備える演算暗号装置が、前記付与情報の少なくとも一部を演算対象付与情報として、ハッシュ関数で短縮して、演算暗号値を取得する演算暗号処理ステップと、
前記物品処理システムが備える関連付制御部が、前記演算暗号値と前記物品とを対応させる関連付けステップと
を備え、
前記付与情報は、
販売店、ブランド、デザイナーまたは製作者が物品に付記するメッセージ、
購入者が物品に付記するメッセージ、および
贈与者が受贈者に物品と共に贈るメッセージ
の少なくとも1つを含み、
前記関連付けステップにおいて、前記関連付制御部は、
前記演算暗号値を刻印値として前記物品または前記物品の付属品に刻印または印字、バーコード形式で印字、または電子的に記録する処理、
前記演算暗号値に関連づけられた刻印値を前記物品または前記物品の付属品に刻印または印字、バーコード形式で印字、または電子的に記録する処理、および、
前記物品または前記物品の付属品に刻印または印字、バーコード形式で印字、または電子的に記録されている刻印値を前記演算暗号値に関連づける処理
の少なくともいずれかにより、前記演算暗号値と前記物品とを対応させる物品処理方法。 - 前記演算暗号処理ステップは、
前記演算暗号装置が、前記演算対象付与情報からハッシュ値を演算するハッシュ値演算ステップと、
前記演算暗号装置が、前記ハッシュ値に、
任意の文字の追加、
任意の文字の削減、
任意の文字の位置変更、
任意の関数演算、
任意の文字の変換、
任意の基数変換、および
任意のハッシュ計算
の少なくとも1つを行って、前記物品に刻印または印字可能な程度の任意の桁数の中間演算値を求める中間演算値演算ステップと、
前記中間演算値から前記演算暗号値を演算する演算暗号値生成ステップと
を有する請求項1に記載の物品処理方法。 - 前記演算対象付与情報は、変更が許容されない不可変な文字列部分と、変更が許容される可変な文字列部分を包含する文字列を含み、
前記演算暗号処理ステップは、前記演算対象付与情報の前記可変な文字列部分の少なくとも一部を変更して前記ハッシュ関数で短縮することにより、他のいずれの物品に既に関連づけられた演算暗号値のいずれとも異なる前記演算暗号値を取得する
請求項1または2に記載の物品処理方法。 - 前記付与情報が、前記販売店、ブランド、デザイナーまたは製作者が物品に付記する少なくともプロダクトIDを含むメッセージである場合に、
前記演算暗号処理ステップにおいて、前記演算暗号装置は、前記プロダクトIDを少なくとも含む前記演算対象付与情報から、前記演算暗号値を取得し、
前記関連付けステップにおいて、前記関連付制御部は、前記演算暗号値を前記物品に刻印または印字する処理により、前記演算暗号値と前記物品とを対応させる
請求項1に記載の物品処理方法。 - 前記物品処理システムが備える刻印値生成装置が、前記物品に刻印または印字されるべき文字列を生成する刻印値生成ステップ
をさらに備え、
前記関連付けステップにおいて、前記関連付制御部は、
前記刻印値生成ステップにおいて生成された文字列であって他の物品に刻印されていない文字列を、前記演算暗号値に対応づけて暗号値対応データベースに記録するとともに、前記演算暗号値に対応づけて暗号値対応データベースに記憶される文字列を、前記物品に前記刻印値として刻印することにより、前記演算暗号値に関連づけられた前記刻印値を前記物品に刻印または印字する
請求項1に記載の物品処理方法。 - 前記物品処理システムが備える刻印値生成装置が、前記物品に刻印または印字されるべき文字列を生成する刻印値生成ステップと、
前記物品処理システムが備える刻印装置が、前記刻印値生成ステップにおいて生成された文字列を前記刻印値として前記物品に刻印または印字する刻印ステップと
をさらに備え、
前記刻印値生成ステップおよび前記刻印ステップは、前記付与情報取得ステップおよび前記関連付けステップの前に行われ、
前記関連付けステップにおいて、前記関連付制御部は、前記物品の受取者が受け取る前記物品に刻印されている前記刻印値を、前記演算暗号値に対応付けて暗号値対応データベースに記録することにより、前記刻印値を前記演算暗号値に関連づける
請求項1に記載の物品処理方法。 - 前記刻印値生成装置が生成する前記物品に刻印または印字されるべき文字列が、乱数値または擬似乱数値である
請求項5または6に記載の物品処理方法。 - 前記演算対象付与情報は、前記物品処理システムに保管され、顧客、購入者、贈与者または受贈者から隠蔽された文字列を一部に含む
請求項1から7のいずれかに記載の物品処理方法。 - 前記付与情報取得部が、刻印値が既に刻印されている前記物品に付与されるべき新たな付与情報を取得する付与情報再取得ステップと、
前記演算暗号装置が、前記新たな付与情報の少なくとも一部を演算対象付与情報として、ハッシュ関数で短縮して演算暗号値を取得する演算暗号値再取得ステップと、
前記関連付制御部が、前記新たな付与情報が付与されるべき物品に既に刻印または印字されている刻印値に対応づけて、演算暗号値再取得ステップにおいて取得された演算暗号値を暗号値対応データベースに記録する再関連付けステップと
をさらに備える請求項1に記載の物品処理方法。 - 前記物品処理システムが備える付与情報受付部が、前記販売店、前記物品の所有者、または贈与者から、前記演算対象付与情報を、確認付与情報として受け付ける付与情報受付ステップと、
前記確認付与情報が前記演算対象付与情報と同一である場合、前記物品に関連づけられた前記演算暗号値と同一の確認演算暗号値を出力する確認演算暗号値出力ステップと
をさらに備える請求項1または2に記載の物品処理方法。 - 前記付与情報が、前記販売店、ブランド、デザイナーまたは製作者が物品に付記する少なくともプロダクトIDを含むメッセージである場合に、
前記関連付けステップにおいて、前記関連付制御部は、前記演算対象付与情報に少なくとも含まれる前記プロダクトID、および前記演算暗号値を、前記物品または前記物品の付属品に刻印または印字、バーコード形式で印字、または電子的に記録する処理により、前記演算暗号値と前記物品とを対応させ、
前記物品処理方法は、
前記演算対象付与情報が前記プロダクトID以外の情報を含む場合に、前記プロダクトIDおよび前記演算暗号値を前記物品または前記付属品から読み出す端末がアクセス可能なサーバに、前記演算対象付与情報に含まれる前記プロダクトID以外の情報を少なくとも保持するステップ
をさらに備える請求項1から3、9、10のいずれかに記載の物品処理方法。 - 前記付与情報が、前記贈与者が受贈者に物品と共に贈るメッセージである場合において、前記物品処理システムが備える専用ウェブページ作成部が、前記贈与者と前記受贈者との間のやり取りを受け付ける専用ウェブページを作成する専用ウェブページ作成ステップと、
前記物品処理システムが備えるセキュリティコード出力部が、前記ハッシュ値演算ステップの演算結果から生成された、前記演算暗号値と異なる値であって前記専用ウェブページへのアクセスを認めるセキュリティコードを出力するセキュリティコード出力ステップと、
前記物品処理システムが備えるセキュリティコード受付部が、前記贈与者または前記受贈者から、前記物品とともに届けられた前記セキュリティコードを受け付けるセキュリティコード受付ステップと、
前記物品処理システムが備える認証部が、受け付けた前記セキュリティコードに基づいて、前記専用ウェブページへのアクセスを認証する認証ステップと
をさらに備える請求項2に記載の物品処理方法。 - 前記付与情報が、前記贈与者が受贈者に物品と共に贈るメッセージである場合において、前記物品処理システムが備えるメッセージ取得部が、前記贈与者、前記受贈者、および前記物品を継承した継承者が保存を希望する所定の保存情報を格納するアーカイブデータベース格納ステップと、
前記物品処理システムが備える継承ウェブページ作成部が、前記贈与者、前記受贈者、および前記継承者ごとに前記保存情報を含む継承ウェブページを作成する継承ウェブページ作成ステップと、
前記物品処理システムが備えるアクセス鍵受付部が、前記継承ウェブページへのアクセス鍵の入力を受け付けるアクセス鍵受付ステップと、
前記物品処理システムが備えるセキュリティコード出力部が、前記ハッシュ値演算ステップの演算結果から生成された、前記演算暗号値と異なる値であって前記継承ウェブページへのアクセスを認めるセキュリティコードを出力するセキュリティコード出力ステップと、
前記物品処理システムが備えるセキュリティコード受付部が、前記贈与者、前記受贈者、または前記継承者から、前記物品とともに届けられた前記セキュリティコードを受け付けるセキュリティコード受付ステップと、
前記物品処理システムが備える認証部が、受け付けた前記セキュリティコードに基づいて、前記アクセス鍵と前記演算暗号値を含む認証情報とを認証して、前記継承ウェブページへのアクセスおよび前記保存情報の変更を許可する認証ステップと
をさらに備える請求項2に記載の物品処理方法。
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200980110955XA CN102007508A (zh) | 2008-03-31 | 2009-03-31 | 物品处理方法 |
JP2009533023A JP4608014B2 (ja) | 2008-03-31 | 2009-03-31 | 物品処理方法 |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JPPCT/JP2008/056442 | 2008-03-31 | ||
PCT/JP2008/056442 WO2009122558A1 (ja) | 2008-03-31 | 2008-03-31 | 物品製造方法、物品製造システム、および物品 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2009122730A1 true WO2009122730A1 (ja) | 2009-10-08 |
Family
ID=40239528
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2008/056442 WO2009122558A1 (ja) | 2008-03-31 | 2008-03-31 | 物品製造方法、物品製造システム、および物品 |
PCT/JP2009/001505 WO2009122730A1 (ja) | 2008-03-31 | 2009-03-31 | 物品処理方法 |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2008/056442 WO2009122558A1 (ja) | 2008-03-31 | 2008-03-31 | 物品製造方法、物品製造システム、および物品 |
Country Status (4)
Country | Link |
---|---|
US (1) | US20100005299A1 (ja) |
JP (2) | JP4199304B1 (ja) |
CN (1) | CN102007508A (ja) |
WO (2) | WO2009122558A1 (ja) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP5238089B1 (ja) * | 2012-08-31 | 2013-07-17 | 株式会社スタジオフェイク | 正規品販売情報管理システム、正規品販売情報管理装置、正規品販売情報管理方法およびコンピュータプログラム |
JP2015022314A (ja) * | 2013-07-16 | 2015-02-02 | 大日本印刷株式会社 | 真贋判定システム、真贋判定方法、ログ管理サーバ、及び、プログラム |
JP2016532169A (ja) * | 2013-09-27 | 2016-10-13 | 家銘 康 | 偽造防止検証システム |
JP2017027588A (ja) * | 2016-06-06 | 2017-02-02 | 株式会社野村総合研究所 | 情報管理システム、基本id管理システムおよび基本id管理方法 |
JP2019036249A (ja) * | 2017-08-21 | 2019-03-07 | メディカルアイ株式会社 | 医療情報管理装置、医療情報管理方法及びプログラム |
JP2019169200A (ja) * | 2019-06-26 | 2019-10-03 | 株式会社日本総合研究所 | 3d認証システム |
Families Citing this family (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7162035B1 (en) | 2000-05-24 | 2007-01-09 | Tracer Detection Technology Corp. | Authentication method and system |
US8171567B1 (en) | 2002-09-04 | 2012-05-01 | Tracer Detection Technology Corp. | Authentication method and system |
US7995196B1 (en) | 2008-04-23 | 2011-08-09 | Tracer Detection Technology Corp. | Authentication method and system |
US8856082B2 (en) | 2012-05-23 | 2014-10-07 | International Business Machines Corporation | Policy based population of genealogical archive data |
US10210527B2 (en) | 2015-06-04 | 2019-02-19 | Chronicled, Inc. | Open registry for identity of things including social record feature |
WO2016197055A1 (en) | 2015-06-04 | 2016-12-08 | Chronicled, Inc. | Open registry for identity of things |
US10558979B2 (en) * | 2016-01-20 | 2020-02-11 | Zortag, Inc. | Method of, and system for, preventing unauthorized products from being sold on online sites |
US11107088B2 (en) | 2016-05-27 | 2021-08-31 | Chronicled, Inc. | Open registry for internet of things |
WO2018075403A1 (en) * | 2016-10-17 | 2018-04-26 | Chronicled, Inc. | Open registry for provenance and tracking of goods in the supply chain |
CN114502309A (zh) | 2019-10-11 | 2022-05-13 | 松下知识产权经营株式会社 | 标识符管理方法、机器人控制装置以及综合控制装置 |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002292969A (ja) * | 2001-03-30 | 2002-10-09 | Amano Corp | ラベル発行装置及び日付認識可能なラベル |
JP2003223567A (ja) * | 2002-01-31 | 2003-08-08 | Akiyasu Cho | グリーティングカードを通信ネットワークを経由して配信するための電子カード配信方法及びシステム |
JP2005189986A (ja) * | 2003-12-24 | 2005-07-14 | Gijutsu Transfer Service:Kk | 2次元コードを備えた物品及び該物品を用いた情報提示システム |
JP2007034958A (ja) * | 2005-07-29 | 2007-02-08 | Pilot Corporation | 二次元コードを有する装飾品 |
JP2007058382A (ja) * | 2005-08-23 | 2007-03-08 | Fuji Xerox Co Ltd | 印刷装置、検証装置、検証システム、印刷方法及び検証方法 |
Family Cites Families (34)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6097301A (en) * | 1996-04-04 | 2000-08-01 | Micron Communications, Inc. | RF identification system with restricted range |
US5425078A (en) * | 1993-07-19 | 1995-06-13 | Starbro Communications, Inc. | Voice message keepsake system |
GB2282345B (en) * | 1993-10-02 | 1997-06-04 | Graham Athey | Signature filaments and security papers |
US20030177347A1 (en) * | 1995-11-22 | 2003-09-18 | Bruce Schneier | Methods and apparatus for awarding prizes based on authentication of computer generated outcomes using coupons |
US6222452B1 (en) * | 1996-12-16 | 2001-04-24 | Confidence International Ab | Electronic identification tag |
US5983238A (en) * | 1997-12-26 | 1999-11-09 | Diamond Id | Gemstons identification tracking and recovery system |
US6044353A (en) * | 1998-03-10 | 2000-03-28 | Pugliese, Iii; Anthony V. | Baggage check-in and security system and method |
US6591252B1 (en) * | 1999-03-04 | 2003-07-08 | Steven R. Young | Method and apparatus for authenticating unique items |
US6280544B1 (en) * | 1999-04-21 | 2001-08-28 | Intermec Ip Corp. | RF tag application system |
US6308891B1 (en) * | 1999-05-05 | 2001-10-30 | T.I.D. (The Identifying Diamond) Inc. | Jewelry identification |
US6822639B1 (en) * | 1999-05-25 | 2004-11-23 | Silverbrook Research Pty Ltd | System for data transfer |
US6259367B1 (en) * | 1999-09-28 | 2001-07-10 | Elliot S. Klein | Lost and found system and method |
US7162035B1 (en) * | 2000-05-24 | 2007-01-09 | Tracer Detection Technology Corp. | Authentication method and system |
GB0015147D0 (en) * | 2000-06-21 | 2000-08-09 | Jacobs Michael | Tracking system |
WO2002032047A1 (en) * | 2000-10-11 | 2002-04-18 | Trustcopy Pte Ltd | Remote printing of secure and/or authenticated documents |
US6950024B2 (en) * | 2001-01-09 | 2005-09-27 | Wunderlick John C | System for recovering lost jewelry and diamonds |
US20030063772A1 (en) * | 2001-09-06 | 2003-04-03 | Smith Joshua R. | System and method for authentication and tracking of a workpiece that includes an optically active medium |
US7353398B2 (en) * | 2002-05-29 | 2008-04-01 | International Business Machines Corporation | Article, method, system and apparatus for decentralized creation, distribution, verification and transfer of valuable documents |
JP4155186B2 (ja) * | 2003-12-17 | 2008-09-24 | 日本電気株式会社 | 付加情報表示システムおよび付加情報表示方法 |
JP4649403B2 (ja) * | 2004-04-01 | 2011-03-09 | パナソニック株式会社 | 価値情報管理システム、記録媒体、プリンタ装置、精算装置、電子データ印刷方法及びコンピュータプログラム |
JP4439340B2 (ja) * | 2004-04-13 | 2010-03-24 | 大阪瓦斯株式会社 | 製造履歴管理システム |
US7788482B2 (en) * | 2004-05-10 | 2010-08-31 | Scientific Games International, Inc. | System and method for securing on-line documents using authentication codes |
JP2006136203A (ja) * | 2004-11-10 | 2006-06-01 | Bunmeido:Kk | 直接バーコードが表示された菓子 |
US20060129502A1 (en) * | 2004-12-15 | 2006-06-15 | Microsoft Corporation | Generation, distribution and verification of tokens using a secure hash algorithm |
US8224754B2 (en) * | 2004-12-15 | 2012-07-17 | Microsoft Corporation | Generation, distribution and verification of tokens using a secure hash algorithm |
JP2006202017A (ja) * | 2005-01-20 | 2006-08-03 | Sharp Corp | 情報処理装置、情報記憶装置、情報処理装置の機能拡張システム、情報処理装置の機能拡張方法及び機能削除方法、並びに情報処理装置の機能拡張プログラム及び機能削除プログラム |
JP2006260614A (ja) * | 2005-03-15 | 2006-09-28 | Sony Corp | ディスク製造方法、データ記録装置、情報記録媒体、情報処理装置および方法、並びにコンピュータ・プログラム |
JP2007208615A (ja) * | 2006-02-01 | 2007-08-16 | Konica Minolta Business Technologies Inc | 情報処理装置、動作制御方法及び操作インターフェイス |
JP2007226286A (ja) * | 2006-02-21 | 2007-09-06 | Takuhiro Mizuno | コンテンツ情報配信システム及びプログラム |
JP2007317123A (ja) * | 2006-05-29 | 2007-12-06 | Daisuke Yamamoto | 動画像管理サーバ |
JP4816281B2 (ja) * | 2006-06-22 | 2011-11-16 | 富士ゼロックス株式会社 | 文書利用管理システム、文書管理サーバ及びそのプログラム |
US8001383B2 (en) * | 2007-02-01 | 2011-08-16 | Microsoft Corporation | Secure serial number |
US7970128B2 (en) * | 2007-07-20 | 2011-06-28 | Freescale Semiconductor, Inc. | Systems and methods for efficient generation of hash values of varying bit widths |
US8363827B2 (en) * | 2007-12-03 | 2013-01-29 | Intel Corporation | Method and apparatus for generic multi-stage nested hash processing |
-
2008
- 2008-03-31 JP JP2008520653A patent/JP4199304B1/ja not_active Expired - Fee Related
- 2008-03-31 WO PCT/JP2008/056442 patent/WO2009122558A1/ja active Application Filing
- 2008-07-02 US US12/166,330 patent/US20100005299A1/en not_active Abandoned
-
2009
- 2009-03-31 JP JP2009533023A patent/JP4608014B2/ja not_active Expired - Fee Related
- 2009-03-31 CN CN200980110955XA patent/CN102007508A/zh active Pending
- 2009-03-31 WO PCT/JP2009/001505 patent/WO2009122730A1/ja active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002292969A (ja) * | 2001-03-30 | 2002-10-09 | Amano Corp | ラベル発行装置及び日付認識可能なラベル |
JP2003223567A (ja) * | 2002-01-31 | 2003-08-08 | Akiyasu Cho | グリーティングカードを通信ネットワークを経由して配信するための電子カード配信方法及びシステム |
JP2005189986A (ja) * | 2003-12-24 | 2005-07-14 | Gijutsu Transfer Service:Kk | 2次元コードを備えた物品及び該物品を用いた情報提示システム |
JP2007034958A (ja) * | 2005-07-29 | 2007-02-08 | Pilot Corporation | 二次元コードを有する装飾品 |
JP2007058382A (ja) * | 2005-08-23 | 2007-03-08 | Fuji Xerox Co Ltd | 印刷装置、検証装置、検証システム、印刷方法及び検証方法 |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP5238089B1 (ja) * | 2012-08-31 | 2013-07-17 | 株式会社スタジオフェイク | 正規品販売情報管理システム、正規品販売情報管理装置、正規品販売情報管理方法およびコンピュータプログラム |
JP2015022314A (ja) * | 2013-07-16 | 2015-02-02 | 大日本印刷株式会社 | 真贋判定システム、真贋判定方法、ログ管理サーバ、及び、プログラム |
JP2016532169A (ja) * | 2013-09-27 | 2016-10-13 | 家銘 康 | 偽造防止検証システム |
JP2017027588A (ja) * | 2016-06-06 | 2017-02-02 | 株式会社野村総合研究所 | 情報管理システム、基本id管理システムおよび基本id管理方法 |
JP2019036249A (ja) * | 2017-08-21 | 2019-03-07 | メディカルアイ株式会社 | 医療情報管理装置、医療情報管理方法及びプログラム |
JP2019169200A (ja) * | 2019-06-26 | 2019-10-03 | 株式会社日本総合研究所 | 3d認証システム |
Also Published As
Publication number | Publication date |
---|---|
JP4199304B1 (ja) | 2008-12-17 |
JPWO2009122558A1 (ja) | 2011-07-28 |
WO2009122558A1 (ja) | 2009-10-08 |
US20100005299A1 (en) | 2010-01-07 |
JP4608014B2 (ja) | 2011-01-05 |
CN102007508A (zh) | 2011-04-06 |
JPWO2009122730A1 (ja) | 2011-07-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2009122730A1 (ja) | 物品処理方法 | |
US11720907B2 (en) | Blockchain-based product authentication system | |
US8421593B2 (en) | Apparatus, systems and methods for authentication of objects having multiple components | |
US11664991B2 (en) | Tracking apparel items using distributed ledgers | |
US20010047340A1 (en) | Authenticity verification method and apparatus | |
US20160098730A1 (en) | System and Method for Block-Chain Verification of Goods | |
US20050234823A1 (en) | Systems and methods to prevent products from counterfeiting and surplus production also of tracking their way of distribution. | |
US20020095383A1 (en) | Method and apparatus for secure sale of electronic tickets | |
KR100404869B1 (ko) | 상품의 진위여부 확인방법 및 이를 위한 시스템 | |
WO2018107683A1 (zh) | 防止假冒伪劣商品进入流通领域的方法及装置 | |
EP2474948A1 (en) | Tracing and recalling system for managing commodity circulation based on internet | |
CN1947113B (zh) | 验证码 | |
US6030001A (en) | Method for deterring forgeries and authenticating signatures | |
KR20090058473A (ko) | 유통 중인 아이템들의 인증 방법 | |
JP2001222734A (ja) | 商品認定カード及びその認証方法 | |
US20080270306A1 (en) | System and method of theft detection of encoded encrypted software keyed genuine goods | |
TWI419064B (zh) | 商品防偽系統 | |
WO2022101386A1 (en) | Document authenticity assessment | |
CN115668214A (zh) | 用于认证物品的方法 | |
KR20230074875A (ko) | 물품의 소유권 관리 시스템 및 소유권 관리 식별코드 | |
GB2371643A (en) | Authenticity verification method and apparatus | |
WO2023183256A1 (en) | Blockchain-based product authentication system | |
KR20200068331A (ko) | 제품생산과정에서 부여된 생산고유번호의 맵핑추적확인을 통한 정품인증시스템 | |
JP2003137348A (ja) | 真贋判定情報付き製品、真贋判定用印刷方法、真贋判定用印刷装置及び真贋判定装置 | |
WO2023192380A1 (en) | Systems and methods for creating an authenticated nft physical twin and, generating an original nft claim from a physical object |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 200980110955.X Country of ref document: CN |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2009533023 Country of ref document: JP |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 09727443 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 09727443 Country of ref document: EP Kind code of ref document: A1 |