WO2018012672A1 - Système, procédé et programme de détection de contrefaçon fondés sur une clé privée - Google Patents

Système, procédé et programme de détection de contrefaçon fondés sur une clé privée Download PDF

Info

Publication number
WO2018012672A1
WO2018012672A1 PCT/KR2016/011394 KR2016011394W WO2018012672A1 WO 2018012672 A1 WO2018012672 A1 WO 2018012672A1 KR 2016011394 W KR2016011394 W KR 2016011394W WO 2018012672 A1 WO2018012672 A1 WO 2018012672A1
Authority
WO
WIPO (PCT)
Prior art keywords
private key
client
activation
code
key
Prior art date
Application number
PCT/KR2016/011394
Other languages
English (en)
Korean (ko)
Inventor
김종열
조민지
한예원
한갑수
오태현
천사은
Original Assignee
주식회사 비케이소프트
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from KR1020160118070A external-priority patent/KR101839348B1/ko
Application filed by 주식회사 비케이소프트 filed Critical 주식회사 비케이소프트
Publication of WO2018012672A1 publication Critical patent/WO2018012672A1/fr

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials

Definitions

  • the present invention relates to a counterfeit detection system, method and program.
  • the present invention is to provide a counterfeit detection system, method and program for detecting counterfeits when counterfeit distributors distribute counterfeits by establishing the same procedure as the activation process.
  • the present invention is to provide a counterfeit product detection system, method and program for preventing the detection of the generation rule of the genuine product activation code is attached to the counterfeit product genuine certification code.
  • Private key-based counterfeit detection method when receiving a specific activation code confirmation request, the private key issuing step of generating a private key issued by the activation server to the client; Simultaneously or sequentially receiving activation codes for one or more items, matching the activation key with a private key corresponding to the client that sent the activation code; And an article list providing step of generating an article list matching the private key and providing the same to the private key to the client, wherein the private key checks a specific client and an activation code within the activation server. Key data that is given to a particular client to form a matching relationship between the items for which the request was received.
  • the private key issuing step may include: receiving, by the activation server, an activation code obtained from a client; Transmitting, by the activation server, a request for providing a private key to a client; When the client holds a private key, receiving, by the activation server, private key data from the client; Receiving, by the activation server, private key issuing request data from the client when the client does not have a private key; And receiving, when the private key issuing request data, the activation server generates and transmits a new private key to the client that does not overlap with a private key previously assigned to another client.
  • the request for confirming the activation code may be obtained by obtaining an identification mark attached to the article by the client and transmitting the certification code extracted from the identification mark to the activation server.
  • the identification mark may be a QR code provided on the article itself or the article packaging.
  • the activation server receives a suspected counterfeit notification from the client; further comprising the counterfeit suspected report selling the goods It may be to include the store information.
  • the method may further include determining, by the genuine certification server, that the article is genuine, and determining the past purchased article as a counterfeit article when the sale store of the article corresponding to the suspected counterfeit article is a formal store.
  • the article list providing step may include receiving an article list providing request from the client accessing the activation page based on the URL of the activation page without obtaining the activation code from a specific article; Receiving, by the activation server, the private key stored in the client; And extracting the article list matching the private key and providing the extracted article list to the client.
  • the private key issuing step may be characterized in that the activation server is issued based on a Universal Unique Identifier assigned to the client.
  • the activation server when the activation code verification procedure for the different one or more items by a plurality of clients possessed by the user, the activation server to create and provide a member account at the user's request; Receiving, by the activation server, private keys of a plurality of clients connected to the member account; And connecting the activation code matched with each private key to the member account.
  • the activation server generates a random key of a specific digit; Checking whether the random key has already been generated and matched to a particular article; If the random key corresponds to a newly generated key, matching the random key to a new article and assigning the random key to the genuine authentication code; And if the random key corresponds to a key that has already been generated, performing the random key generation again.
  • the private key-based counterfeit discovery program according to another embodiment of the present invention is combined with hardware to execute the aforementioned client key-based counterfeit discovery method, and is stored in a medium.
  • counterfeit distributors can not verify the activation code generation rules, so that counterfeit goods can be prevented from becoming genuine.
  • 1 is a connection diagram in which a client is connected to an activation server and a counterfeit authentication server by different activation codes.
  • FIG. 2 is a connection relationship diagram of a private key-based counterfeit discovery system according to an embodiment of the present invention.
  • FIG. 3 is a flowchart illustrating a method for finding a counterfeit based on a private key according to an embodiment of the present invention.
  • Figure 4 is a flow chart for the private key issuing process of the activation server according to an embodiment of the present invention.
  • FIG. 5 is a flowchart of a method for finding a counterfeit based on a private key, further including a process of performing a suspected counterfeit report according to another embodiment of the present invention.
  • FIG. 6 is a flowchart of a method for discovering a private key based counterfeit, further comprising a merging list of products for a plurality of clients according to an embodiment of the present invention.
  • Figure 7 is a flow chart of a private key based counterfeit discovery method further comprising the step of generating a random key based activation code in accordance with another embodiment of the present invention.
  • an article means each specific article.
  • a product is meant to encompass articles of the same kind. For example, if a pack product of a particular company is a product, each pack produced and distributed may correspond to an item.
  • the 'client' means a device that is included or installed by a specific program and is held by a user who performs arithmetic processing.
  • the 'client' includes all the various devices capable of performing arithmetic processing and providing a result to a user.
  • a computer can be a desktop PC, a notebook, as well as a smartphone, a tablet PC, a cellular phone, a PCS phone (Personal Communication Service phone), synchronous / asynchronous
  • the mobile terminal of the International Mobile Telecommunication-2000 (IMT-2000), a Palm Personal Computer (PC), a Personal Digital Assistant (PDA), and the like may also be applicable.
  • the 'client' performs data communication with the activation server 100 through wireless communication.
  • 'Individual Key' is key data for accumulating items (for example, purchased items) for which activation is performed for each individual.
  • 'Private key' is key data given to a particular client possessed by a user. That is, the 'private key' is key data given to a specific client in order to form a matching relationship between a specific client and a product for which activation is requested in the authentication server.
  • authentication certification code 10 refers to code data that is given to each of the genuine article to verify the authenticity.
  • the 'counterfeiting authentication code 20' refers to a code stored in a forgery authentication server as code data given to a forgery.
  • the 'identification mark' means a mark that is generated based on the genuine certification code 10 or the counterfeit authentication code 20 and attached to an individual article.
  • the 'identification mark' means that it is recognized by the client to provide a genuine authentication code (10) or forgery authentication code (20) to the client.
  • the identification code generated based on the counterfeit authentication code 20 may be manufactured in the same form as the identification mark generated based on the genuine certification code 10 by the counterfeit manufacturer so as not to recognize whether the user is a counterfeit product. .
  • the "authentication authentication server” refers to a server that is connected based on the genuine certification code 10 assigned to the genuine product.
  • the 'forgery authentication server' means a server that is connected based on the forgery authentication code 20 granted to the forgery.
  • the forgery authentication server may be implemented by the counterfeit manufacturer to perform the same process as the activation server operated by the genuine manufacturer.
  • the 'authentication authentication page 400' refers to a page provided to the client as the client accesses the activation server based on the activation code 10 assigned to the genuine product.
  • the 'counterfeiting authentication page 500' refers to a page provided to a client as a user accesses a forgery authentication server based on a forgery authentication code 20 assigned to a forgery.
  • the forgery authentication page 500 may be a page generated similarly to the activation page 400 so that it is difficult for the consumer / buyer to recognize by the counterfeit distributor (for example, a counterfeit manufacturer or a counterfeit product seller).
  • 'random key' refers to key data of a specific digit that is randomly generated without applying a specific generation rule.
  • Counterfeit goods distributors are attached to the counterfeit identification label similar to the genuine and sell, and the client 200 is connected to the counterfeit authentication server 300 when the counterfeit identification mark is obtained, the client 200 is a counterfeit authentication page 500 is provided from the forgery authentication server (300). That is, as shown in FIG. 1, counterfeit goods distributors establish counterfeit authentication server 300 corresponding to the activation server 100, and similarly produce a user who purchased counterfeit goods in correspondence with the activation page 400. Forgery authentication page 500 may be provided when connecting to the forgery authentication server (300).
  • FIG. 2 is a block diagram of a counterfeit detection system according to an embodiment of the present invention.
  • Counterfeit product detection system includes the activation server 100, the client (200).
  • the activation server 100 performs a role of granting a private key to each client. That is, when the activation server 100 receives a request for confirming the activation code 10 from a specific client 200, when a private key is not assigned to the client 200, the activation server 100 newly creates the client 200. Issue a private key. The manner in which the activation server 100 assigns a private key to each client will be described in detail below.
  • the activation server 100 performs a role of providing a list of items requested to confirm the activation code 10 to the client based on a matching relationship between the activation code 10 and the private key.
  • the activation server 100 generates and provides a list of items for which activation is performed through the activation server 100 so as to recognize whether or not the user has purchased a counterfeit. A detailed process for providing a list of items in which the request for confirming the activation code 10 is received will be described in detail below.
  • the activation server 100 serves to receive a suspected counterfeit report from the client (200).
  • the activation server 100 receives a suspicious report sent from the client by the user's request.
  • counterfeit goods can be reported by receiving the shop information purchased at the time of suspected or abnormal report.
  • the activation server 100 serves to generate the activation code (10).
  • the activation code 10 is a data value assigned to each article.
  • the activation server 100 may generate and assign a different activation code (10) to each item when N items corresponding to a specific product of a particular brand (that is, company) is released. have.
  • the activation code 10 assigned to each article may be made of a specific identification mark and attached to each article itself or to a package.
  • the identification mark may be generated by a barcode, a QR code, or the like, and may be attached to the surface of the article (for example, the packaging surface of the cosmetic pack) or to be included with the article during the transaction (for example, a quality warranty). .
  • the client 200 is a user terminal device that requests genuine certification (that is, request for confirmation of the genuine certification code 10) upon first obtaining an identification mark corresponding to the genuine certification code 10 provided in a specific article. That is, the client 200 is a terminal device for requesting the authenticating server 100 to check whether the authenticity is genuine by acquiring an identification mark attached to a specific article (for example, photographing the identification mark through a camera). The client 200 may extract the activation code 10 included in the identification mark and transmit it to the activation server 100.
  • the client 200 when the client 200 has already received and stored the private key, the client 200 transmits the private key to the activation server 100 at the request of the activation server 100. That is, when a private key has already been generated and issued, the client 200 does not need to separately generate and issue a private key for distinguishing the client 200. Therefore, the client 200 transmits an activation code transmitted to the activation server 100. The private key information to match the 10 is transmitted to the activation server 100.
  • the client 200 serves to display a list of items received from the activation server 100.
  • the client 200 receives a list of items based on the activation code 10 matched to the private key. To display on the activation page (400).
  • FIG. 3 is a flowchart illustrating a method for finding a counterfeit based on a private key according to an embodiment of the present invention.
  • the activation server 100 upon receiving a specific activation code 10 confirmation request, the activation server 100 generates and issues a private key.
  • S500 Performing matching of the activation code 10 for a specific item for each private key
  • S700 generating an article list matching the private key and providing the list to the client 200 corresponding to the private key
  • the activation server 100 Upon receiving a specific activation code 10 confirmation request, the activation server 100 generates and issues a private key for identifying an individual (S500). As the first user acquires the identification mark attached to the goods purchased using the client 200, the client 200 extracts the activation code 10 from the identification mark.
  • the client may acquire the identification mark by photographing the identification mark with a camera by a first user's operation, and the activation code 10 in the identification mark. Extract
  • the identification mark is an NFC tag provided on an article or a package of the article
  • the client may include an activation code 10 included in the identification mark as tagged by the first user on the identification mark provided on the article. Can be obtained.
  • the client 200 transmits the activation code 10 to the activation server 100 through wired or wireless communication. That is, the request for confirming the activation code 10 corresponds to receiving the activation code 10 obtained by the client 200 from the activation server 100 and requesting a determination of whether the product is genuine.
  • the activation server 100 when receiving a request for confirming the activation code 10 from a specific client 200 for the first time, the activation server 100 generates a private key in the process of confirming whether or not genuine based on the activation code 10.
  • the private key is key data that is received in the process of activation and stored in the client device 200.
  • the activation server 100 checks whether the private key is stored in the client and generates a new private key. Grant.
  • the private key corresponds to a code given to each terminal owned by the user. If you do not perform a separate membership, the activation server 100 can not distinguish the user of the client (200). Therefore, the activation server 100 grants different private keys according to identification data (for example, Universal Unique Identifiers (UUID) differently assigned to each mobile terminal) individually assigned to the client 200. do.
  • identification data for example, Universal Unique Identifiers (UUID) differently assigned to each mobile terminal
  • the private key determines a user based on another linked account logged in to the client 200, and assigns a private key corresponding to the user. For example, if the first terminal and the second terminal owned by the first user are connected to the same account (for example, a Google account for an Android terminal or an Apple account for an Apple terminal), the activation server 100 determines that the same private key should be provided to the first terminal and the second terminal. Accordingly, the activation server 100 matches user account information (for example, an account mail address) with a private key, and includes a terminal including account information previously identified through another terminal (ie, the first terminal). In other words, if the second terminal), the activation server 100 transmits the same private key that was assigned to the first terminal to the second terminal. On the other hand, in the case of user account information that is not registered at all, the activation server 100 may generate a new private key and transmit it to the client 200.
  • user account information for example, an account mail address
  • the activation server 100 receives the activation code 10 obtained from the client 200 (S510). Thereafter, the activation server 100 transmits a request for providing a private key to the client 200 (S520). When the client 200 holds the private key, the activation server 100 receives the private key data from the client 200, and when the client 200 does not hold the private key (that is, newly activated When the client 200 has requested the code 10 confirmation, the activation server 100 issues private data without private key (that is, data not stored in the private key) or private key from the client 200. Receive the request data (S530). Upon receiving the private key non-private data or the private key issuing request data, the activation server 100 generates and transmits a new private key to the client 200 that does not overlap with the private key previously assigned to the other client 200. (S540).
  • the client 200 receives the private key from the activation server 100 and stores the private key in a specific storage space therein. Through this, since the private key is stored in the user client, the user can use the same private key until the client device 200 is replaced or initialized (for example, a factory reset to delete all data and return to the initial state).
  • the activation server 100 does not generate and transmit a new private key.
  • the client device 200 may transmit a private key stored in the client device 200 (ie, the user terminal).
  • the activation server 100 performs matching of the activation code 10 for the article for each private key (S600). As the activation server 100 matches the activation code 10 for each specific private key, the product matching the activation code 10 is matched with the private key.
  • the activation server 100 issues a new private key to the client 200 (that is, the client 200 that has never transmitted the activation code 10 confirmation request to the activation server 100).
  • the activation server 100 stores the newly generated private key to the client 200 and stores it therein, and stores the activation code 10 received at the time of the activation code 10 confirmation request with the private key. Perform a match.
  • the activation server 100 receives the private key stored therein from the client 200, and searches for the corresponding private key in the activation server 100 to activate the product.
  • the code 10 is matched with the activation code 10 received upon confirmation request.
  • the activation server 100 is one or more activation code (10) to a specific private key in the same activation server 100 as the private key stored in the client (200) ) (That is, connect).
  • the activation server 100 generates a list of items matching the private key and provides them to the user client 200 corresponding to the private key (S700).
  • the activation server 100 when receiving a request for confirming the activation code 10 for a new item from the client 200, the activation server 100 generates and provides the item list to the client 200.
  • the user can check whether there is no difference from the purchase list recognized by the user as he is provided with a list of items purchased so far (specifically, a list of individual items according to the activation code 10). .
  • the activation server 100 provides a list of items to the client 200 when a request for confirmation of the activation code 10 for a new article. If all items purchased by the user are accumulated and a list of newly added items for which the activation code (10) is requested is provided, the user newly performs the activation code (10) confirmation request (that is, , , The article that performs the identification mark recognition attached to the article is determined to be the article connected to the same activation server 100 as the existing article (e.g., a genuine article under the premise that the article that performed the original activation request is genuine) can do.
  • the user is a product that is requested to check the activation code (10) this time the article connected to the activation server 100 and other servers (that is, forgery authentication server 300) connected to the existing purchases (for example, it can be recognized that the article that has performed the original activation request is a counterfeit) Therefore, when the list of items actually purchased and the list of items provided on the authentication page (that is, the activation page 400 or the counterfeit authentication page 500) do not match, the items that have been activated at this time (that is, the new items) Or one or more items that have been previously activated may be counterfeit.
  • the user may examine the authentication page in detail in order to confirm whether the authentication page is a genuine authentication page 400. For example, if the number of items for which the activation is performed does not match, the user may check the domain address of the authentication page in detail to check whether the domain address of the activation page 400 is different from the domain address.
  • the user's suspicion is based on a list of items that do not match the number of items purchased, the user can repurchase the goods at a store that has been purchased and perform the activation again. Through this, the user can go through the process of directly checking the counterfeit.
  • the activation server 100 when the request for confirmation of the activation code 10 for a new article or an existing confirmation article, receives a request for providing an article list from the client 200 to the client 200. Provide a list of items. For example, when the client 200 accesses the activation page 400 (eg, accesses an activation webpage through URL input) according to a user's request, the activation server 100 activates. The private key stored in the client 200 accessing the page 400 is received, and an article list matching the private key is extracted and provided to the client 200. Since the URL address corresponding to the website is a value that is uniquely matched to a specific website, it is difficult to bypass the counterfeit authentication server 300 instead of the activation server 100 when directly accessing the URL. Therefore, through this, the user can immediately check the genuine list purchased so far.
  • the client 200 accesses the activation page 400 (eg, accesses an activation webpage through URL input) according to a user's request
  • the activation server 100 activates.
  • the private key-based counterfeit detection method if the actual number and the number on the item list is different, receiving a suspicious request (S800); further includes; do. That is, when it is determined by the user that the number on the item list and the actual number of purchased items are different, the activation server 100 receives a suspicious request from the client 200. The user recognizes that he / she purchases a corresponding product (for example, a pack of a specific cosmetic company) for the third time, and the list may be presented as the first purchase on the item list provided from the activation server 100. In this case, the user may perform a suspicion report based on a difference from the number of purchases recognized by the user.
  • a suspicious request S800
  • the list is displayed on the counterfeit authentication page 500, and when the user has taken the genuine product, the list is displayed on the genuine home page, so that the user can check the number of products purchased by the user. It may be recognized that it is not correct, and the abnormal report can be performed accordingly.
  • the activation server 100 obtains the counterfeit information.
  • the activation server 100 receives store information for selling goods determined as counterfeits through the client 200 from the user, and obtains a list of counterfeit distribution stores. That is, the activation server 100 receives the store information that previously purchased the counterfeit goods when performing a report on the activation page 400 from the user to identify the counterfeit stores.
  • the activation server 100 receives the store information purchased in the susceptible report or abnormal report data, and determines whether the current suspected article is a counterfeit through the store information.
  • the activation server 100 guides that the currently purchased item corresponds to the genuine product and the previously purchased item was a counterfeit product.
  • the activation server 100 may provide the user with the official authentication page confirmation criteria data. That is, the activation server 100 provides the user with a verification standard that can only have the activation page 400, and in the situation where it is suspected that the counterfeit goods were purchased, the current authentication page is an activation page ( 400) can be determined. For example, an identification mark for recognizing that the product is an activation page 400 may use a URL or a domain address that may not have the same value.
  • the activation server 100 may generate a member account to perform a process of integrating the purchase details using the plurality of clients. That is, when a user activates a plurality of different items with a plurality of clients, a different private key is given to each terminal and the purchase history for each private key is stored, so that all the purchase histories are purchased at once. Can not confirm. Therefore, the activation server 100 allows the user to register, and when logging in from each terminal with the registered account, the private key is received from each terminal and the data matched with the corresponding private key is logged into the account of the logged in user.
  • Can connect In one embodiment for integrating the activation history of a plurality of clients, as shown in Figure 6, when the activation code 10 confirmation procedure for one or more different items by a plurality of clients 200, the user has,
  • the activation server 100 generating and providing a member account according to a user's request (S900); Receiving, by the activation server 100, private keys of a plurality of clients connected to the member account (S1000); And connecting the activation code 10 matched to each private key to the member account (S1100).
  • users can integrate and manage the details of activation to a plurality of clients (for example, smartphones, tablet PCs, etc.), and the historical data purchased prior to registration through each client's private key can also be managed. Can accumulate in user accounts.
  • the activation service provider may induce users to join based on integrated management of the activation history through multiple clients.
  • the method further includes extracting advertisement data based on a list of items purchased and activated by a specific user based on the private key and providing the same to the client.
  • a list of items corresponding to the user or each client is stored in the activation server 100. If a private key is assigned to each client possessed by the user, an article list may be generated for each private key (that is, for each client corresponding to each private key).
  • a list of items on which activation is performed by one or more clients may be integrated to generate a list of items of a specific user.
  • the activation server 100 may extract advertisement information suitable for a user based on a list of items for each user or for each client.
  • the activation server 100 matches the advertisement information to the activation code 10 or the product, based on the product included in the product list for each individual key or user account Extract advertising information.
  • the activation server 100 displays and provides advertisement information on the user client 200.
  • the activation server 100 provides the product information (for example, product introduction) on the product list provided to the client 200, including. Through this, the user can check the product information on the product on which the activation has been performed (that is, the product including the product on which the activation has been performed).
  • the activation server 100 may display a separate button for checking product information on the user interface provided to the client.
  • the activation server 100 when the client 200 is a device having a touch screen, the activation server 100 generates a user interface so that the product information is provided as a pop-up to the client 200 when the user continues the touch operation for a specific time or more. Can provide.
  • the counterfeit detection method further includes the step of generating a genuine activation code 10 with a random key.
  • Codes that are assigned to existing items are generally generated based on specific generation rules. Therefore, if the counterfeit manufacturer grasps the rule of generating the corresponding code, it is possible to generate the same code as the genuine article on the counterfeit or to generate the following code according to the rule of creation, and generate the code to which the same rule is applied as the genuine (or genuine) product. Attached counterfeit goods can be distributed in the market.
  • the activation server 100 generates a random key of a specific digit (S100); Checking whether the random key has already been generated and matched to a specific article (S200); If the random key corresponds to a newly generated key, matching the random key to a new article and assigning the random key to a genuine authentication code (S300); And if the random key corresponds to a key that has already been generated, re-generating the random key (S400).
  • the activation server 100 generates a random key of a specific digit (S100).
  • the random key may have a specific number of digits, and various methods may be applied to the random key generation method. For example, when the rantum key has N digits, a random generation program is applied to each digit so that the number of each digit can be individually applied to each random key generation time. When a number of specific digits themselves are generated based on one random generation program, a specific generation rule by logic of the random generation program may be found, so that a different random generation program may be applied to each digit.
  • the activation server 100 checks whether the random key has already been generated and matched to a specific article (S200). That is, when the same random key is assigned to a plurality of items, since the genuine article may be determined as a counterfeit, the activation server 100 generates a random key without a specific generation rule, and thus is already generated and assigned to a specific article. You need to determine whether it corresponds to your code.
  • the random key is matched with the random key to a new article and given to the activation code 10 (S300).
  • the granted activation code 10 may be implemented in the form of various identification marks that can be provided to the user.
  • the random key determined by the activation code 10 corresponding to a specific item is generated by a barcode, a QR code, etc., provided together with the surface of the article (for example, the packaging surface of the cosmetic pack) or the product transaction. (Eg, quality assurance certificate), or the like.
  • the activation server 100 corresponds to a key for which the random key has already been generated, the random key generation is performed again (S400). That is, the activation server 100 may iterate to generate a random key that does not overlap with the already generated activation code 10.
  • the activation server 100 may perform an activation process by receiving a specific identification mark or data corresponding to the identification mark (for example, numeric data of a specific digit generated by QR) from a user client (ie, a terminal). have. That is, the activation server 100 may store and match the activation code 10 and a specific item, and when receiving a specific identification mark or the corresponding data from the client, the activation code stored in the activation server 100 (10) can be confirmed. The activation server 100 may generate a value assigned to the activation code 10 to inform the user client of the genuine product. If the value is not stored, the activation server 100 may determine the counterfeit product to guide the user client.
  • a specific identification mark or data corresponding to the identification mark for example, numeric data of a specific digit generated by QR
  • the identification mark provided on the article may include a code corresponding to the product information and the activation code 10 assigned to the article. Accordingly, when receiving the data on the identification mark from the user client, the activation server 100 may extract a code (ie, product information code) and the activation code 10 corresponding to the product information. Thereafter, the activation server 100 is a product information code and the product identification code extracted from the identification mark 10 and the product information of the specific product matched with the activation code 10 stored in the activation server 100 and It can be determined whether they match. Through this, the activation server 100 may find a case that corresponds to a code generated by the activation code 10 but does not correspond to a matching relationship with a product or a product, and thus is likely to be a counterfeit.
  • a code ie, product information code
  • the activation server 100 may generate a separate activation code 10 for each company or product. Through this, it may be included with the company identification code or product information code in the identification mark.
  • the activation server 100 may determine the disposal cycle of the specific activation code 10, based on the expiration date, life cycle, etc. of the specific product. That is, when the expiration date has passed or the general life cycle has elapsed, there may be a product that is disposed of without using the article.
  • the activation code 10 for such an article may be disposed of after a corresponding period of time and treated as a code that can be newly assigned to another article.
  • the above-described method for detecting a counterfeit based on a private key may be implemented as a program (or an application) and stored in a medium for execution in combination with a computer which is hardware.
  • the processor of the computer (CPU) is connected through the device interface of the computer.
  • It may include code coded in computer languages such as C, C ++, JAVA, and machine language that can be read.
  • code may include functional code associated with a function or the like that defines the necessary functions for executing the methods, and includes control procedures related to execution procedures necessary for the computer's processor to execute the functions according to a predetermined procedure. can do.
  • the code may further include memory reference code for additional information or media required for the computer's processor to execute the functions at which location (address address) of the computer's internal or external memory should be referenced.
  • the code may be used to communicate with any other computer or server remotely using the communication module of the computer. It may further include a communication related code for whether to communicate, what information or media should be transmitted and received during communication.
  • the stored medium is not a medium for storing data for a short time such as a register, a cache, a memory, but semi-permanently, and means a medium that can be read by the device.
  • examples of the storage medium include, but are not limited to, a ROM, a RAM, a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like. That is, the program may be stored in various recording media on various servers to which the computer can access or various recording media on the computer of the user. The media may also be distributed over network coupled computer systems so that the computer readable code is stored in a distributed fashion.

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Economics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Development Economics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Quality & Reliability (AREA)
  • Operations Research (AREA)
  • Tourism & Hospitality (AREA)
  • Human Resources & Organizations (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

La présente invention concerne un système, un procédé et un programme de détection de falsification fondés sur une clé privée. Le procédé de détection de falsification fondé sur une clé privée selon un autre mode de réalisation de la présente invention comprend : la création et l'émission, par un serveur de certification d'authenticité, d'une clé privée après la réception d'une demande de confirmation d'un code de certification d'authenticité spécifique (S500) ; la mise en correspondance de codes de certification d'authenticité pour un produit spécifique par des clés privées (S600) ; et la création d'une liste de produits mis en correspondance avec des clés privées et la fourniture de la liste à un client correspondant aux clés privées (S700). L'invention permet à des acheteurs de se rendre compte qu'ils ont acheté des contrefaçons, en établissant également la même procédure qu'une procédure de certification d'authenticité séparément pour des contrefaçons, ce qui permet d'identifier les vendeurs des contrefaçons et d'éradiquer les transactions de contrefaçon.
PCT/KR2016/011394 2016-07-13 2016-10-12 Système, procédé et programme de détection de contrefaçon fondés sur une clé privée WO2018012672A1 (fr)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
KR10-2016-0088809 2016-07-13
KR20160088809 2016-07-13
KR1020160118070A KR101839348B1 (ko) 2016-07-13 2016-09-13 개인키 기반의 위조품 발견시스템, 방법 및 프로그램
KR10-2016-0118070 2016-09-13

Publications (1)

Publication Number Publication Date
WO2018012672A1 true WO2018012672A1 (fr) 2018-01-18

Family

ID=60953245

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/KR2016/011394 WO2018012672A1 (fr) 2016-07-13 2016-10-12 Système, procédé et programme de détection de contrefaçon fondés sur une clé privée

Country Status (1)

Country Link
WO (1) WO2018012672A1 (fr)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101214839B1 (ko) * 2012-03-21 2012-12-24 (주)더블유랩 인증 방법 및 그 시스템
KR20130002147A (ko) * 2011-06-28 2013-01-07 에스씨에스프로 주식회사 Nfc 태그를 이용한 진품 판별 방법 및 장치
KR101351352B1 (ko) * 2013-02-28 2014-01-15 서영호 위품방지를 위한 판매관리 서비스 방법 및 그 시스템
KR20140016121A (ko) * 2012-07-17 2014-02-07 석인수 큐알코드를 이용한 정품인증시스템과 방법 및 그를 실행하기 위한 프로그램이 기록되는 컴퓨터로 읽을 수 있는 기록매체
KR20160038451A (ko) * 2014-09-30 2016-04-07 양영철 물품의 진위 인증용 코드를 포함하는 라벨의 제조방법, 그로부터 제조되는 라벨, 상기 라벨을 포함하는 물품 및 상기 라벨의 관리방법

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20130002147A (ko) * 2011-06-28 2013-01-07 에스씨에스프로 주식회사 Nfc 태그를 이용한 진품 판별 방법 및 장치
KR101214839B1 (ko) * 2012-03-21 2012-12-24 (주)더블유랩 인증 방법 및 그 시스템
KR20140016121A (ko) * 2012-07-17 2014-02-07 석인수 큐알코드를 이용한 정품인증시스템과 방법 및 그를 실행하기 위한 프로그램이 기록되는 컴퓨터로 읽을 수 있는 기록매체
KR101351352B1 (ko) * 2013-02-28 2014-01-15 서영호 위품방지를 위한 판매관리 서비스 방법 및 그 시스템
KR20160038451A (ko) * 2014-09-30 2016-04-07 양영철 물품의 진위 인증용 코드를 포함하는 라벨의 제조방법, 그로부터 제조되는 라벨, 상기 라벨을 포함하는 물품 및 상기 라벨의 관리방법

Similar Documents

Publication Publication Date Title
WO2019164170A1 (fr) Plate-forme de distribution de produits et de consultation et de gestion d'historique de distribution utilisant une chaîne de blocs
WO2011062364A2 (fr) Système et appareil d'authentification d'utilisateur, carte intelligente et procédé d'authentification d'utilisateur pour une gestion d'authentification universelle
WO2018048051A1 (fr) Procédé et système d'authentification de paiement utilisant un générateur de nombres aléatoires quantiques
WO2013137528A1 (fr) Système de règlement de transaction hors-ligne, et procédé et dispositif à cet effet
WO2011062365A2 (fr) Système et procédé pour authentifier de l'argent électronique à l'aide d'une carte intelligente et d'un terminal de communication
WO2021172803A1 (fr) Procédé d'intermédiation de vente et d'achat utilisant un stand en libre-service
CN108153858A (zh) 信息推送方法、装置、存储介质和计算机设备
WO2017065518A1 (fr) Carte représentative liée à une carte d'application, et système de paiement et procédé de paiement associés
KR101839348B1 (ko) 개인키 기반의 위조품 발견시스템, 방법 및 프로그램
CN105096134A (zh) 用于验证数字实体及聚合对象来源的安全方案的系统及方法
WO2012053780A1 (fr) Procédé de paiement et système de paiement utilisant des informations concernant l'adresse mac d'un terminal de client
CN105656871B (zh) 安全通信方法及装置
WO2013157690A1 (fr) Système de gestion de reçus électroniques à l'aide d'un terminal utilisateur, et procédé correspondant
KR20180030001A (ko) 개인키 기반의 위조품 발견시스템, 방법 및 프로그램
KR20190037489A (ko) 정품인증코드를 이용한 물품거래 이력 관리방법 및 프로그램
US20080005557A1 (en) Method of authentication and ownership verification of collectibles
WO2015069028A1 (fr) Authentification multicanal, procédé de transfert financier et système utilisant un terminal de communication mobile
WO2017131247A1 (fr) Système de portail internet et son procédé d'utilisation
WO2019013462A1 (fr) Appareil de traitement d'agence de paiement doté d'une entrée automatique d'informations personnelles sur la base d'un code bidimensionnel et son procédé de fonctionnement
WO2020060125A2 (fr) Système et procédé de gestion d'informations personnelles basés sur un code d'identification financière
KR101699032B1 (ko) 전자 태그를 이용한 결제 서비스 제공 시스템 및 방법
WO2012115407A2 (fr) Système et procédé pour certifier des articles authentiques au moyen d'un marqueur
WO2018012672A1 (fr) Système, procédé et programme de détection de contrefaçon fondés sur une clé privée
CN110599211A (zh) 一种票务信息处理方法、装置及计算机设备
RU2322692C1 (ru) Способ идентификации и учета движения маркированных объектов и информационная система для его осуществления

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16908936

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 06.05.2019)

122 Ep: pct application non-entry in european phase

Ref document number: 16908936

Country of ref document: EP

Kind code of ref document: A1