WO2021261846A1 - 거래내역을 이용한 인증관리컴퓨터, 인증시스템 및 인증방법 - Google Patents
거래내역을 이용한 인증관리컴퓨터, 인증시스템 및 인증방법 Download PDFInfo
- Publication number
- WO2021261846A1 WO2021261846A1 PCT/KR2021/007671 KR2021007671W WO2021261846A1 WO 2021261846 A1 WO2021261846 A1 WO 2021261846A1 KR 2021007671 W KR2021007671 W KR 2021007671W WO 2021261846 A1 WO2021261846 A1 WO 2021261846A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- user
- authentication
- transaction
- information
- identity
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3821—Electronic credentials
- G06Q20/38215—Use of certificates or encrypted proofs of transaction rights
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4016—Transaction verification involving fraud or risk level assessment in transaction processing
Definitions
- the present invention relates to an authentication management computer, an authentication system, and an authentication method for performing identity authentication of a user by securing a user's identity confirmation based on the user's transaction details such as financial transactions. More specifically, when a user needs to authenticate users in various online services such as online financial services, e-commerce, online certificate issuance, and online electronic contracts, repeated ID/PW input for authentication, public certificate authentication, mobile phone authentication and OTP It eliminates inconveniences such as the use of specific devices such as the use of specific devices and presentation of identification cards, etc., and gradually secures the reliability of the authentication to prevent user authentication for illegal methods and purposes based on the reliability, and allows users to conveniently and quickly In order to be able to authenticate, when a user conducts an online financial transaction or e-commerce transaction, the transaction can be repeated by verifying the identity of the user through pattern analysis based on the transaction details and records with the transaction partner, who is the counterparty of the trust relationship.
- the invention of a method and apparatus for authenticating an unauthenticated user in a social network service of Republic of Korea Patent No. 10-1388251 (registration date: April 16, 2014) is disclosed.
- the patented invention includes the steps of: receiving an access request message including identification information of an unauthenticated user and a friend list of the unauthenticated user in the social network service from a terminal device of the unauthenticated user; searching for a friend identical to the friend of the user in the social network service in the friend list of the unauthenticated user; transmitting an authentication request message including identification information of the unauthenticated user to the terminal device of the same friend; receiving an authentication confirmation message as a response to the authentication request message from the terminal device of the same friend; and authenticating the unauthenticated user in response to receiving the authentication confirmation message.
- the patented invention secures the user's friend list and access request message from an unauthenticated user in user authentication, finds the same friend as the user's friend in the social network service in the secured friend list, and requests authentication of the user. It is a configuration that authenticates the user.
- the patented invention relies on the user's authentication on the friend list obtained from the user and the friend found on the social network service, it is checked whether the friend found on the social network service is a person in a position (trust relationship) to authenticate the user. There is no way to do this, so it is impossible to prevent a case where a friend who lacks a trust relationship authenticates the user for another purpose, and there is a problem that an error in reliable user authentication may occur.
- User's identity confirmation information provided by the counterparty in the user's online financial transaction or e-commerce process, which simplifies and accelerates the process of user authentication by accumulating reliability of identity so that transactions can be repeated by authenticating the user's identity
- An invention that secures and performs user authentication based on this is desired.
- the present invention is to solve the problems of the prior art, and an object of the present invention is to establish a transaction created with user identity confirmation information of the counterparty on the premise that a sufficient trust relationship with the counterparty is established in an online financial transaction or e-commerce transaction. It is to provide an authentication management computer, an authentication system, and an authentication method using transaction details for performing user authentication through pattern analysis such as details and records.
- Another object of the present invention is to manage authentication using transaction details so that the reliability of user identity is increased so that user identity authentication can be repeated through pattern analysis of the transaction details and records of the user, thereby simplifying the user authentication procedure.
- Another object of the present invention is to request user authentication by presenting online financial transaction details and e-commerce details information including personal information of the user's name and mobile phone number and counterparty information to the authentication management computer, and authentication
- the management computer collects the user's identity confirmation information from the counterparties of the user who requested the authentication, and transmits the transaction history analysis data including this to the data analysis computer, and the data analysis computer analyzes the transaction history analysis data and various
- Another object of the present invention is that, whenever a user requests for authentication, the data analysis computer analyzes and retains identity attribute data with increased reliability extracted from the identity confirmation information and transaction details of counterparties for the above purpose, and the history of financial transactions and e-commerce transactions held by the data analysis computer.
- Another object of the present invention is to distribute and store the transaction details, purchase details, and identity authentication information of the online financial transaction and e-commerce transaction in the information storage means of the user, the counterparty and the system to share the ledger of the transaction and authentication information. , to provide an authentication management computer, authentication system and authentication method using transaction details that can reduce errors in user identity authentication.
- an authentication management computer that performs identity authentication using a user's transaction history, wherein the authentication management computer is stored using hardware resources Controls the execution of the program, but receives the user's authentication request data, receives the user's identity confirmation information provided by the user's counterparty, analyzes the user's transaction pattern information with the counterparty, and analyzes the user
- An authentication management computer and an authentication method using the same are presented, characterized in that the user's identity is authenticated based on the consistency between the transaction pattern information of the user and the transaction pattern information possessed by the user.
- the user's user information, the user's online financial transaction information, and the user's authentication request information including e-commerce information are received and managed, and the transaction counterpart information included in the authentication request information is used.
- identity confirmation of a user who is a trader accumulative storage of user identity confirmation information provided from the counterparty, extracting identity confirmation information of the counterparty and transaction-related identity attribute data extracted from transaction details to request identity authentication, an authentication management computer that receives the identity confirmation information and performs and manages user authentication based on the same;
- a transaction party data storage unit that stores and manages user information that is a trader and counterparty information, a Kumwoong transaction data storage unit that stores and manages online financial transaction information of a user provided by a user requesting user authentication, and user authentication a transaction-related data storage computer including an e-commerce data storage unit for storing and managing the user's e-commerce information provided by the requesting user;
- the authentication management computer receiving the user information and at least one password including the user's name and phone number information from the transaction terminal of the authentication requester who wants to receive user authentication, and storing it as a member; ; A user including the user's name, mobile phone number, and password, the user's online financial transaction information and e-commerce information, and consent to use or access information on financial transactions and e-commerce counterparties, transmitted from the authentication management computer from the transaction terminal receiving authentication approval request data; transmitting, by the authentication management computer, user identity authentication request information including the name and phone number information of the authentication requester included in the user authentication approval request data, to the user's financial transaction counterpart terminal or e-commerce counterpart terminal; storing, by the authentication management computer, user identity confirmation information provided from the financial transaction counterpart terminal or the electronic transaction counterpart terminal; The authentication management computer extracts user identity authentication-related attribute data from the identity confirmation information, user information, and transaction history information of financial transactions and e-commerce provided by the user and transmits it to a data analysis computer
- the user authentication approval request data provided by the user further includes information on the delivery person of the product transacted in the electronic commerce
- the authentication management computer The user identity confirmation data provided by the authentication management computer further includes the user identity confirmation data provided by the deliverer in response to the user's identity confirmation request including user information and transaction details based on the deliverer information.
- the user's identity authentication information stored and managed by the authentication management computer is linked with a reliability level granted according to the quantity and quality of each identity authentication information
- An authentication method using transaction details is provided, wherein the reliability level is updated according to the accumulated data amount of the user's identity confirmation data provided by the financial transaction counterparty or the e-commerce counterparty.
- the data analysis computer comprising the steps of analyzing and managing various financial transaction types including the financial transaction details and e-commerce details of the user who is the authentication requester, and various e-commerce transaction types; managing, by the authentication management computer, the number of financial transaction counterparties or e-commerce counterparties of the user to whom the user's identity confirmation data is to be provided, based on a set standard; generating and managing statistics by analyzing, by the authentication management computer, a pattern in the transaction details between the user and the counterparty according to the analysis of the transaction details of the financial transaction or the electronic transaction and the set criteria; calculating and managing average data of all users or members of each transaction history item by using the statistics calculated through the pattern analysis; An authentication method using transaction details is provided, including the step of deriving identity authentication information by comparing and analyzing similarities and differences with the average data for the user's authentication requests to determine whether they are identical.
- the reliability of authentication is gradually secured, and based on the reliability, an illegal method and
- a pattern based on transaction details and records with the transaction partner, the counterparty of whom a trust relationship is established when a user conducts an online financial transaction or e-commerce transaction By verifying the identity of the user through analysis, the reliability of the identity is accumulated so that the transaction can be repeated, and there is an effect that the procedure of user authentication is gradually simplified and expedited,
- the user authentication procedure is simplified by confirming only the user's personal information and by using the identity authentication information of the user built on the basis of the stored financial transaction or e-commerce history to approve the user authentication. and has a convenient effect.
- FIG. 1 is a schematic configuration diagram of an embodiment of an authentication system using transaction details of the present invention.
- FIG. 2 is a schematic configuration diagram of an embodiment of the authentication management computer, which is the main part of the authentication system using the transaction details of the present invention.
- FIG. 3 is a schematic configuration diagram of an embodiment of the authentication request information management module, which is the main part of the authentication system using the transaction details of the present invention.
- FIG. 4 is a schematic configuration diagram of an embodiment of a financial transaction information management module, which is a main part of an authentication system using transaction details of the present invention.
- FIG. 5 is a schematic configuration diagram of an embodiment of an e-commerce information management module, which is a main part of an authentication system using transaction details of the present invention.
- FIG. 6 is a schematic configuration diagram of an embodiment of a user identity confirmation information management module, which is a main part of an authentication system using transaction details of the present invention.
- FIG. 7 is a schematic configuration diagram of an embodiment of the transaction information big data management module, which is the main part of the authentication system using the transaction details of the present invention.
- FIG. 8 is a schematic configuration diagram of an embodiment of the identity authentication information management module, which is the main part of the authentication system using the transaction details of the present invention.
- FIG. 9 is a schematic configuration diagram of an embodiment of a data analysis computer, which is a main part of an authentication system using transaction details of the present invention.
- FIG. 10 is a schematic configuration diagram of an embodiment of the identity authentication information generation management module, which is a main part of the data analysis computer of the present invention.
- 11 is a flowchart for explaining an embodiment of an authentication method using transaction details of the present invention.
- FIG. 12 is a flowchart for explaining another embodiment of the authentication method using the transaction details of the present invention.
- the reliability of authentication is gradually secured and illegal methods and purposes based on the reliability Analyze patterns based on transaction details and records with related parties, who have established trust relationships when users conduct online financial transactions or e-commerce transactions in order to prevent user authentication with User identity provided by the counterparty in the user's online financial transaction or e-commerce process, where reliability of identity is accumulated so that transactions can be repeated, and the user authentication procedure is gradually simplified and expedited
- An authentication management computer, an authentication system, and an authentication method for securing confirmation information and performing user authentication based on this are presented.
- Various computers and terminals used in the present invention may consist of hardware itself, or a computer program or web program that utilizes the hardware resources.
- the authentication management computer of the present invention may consist of each component of hardware included in the authentication management computer, and may consist of a computer program or web program executed by utilizing the hardware resources of the authentication management computer.
- the terms ' ⁇ computer' and ' ⁇ terminal' used in the embodiments of the present invention sometimes refer to the configuration of the hardware itself, or to the configuration of a web program or computer program executed on the hardware.
- ' ⁇ part', ' ⁇ module', and ' ⁇ means' used in the embodiments of the present invention may be used interchangeably with terms having the same meaning. That is, it is preferable to view that the term used in the embodiment of the present invention has a meaning in the function and action of the term rather than a meaning.
- the 'user' used in the embodiment of the present invention may be replaced with 'trader' or 'the person'.
- 'data analysis computer' used in the embodiments of the present invention does not have a meaning in the name, but has a meaning in the function performed by the computer, and is not limited to the term. .
- [name + phone number] is set as a prerequisite for user authentication.
- there will be deposit and withdrawal details between the online deposit and withdrawal parties and if there is an abnormality after the deposit and withdrawal transaction, for example, in the case of an abnormal transaction such as voice phishing, the transaction will soon be recognized as wrong, and there will be no further transactions. will be.
- an abnormal transaction such as voice phishing
- the transaction will soon be recognized as wrong, and there will be no further transactions. will be.
- trust in the other party can be formed.
- there is only a transaction record with a small number of parties there is a possibility of wrong user authentication or abuse due to a plot or a mockery between the small number of parties. As the number increases, the likelihood of abuse and misuse decreases, and reliability increases. In this way, multiple counterparties can verify the identity of a specific user based on a financial transaction with a specific user (name and phone number).
- the seller sends the product.
- the consumer provides basic information in the form of [Name Hong Gil-dong, phone number 1234-5678] to the seller, and the goods are delivered via courier. Once the seller receives the payment without any problems and the delivery of the goods to the consumer is completed, the seller can express his/her intention to confirm the identity of the user. The greater the number of sellers, the higher the possibility of verifying identity.
- the consumer is configured to provide financial transaction information and product transaction information details to the system of the present invention when subscribing to the system of the present invention.
- the information provided by the user may include the time of the transaction, the counterparty, the amount, the transaction cycle, the type or type of product, the payment method, the address for receiving the product, and the like.
- the supply history by analyzing the supply history, it is possible to analyze whether there is a certain pattern in the past transaction history, the history of recent months, the transaction history by season, etc. have.
- the pattern may be the same or similar to one's past transaction history, and when big data is formed by analyzing the patterns of several consumers, it is possible to categorize items such as a specific age group, gender, region, educational background, occupation, etc. A similar pattern can be found in
- the goods delivery information of the courier company [name, phone number, address] can be used as an additional factor in the identity verification work. That is, if the authentication of the courier company is added in addition to the seller of the product transaction, the reliability of the identity verification can be further increased.
- FIG. 1 is a schematic configuration diagram of an embodiment of an authentication system using transaction details of the present invention.
- the authentication system using the transaction details of the present invention receives and manages the user's authentication request information including the user's user information, the user's online financial transaction information, and the e-commerce information, and the authentication request
- the user's identity confirmation information provided from the counterparty is accumulated and stored, and the identity confirmation information of the counterparty and transaction-related identity attribute data extracted from the transaction history are stored.
- an authentication management computer 1000 for extracting, requesting identity authentication, receiving identity confirmation information, and performing and managing user authentication based on this information
- the transaction party data storage unit 2100 for storing and managing the user information that is the trader and the counterparty information, and the Keumwoong transaction data storage unit 2200 for storing and managing the online financial transaction information of the user provided by the user requesting user authentication ) and a transaction-related data storage computer 2000 including an e-commerce data storage unit 2300 for storing and managing the user's e-commerce information provided by the user requesting user authentication
- a financial transaction identity information storage unit 3100 that stores user identity confirmation information provided by counterparties in the online financial transaction, and e-commerce identity information that stores user identity confirmation information provided by counterparties in the e-commerce transaction Financial transaction or e-commerce-related identity extracted based on the storage unit 3200 and the financial transaction data and e-commerce data provided by the user and the financial transaction-related identity confirmation information and e-commerce-related identity confirmation information provided by the counterparty an identity-related data storage computer 3
- an identity authentication big data storage unit 8000 that provides necessary data;
- the identity verification information and transaction details provided by the counterparty which the data analysis computer 7000 analyzed based on the financial transaction and e-commerce related information included in the big data in the identity authentication big data storage unit 8000 an attribute data analysis information storage unit 9000 for storing identity attribute data for calculating consistency with the identity attribute data extracted from ;
- the authentication management computer 1000 is provided with a communication means and includes at least one hardware processor and a memory in which a computer program for performing all matters of the embodiment of the present invention for performing user authentication is stored, and the at least one hardware
- the processor may be configured as at least one server computer to control the execution of the computer program stored in the memory.
- the transaction-related data storage computer 2000 and the identity-related data storage computer 3000 may be configured as a database management system (DBMS) that builds, stores, and manages data as a database.
- DBMS database management system
- transaction-related data storage computer 2000 and the identity-related data storage computer 3000 may be configured as one storage computer, or may be configured as a plurality of separate storage computers.
- the trader terminal 4000, the financial transaction counterparty terminal 5000 and the e-commerce counterparty terminal 6000 are provided with communication means, and a smart phone, tablet computer, personal computer (PC) in which an application program or web program can be executed. , may be configured as a terminal such as a laptop computer.
- the application or web program provided by the trader terminal 4000 may be configured as a user authentication approval request means for requesting user authentication approval from the authentication management computer 1000, and the financial transaction counterpart terminal 5000 and an application program or web program provided in the e-commerce counterpart terminal 6000 transmits information such as identity confirmation information and transaction details based on the transaction details of the requestor of the user authentication to the authentication management computer 1000, the authentication management computer It may be configured as an identity confirmation data providing means for providing to (1000).
- the transaction terminal 4000 outputs the user authentication approval request means managed by the authentication management computer 1000, for example, the user's personal information (name and mobile phone number) and the user's
- the authentication management computer 1000 selects the online financial transaction counterparty information from the counterparty information included in the received user authentication request information. and by transmitting the user information with reference to the communication means (mobile phone number, e-mail address, SNS information, etc.) included in the e-commerce counterpart information to request confirmation of the user's identity.
- the authentication management computer 1000 receives and stores user identity confirmation information provided from the counterparties.
- the authentication management computer 1000 extracts user identity attribute data in relation to financial transactions or e-commerce transactions from the online financial transaction and e-commerce details between the transaction partners who have confirmed the identity of the user and the user information and the extracted user information.
- the identity attribute data is transmitted to the data analysis computer 7000 to request identity authentication of the user.
- the data analysis computer 7000 collects or analyzes and stores various identity attribute data that can be used to authenticate the identity of a financial transaction or e-commerce-related trader.
- the data stored in the financial transaction identity information storage unit 3100, the electronic commerce identity information storage unit 3200 stored in the identity-related data storage computer 3000 or the transaction-related data storage computer 2000 for financial transactions The data stored in the data storage unit 2200 and the e-commerce data storage unit 2300 are collected, the big data required for identity authentication is constructed, and stored in the identity authentication big data storage unit 8000, and the data analysis computer 7000 ) is equipped with an artificial intelligence (AI) program or algorithm to extract the identity attribute data related to the financial transaction or e-commerce and use it for the user identity authentication while stored in the attribute data analysis information storage unit 9000 it is good to have
- AI artificial intelligence
- the data analysis computer 7000 may store and utilize various identity attribute data provided from the outside or collected by itself.
- the authentication management computer 1000 derives identity confirmation data from various counterparties through the user's repeated online financial transactions and e-commerce transactions and accumulates identity authentication information through the user's transaction details, reliability of the user's identity can act to increase
- the identity authentication information of the user secured by the action of the counterparty and the data analysis computer 7000 is the trader terminal 4000, the financial transaction counterpart terminal 5000, or the e-commerce counterpart.
- Information can be shared by distributing and storing the information in the storage space of the terminal 6000 and the authentication management computer 1000 .
- the data analysis computer 7000 may include at least one server computer having a communication means and capable of executing an artificial intelligence (AI) related computer program or web program.
- AI artificial intelligence
- the cloud computer system 9500 may be configured as an option by adding or separating as needed.
- FIG. 2 is a schematic configuration diagram of an embodiment of the authentication management computer, which is the main part of the authentication system using the transaction details of the present invention.
- the configuration of the web program or computer program mounted on the authentication management computer 1000 of the present invention is provided by joining the system of the present invention as a member or as a non-member.
- a trader member who stores and manages basic information of traders, including user member information who is a trader who accesses to, user's online financial transaction counterparty information and e-commerce counterparty information, preferably name and mobile phone number information an information management module 1100;
- the user authentication an authentication request information management module 1050 for receiving, storing, and managing user authentication request information upon request; a financial transaction information management module 1200 for storing and managing the user's online financial transaction information input from the user's trader terminal; an e-commerce information management module 1250 for storing and managing the user's e-commerce transaction information input from the user's trader terminal; a product delivery information
- a data security management module 1550 In order to prevent user authentication from being performed by a user other than the user to authenticate the user for an illegal purpose, the name of the authentication requestor in use is checked through a bank account opened in the name of the user who is the authentication requester, or an anti-fraud information management module 1600 for managing anti-corruption means for checking the validity of the mobile phone's name; It is a configuration including a counterparty benefit information management module 1650 that manages policies and information on benefits granted to the financial transaction counterparty, the e-commerce counterparty, and the delivery person who participated in the user's identity verification.
- the motive of illegal use of the identity authentication system of the present invention can be blocked by taking measures such as giving a strong penalty or deducting a reliability score index to a user who is illegal in confirming the identity of the user.
- FIG. 3 is a schematic configuration diagram of an embodiment of the authentication request information management module, which is the main part of the authentication system using the transaction details of the present invention.
- the authentication request information management module 1050 of the present invention is an authentication requester data management unit 1060 that manages user information including the name and mobile phone number of a user who has requested user authentication among user members.
- the configuration includes a user transaction history management module 1070 for storing and managing the user's online financial transaction information or e-commerce transaction information provided by the user when user authentication is requested.
- the online financial transaction information or e-commerce transaction information provided by the user may include, for example, the time of transaction, counterparty (remittance target or product seller), transaction amount, transaction cycle, product type or type, payment method, and product delivery address. and the like.
- the authentication management computer provides information on online financial transaction institutions and e-commerce systems that the user transacts with, and their access user information, and the authentication management computer uses the user access information to provide the online It may be configured to access a financial transaction institution and an e-commerce system to bring the user's transaction details.
- FIG. 4 is a schematic configuration diagram of an embodiment of a financial transaction information management module, which is a main part of an authentication system using transaction details of the present invention.
- the financial transaction information management module 1200 of the present invention extracts, stores, and manages counterparty information (name and mobile phone number, etc.) from the online financial transaction information provided by the user.
- an information management module 1210 A financial transaction pattern analysis information management module 1220 that accumulates and manages the online financial transaction information provided by the user, and analyzes, stores, and manages patterns such as the user's past financial transaction history, transaction history in recent months, and transaction history by season. configuration that includes
- FIG. 5 is a schematic configuration diagram of an embodiment of an e-commerce information management module, which is a main part of an authentication system using transaction details of the present invention.
- the e-commerce information management module 1250 of the present invention extracts, stores, and manages the seller information (name and mobile phone number, etc.) that is the counterparty from the e-commerce transaction information provided by the user.
- a counterparty information management module 1260 It accumulates and manages the e-commerce transaction information provided by the user, and records the user's past transaction history, transaction history in recent months, transaction history by season, payment method (credit card, account transfer, direct deposit, points, etc.) and preferred seller information.
- FIG. 6 is a schematic configuration diagram of an embodiment of a user identity confirmation information management module, which is a main part of an authentication system using transaction details of the present invention.
- the user identity confirmation data management module 1350 of the present invention is a financial transaction counterparty confirmation data management module that receives, stores, and manages the identity confirmation information of the user provided by the counterpart of the user's online financial transaction. (1360) and; an e-commerce counterparty confirmation data management module 1370 for receiving, storing, and managing the user's identity confirmation information provided by the seller who is the user's e-commerce counterparty; Includes a delivery confirmation data management module 1380 that receives, stores, and manages user identity confirmation information provided by a delivery company (delivery company, etc.) that delivers products purchased by a user through e-commerce to a delivery address designated by the user is a configuration that
- the counterpart of the online financial transaction can confirm the identity of the user and using the confirmation information is, for example, a financial transaction that remits and receives a certain amount of money to the online financial system.
- the counterparty who is the recipient of the amount is the person who knows the name and bank information of the remittance user, so the counterparty trusts the user who is the sender, and the sender also knows the bank information and name of the remittance party. This is because it can be viewed as a relationship of trust to the counterparty.
- the counterparty of the e-commerce transaction can confirm the identity of the user and use the confirmation information, for example, when the user purchases a product in the online e-commerce system and makes a payment, and the product seller normally delivers the product to the user. In the state of receiving normally, the seller and the buyer know each other's information, so trust can be established. to be.
- the person who delivers the product purchased by the user in the e-commerce system knows the user's name, phone number, and delivery address, and if the product is delivered normally, the buyer and the delivery person have a trust relationship with each other, so Information that confirms the identity of the self-user is reliable.
- FIG. 7 is a schematic configuration diagram of an embodiment of the transaction information big data management module, which is the main part of the authentication system using the transaction details of the present invention.
- the transaction information big data management module 1400 of the present invention collects information included in their online financial transaction details provided by users to receive user authentication, analyzes patterns of financial transactions, and a financial transaction big data management module 1410 that builds and manages the information as financial transaction related big data;
- An e-commerce big data management module 1420 that collects information included in their e-commerce transaction details provided by users to obtain user authentication, analyzes patterns of product transactions, and builds and manages the information as e-commerce related big data ) is included.
- FIG. 8 is a schematic configuration diagram of an embodiment of the identity authentication information management module, which is the main part of the authentication system using the transaction details of the present invention.
- the identity authentication information management module 1500 of the present invention includes: an identity authentication data management module 1510 for receiving, storing, and managing the identity authentication information of the user transmitted from the data analysis computer; a user authentication information management module 1520 for generating, as user authentication information, the approval of identity authentication of a user who has made an authentication request based on the identity authentication information of the user, transmitting it to the trader terminal, and managing; It is a configuration including a user reliability information management module 1530 that adjusts and manages the user's identity reliability based on the accumulated value of the identity confirmation information of the counterparties to the user.
- the reliability of the person who has received user authentication approval managed by the user reliability information management module 1530 can be given a reliability index score of, for example, 80 points when the initial user authentication is approved, and the identification of the counterparty is later confirmed.
- a reliability index score may be additionally given according to a predetermined standard.
- a predetermined criterion for adding an index score of reliability may be determined in proportion to the numerical value of an item including, for example, the number of counterparties participating in the identification check, and a numerical value that is proportional or inversely proportional to the user average of each item can be determined based on
- FIG. 9 is a schematic configuration diagram of an embodiment of a data analysis computer, which is a main part among embodiments of an authentication system using transaction details of the present invention.
- the data analysis computer 7000 of the present invention may be configured as an artificial intelligence (AI) computer program.
- AI artificial intelligence
- AI artificial intelligence
- the pattern analysis in the transaction history of the user who requested user authentication and the construction of big data of the pattern analyzed in the transaction details related to the user authentication of various users accumulated are performed in the authentication management computer 1000 or in the data analysis computer 7000 It can be configured so that it can be done selectively according to the system environment.
- FIG. 10 is a schematic configuration diagram of an embodiment of the identity authentication information generation management module, which is a main part of the data analysis computer of the present invention.
- the identity authentication information generation management module 7500 of the present invention provides an online financial transaction counterparty or e-commerce transaction between a user and a user authenticated by existing various means such as a self-authentication-related public certificate and mobile phone verification.
- a user transaction history analysis management module 7510 for analyzing and managing transaction details between counterparties; a standard setting information management module 7520 for setting and managing a standard for whether a user's identity should be confirmed by more than one transaction counterparty according to a transaction type; Analysis of the transaction details in the user transaction history analysis and management module 7510 and the criteria set in the standard setting information management module 7520 analyze the characteristics of the transaction details between a person who has been authenticated as a user and the counterparty to the transaction, and generate statistics a transaction history characteristic statistics management module 7530 to manage; an average data management module 7540 for each counterparty, which calculates and manages average data of all members or authenticated users of counterparty transaction items;
- the configuration includes an identity determination information management module 7550 that compares and analyzes similarities and differences with the average data with respect to a user's authentication request to determine whether they are identical and manages the result.
- the financial transaction counterparty by type of online financial transaction and the counterparty by e-commerce transaction product are divided into at least two counterparties for online remittance, and for transactions of less than 50,000 won in e-commerce transactions.
- the standard can be set as at least 3 counterparties, and at least two counterparties for product transactions worth 100,000 won or more.
- the characteristics of the transaction include the number of counterparties, the total period of the transaction, the transaction period, the number of transactions, the amount, the product type or type, the payment method and the delivery address of the goods, etc. can be heard Mathematical main values such as the average, standard deviation, maximum value, and minimum value of each item related to the transaction characteristics may be calculated or frequently used expressions may be stored in the attribute data analysis information storage unit 9000 .
- the average data management unit 7540 for each counterparty may write, for example, as shown in Table 1 below in order to calculate the average data of the divided transaction items for each counterparty.
- the criterion of other items may be strengthened to be determined compared to the average.
- the criteria for other items may be relaxed compared to the average to determine equality.
- the identity verification method in the case of verification of the identity of a corporation (company) other than the individual requesting the certification, for example, considering that the corporation does not have a risk of personal information leakage and the method of verifying the identity of the corporation is well established in the existing system, for example Standards such as using a corporate address instead of a user's phone number may be set differently, or the identity verification method may be relaxed compared to the case of an individual.
- 11 is a flowchart for explaining an embodiment of an authentication method using transaction details of the present invention.
- the authentication management computer includes user information including name and phone number information of the user from the transaction terminal of the authentication requester who wants to receive user authentication, and at least one password receiving and storing as a member (S100); A user including the user's name, mobile phone number, and password, the user's online financial transaction information and e-commerce information, and consent to use or access information on financial transactions and e-commerce counterparties, transmitted from the authentication management computer from the transaction terminal Receiving authentication approval request data (S110) and; transmitting, by the authentication management computer, user identity authentication request information including the name and phone number information of the authentication requester included in the user authentication approval request data to the user's financial transaction counterpart terminal or e-commerce counterpart terminal (S120); storing, by the authentication management computer, user identity confirmation information provided from the financial transaction counterpart terminal or the electronic transaction counterpart terminal (S130); The authentication management computer extracts user identity authentication-related attribute data from the identity confirmation information, user information, and transaction history information of financial transactions and e-commerce provided by the
- the user authentication approval request data provided by the user further includes information on deliverers of products transacted in the e-commerce transaction
- the user identity confirmation data provided by the authentication management computer is provided by the authentication management computer as the delivery information. Based on the user information and the user's identity confirmation request including transaction details, it is characterized in that the user's identity confirmation data provided by the delivery company is further included.
- the user's identity authentication information stored and managed by the authentication management computer is linked to a level of reliability granted according to the quantity and quality of each identity authentication information, and the identity of the user provided by the financial transaction counterparty or e-commerce counterparty
- the reliability level is updated according to the accumulated data amount of the confirmation data.
- FIG. 12 is a flowchart for explaining another embodiment of the authentication method using the transaction details of the present invention.
- the data analysis computer analyzes and manages various financial transaction types including the financial transaction details and e-commerce details of the user who is the authentication requester, and various e-commerce transaction types and (S200); managing, by the authentication management computer, the number of financial transaction counterparties or e-commerce counterparties of the user to whom the user's identity confirmation data is to be provided, based on a set standard (S210); a step (S220) of the authentication management computer analyzing the transaction details of the financial transaction or e-commerce transaction and analyzing the pattern in the transaction history between the user and the counterparty according to the set criteria (S220); calculating and managing average data of all users or members of each transaction history item by counterparty using the statistics calculated through the pattern analysis (S230); It is a configuration including a step (S240) of deriving identity authentication information by comparing and analyzing similarities and differences with the average data with respect to the user's authentication request to determine whether they are identical.
- the user's identity confirmation information is obtained from the counterparty, and in the transaction details between the user and the counterparty who confirmed the user's identity Pattern analysis is performed based on the various information included to store the analysis data, and the consistency of the analysis data that is the pattern analysis result classified by transaction history and the analysis data that is the pattern analysis result of the stored user from the data of various transaction details of various users is checked. It is natural that various embodiments included in the technical idea for generating user identity information based on the user identity information are included in the protection scope of the present invention.
- the present invention can be used for user authentication in industrial fields such as online financial transactions and e-commerce.
Abstract
Description
구분 | 금융거래 | 물품상품거래 | 서비스상품거래 |
거래상대방 수 | 3명 | 7명 | 10명 |
거래 총기간 | 350일 | 70일 | 280일 |
거래 주기 | 5일 | 12일 | 2일 |
거래 횟수 | 2회/주 | 1회/주 | 3회/주 |
거래소요 총시간 | 15분 | 90분 | 3분 |
거래종류 | 송금 | 구매 결제 | 구매 결제 |
Claims (14)
- 사용자의 거래내역을 이용하여 본인인증을 수행하는 인증관리컴퓨터로서, 상기 인증관리컴퓨터가 하드웨어 자원을 활용하여 저장된 프로그램의 실행을 제어하되,사용자의 인증요청 데이터를 수신하고,상기 사용자의 거래상대방이 제공한 사용자의 동일성 확인 정보를 수신하고,상기 사용자의 거래상대방과의 거래 패턴정보를 분석하고,분석된 사용자의 거래 패턴정보와 자체보유한 거래 패턴정보와의 정합성을 기초로 사용자의 본인인증을 수행하는 것을 특징으로 하는 인증관리컴퓨터.
- 청구항 1에 있어서,상기 사용자의 거래 패턴정보는, 상기 사용자의 동일성 확인을 해준 거래상대방과 사용자간의 거래내역에 포함된 적어도 하나의 정보를 기초로 거래 패턴을 분석한 정보이고,상기 자체보유한 거래 패턴정보는, 다양한 사용자들의 다양한 거래내역들에 포함된 정보들을 기초로 거래내역별 분류된 거래 패턴을 분석한 정보인 것을 특징으로 하는 인증관리컴퓨터.
- 청구항 1에 있어서,사용자의 본인인증은, 분석된 사용자의 거래 패턴정보와 자체보유한 거래 패턴정보와의 정합성을 판단한 결과 설정 값 이상의 정합성을 갖는 경우에 수행하는 것을 특징으로 하는 인증관리컴퓨터.
- 청구항 1에 있어서,상기 거래내역는 금융거래 또는 전자상거래의 내역을 포함하는 것을 특징으로 하는 인증관리컴퓨터.
- 사용자의 거래내역을 이용하여 본인인증을 수행하는 인증관리컴퓨터로서, 상기 인증관리컴퓨터가 하드웨어 자원을 활용하여 저장된 프로그램의 실행을 제어하되,사용자단말기에서 제공된 사용자 개인 정보 및 적어도 하나의 거래상대방 정보를 포함한 사용자 인증요청 데이터를 수신하고,상기 적어도 하나의 거래상대방 정보에 포함된 적어도 하나의 거래상대방 단말기로 사용자의 동일성 확인 요청데이터를 전송하고,적어도 하나의 거래상대방 단말기에서 제공된 사용자의 동일성 확인 정보를 수신하고,상기 사용자의 동일성 확인 정보를 기초로 거래 관련 사용자의 동일성 속성 데이터를 추출하고,상기 사용자의 동일성 속성 데이터와 자체 분석 또는 보유한 거래 관련 동일성 속성 데이터와의 정합성을 기준으로 사용자의 본인인증을 수행하는 것을 특징으로 하는 인증관리컴퓨터.
- 청구항 5에 있어서,상기 거래상대방 정보는 사용자의 금융거래 또는 전자상거래의 상대방 정보를 포함하는 것을 특징으로 하는 인증관리컴퓨터.
- 청구항 5에 있어서,상기 거래상대방 정보는 사용자의 전자상거래와 관련된 상품의 배송자 정보를 포함하는 것을 특징으로 하는 인증관리컴퓨터.
- 청구항 5에 있어서,상기 거래 관련 동일성 속성 데이터는,사용자의 금융거래 내역에서 생성된 금융거래 패턴정보와, 인증관리컴퓨터가 자체 보유한 금융거래 패턴정보를 포함하는 것을 특징으로 하는 인증관리컴퓨터.
- 청구항 5에 있어서,상기 거래 관련 동일성 속성 데이터는,사용자의 전자상거래 내역에서 생성된 전자상거래 패턴정보와, 인증관리컴퓨터가 자체 보유한 전자상거래 패턴정보를 포함하는 것을 특징으로 하는 인증관리컴퓨터.
- 청구항 5 기재의 인증관리컴퓨터를 포함하고 사용자의 거래내역을 이용하여 사용자 인증을 수행하는 인증시스템으로서,상기 인증관리컴퓨터로부터 사용자의 동일성 인증 요청을 받아 상기 거래상대방이 제공한 금융거래 관련 동일성 확인 정보 및 전자상거래 관련 동일성 확인 정보를 기초로 추출한 금융거래 또는 전자상거래 관련 동일성 속성 데이터와 자체 분석 및 보유한 금융거래 또는 전자상거래 관련 동일성 속성 데이터와의 정합성을 기준으로 사용자의 동일성 인증 정보를 생성하는 데이터분석컴퓨터를 포함하는 것을 특징으로 하는 인증시스템.
- 청구항 10에 있어서,상기 사용자 및 사용자의 거래 상대방이 확인할 수 있도록 거래내역, 동일성 인증 내역 및 사용자 인증 내역 등의 데이터를 저장할 수 있는 저장공간을 각각 부여하고 관리하는 클라우드컴퓨터를 더 포함하는 인증시스템.
- 사용자의 거래내역을 이용하여 본인인증을 수행하는 인증관리컴퓨터를 포함하는 인증방법으로서,상기 인증관리컴퓨터가 사용자단말기에서 제공된 사용자 개인 정보 및 적어도 하나의 거래상대방 정보를 포함한 사용자 인증요청 데이터를 수신하는 단계와;상기 인증관리컴퓨터가 상기 적어도 하나의 거래상대방 정보에 포함된 적어도 하나의 거래상대방 단말기로 사용자의 동일성 확인 요청데이터를 전송하는 단계와;상기 인증관리컴퓨터가 적어도 하나의 거래상대방 단말기에서 제공된 사용자의 동일성 확인 정보를 수신하는 단계와;상기 인증관리컴퓨터가 상기 사용자의 동일성 확인 정보를 기초로 거래 관련 사용자의 동일성 속성 데이터를 추출하는 단계와;상기 인증관리컴퓨터가 상기 사용자의 동일성 속성 데이터와 자체 분석 또는 보유한 거래 관련 동일성 속성 데이터와의 정합성을 기준으로 사용자의 본인인증을 수행하는 단계를 포함하는 인증방법.
- 청구항 12에 있어서,상기 거래내역는 금융거래 또는 전자상거래의 내역을 포함하는 것을 특징으로 하는 인증방법.
- 청구항 12에 있어서,상기 사용자의 동일성 속성 데이터는, 사용자의 금융거래 또는 전자상거래의 패턴 정보를 포함하는 것을 특징으로 하는 인증방법.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB2219336.1A GB2611246A (en) | 2020-06-24 | 2021-06-18 | Authentication management computer, authentication system, and authentication method using transaction details |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020200076902A KR102252857B1 (ko) | 2020-06-24 | 2020-06-24 | 거래내역을 이용한 동일성인증 시스템 및 그 방법 |
KR10-2020-0076902 | 2020-06-24 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2021261846A1 true WO2021261846A1 (ko) | 2021-12-30 |
Family
ID=75915594
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/KR2021/007671 WO2021261846A1 (ko) | 2020-06-24 | 2021-06-18 | 거래내역을 이용한 인증관리컴퓨터, 인증시스템 및 인증방법 |
Country Status (3)
Country | Link |
---|---|
KR (2) | KR102252857B1 (ko) |
GB (1) | GB2611246A (ko) |
WO (1) | WO2021261846A1 (ko) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR102252857B1 (ko) * | 2020-06-24 | 2021-05-14 | 윤성민 | 거래내역을 이용한 동일성인증 시스템 및 그 방법 |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2008152639A (ja) * | 2006-12-19 | 2008-07-03 | Bank Of Tokyo-Mitsubishi Ufj Ltd | 認証システム、認証方法、及びプログラム |
JP2009093273A (ja) * | 2007-10-04 | 2009-04-30 | Univ Of Electro-Communications | 個人認証方法,個人認証システム,個人認証方法をコンピュータに実行させるための個人認証プログラムおよび該プログラムを記録した個人認証プログラム記憶媒体 |
JP2013196222A (ja) * | 2012-03-16 | 2013-09-30 | Fujitsu Ltd | 認証プログラム、情報処理装置、及び認証システム |
KR101388251B1 (ko) * | 2012-11-30 | 2014-04-24 | 숭실대학교산학협력단 | 소셜 네트워크 서비스에서의 미인증 사용자의 인증 방법 및 장치 |
KR101600455B1 (ko) * | 2014-08-26 | 2016-03-07 | 캠프모바일 주식회사 | 서비스 계정에 대한 사용자 인증 방법과 시스템, 및 기록 매체 |
KR102252857B1 (ko) * | 2020-06-24 | 2021-05-14 | 윤성민 | 거래내역을 이용한 동일성인증 시스템 및 그 방법 |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP3637566B2 (ja) * | 2001-03-21 | 2005-04-13 | 安田金属工業株式会社 | 決済履歴情報を用いた認証方法 |
JP5055007B2 (ja) * | 2007-04-17 | 2012-10-24 | 株式会社富士通アドバンストエンジニアリング | 取引管理プログラム及び取引管理方法 |
JP2011059837A (ja) * | 2009-09-08 | 2011-03-24 | Hitachi Ltd | 行動履歴情報活用個人認証システム及び方法 |
JP6021264B2 (ja) * | 2013-02-07 | 2016-11-09 | 株式会社日本総合研究所 | 行動履歴に対応する画像を利用した本人認証システム、認証方法、及び認証プログラム |
-
2020
- 2020-06-24 KR KR1020200076902A patent/KR102252857B1/ko active IP Right Grant
-
2021
- 2021-05-04 KR KR1020210057706A patent/KR102431545B1/ko active IP Right Grant
- 2021-06-18 WO PCT/KR2021/007671 patent/WO2021261846A1/ko active Application Filing
- 2021-06-18 GB GB2219336.1A patent/GB2611246A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2008152639A (ja) * | 2006-12-19 | 2008-07-03 | Bank Of Tokyo-Mitsubishi Ufj Ltd | 認証システム、認証方法、及びプログラム |
JP2009093273A (ja) * | 2007-10-04 | 2009-04-30 | Univ Of Electro-Communications | 個人認証方法,個人認証システム,個人認証方法をコンピュータに実行させるための個人認証プログラムおよび該プログラムを記録した個人認証プログラム記憶媒体 |
JP2013196222A (ja) * | 2012-03-16 | 2013-09-30 | Fujitsu Ltd | 認証プログラム、情報処理装置、及び認証システム |
KR101388251B1 (ko) * | 2012-11-30 | 2014-04-24 | 숭실대학교산학협력단 | 소셜 네트워크 서비스에서의 미인증 사용자의 인증 방법 및 장치 |
KR101600455B1 (ko) * | 2014-08-26 | 2016-03-07 | 캠프모바일 주식회사 | 서비스 계정에 대한 사용자 인증 방법과 시스템, 및 기록 매체 |
KR102252857B1 (ko) * | 2020-06-24 | 2021-05-14 | 윤성민 | 거래내역을 이용한 동일성인증 시스템 및 그 방법 |
Also Published As
Publication number | Publication date |
---|---|
KR102431545B1 (ko) | 2022-08-10 |
GB2611246A (en) | 2023-03-29 |
GB202219336D0 (en) | 2023-02-01 |
KR102252857B1 (ko) | 2021-05-14 |
KR20210158783A (ko) | 2021-12-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109872149B (zh) | 使用数字证书的可信度的方法和系统 | |
US11146546B2 (en) | Identity proofing and portability on blockchain | |
US10565360B2 (en) | Verifying a user's identity based on adaptive identity assurance levels | |
US9898740B2 (en) | Online challenge-response | |
US9189788B1 (en) | System and method for verifying identity | |
CA3145504C (en) | Asset transaction system for enabling transparent transaction history management | |
US9471920B2 (en) | Transaction assessment and/or authentication | |
JP5118959B2 (ja) | オンライン認証方法及びシステム | |
US11743245B2 (en) | Identity access management using access attempts and profile updates | |
CN111369730B (zh) | 基于区块链的投票表决处理方法和装置 | |
US11645654B2 (en) | Biometric-based identity verification using zero-knowledge proofs | |
US10867326B2 (en) | Reputation system and method | |
WO2021261846A1 (ko) | 거래내역을 이용한 인증관리컴퓨터, 인증시스템 및 인증방법 | |
KR102322578B1 (ko) | 상품거래시스템 및 그 방법 | |
KR102542144B1 (ko) | 금융상품의 거래관리컴퓨터, 금융상품의 거래관리시스템 및 금융상품의 거래관리방법 | |
CN111898886A (zh) | 一种集体资产清产核资系统 | |
KR102201083B1 (ko) | 금융거래시스템 및 그 방법 | |
KR102431546B1 (ko) | 금융거래시스템 및 그 방법 | |
US20240135378A1 (en) | Financial transaction system and method thereof | |
US20230308450A1 (en) | Authentication management computer for identity authentication, and identity authentication system and identity authentication method using authentication management computer | |
AU2015268635B2 (en) | Online challenge-response | |
KR20220112741A (ko) | 금융거래시스템 및 그 방법 | |
AU743570B1 (en) | Means and method of registering new users in a system of registered users | |
KR20220113129A (ko) | C2c 거래 플랫폼 서버, c2c 거래 플랫폼 서버의 동작 방법 및 c2c 거래 플랫폼 시스템 | |
Alterman et al. | WHITE PAPER: E-AUTHENTICATION PARTNERSHIP POLICY ON LEVELS OF ASSURANCE OF IDENTITY FOR AUTHENTICATION OF ELECTRONIC IDENTITY CREDENTIALS |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 21827953 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 202219336 Country of ref document: GB Kind code of ref document: A Free format text: PCT FILING DATE = 20210618 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 21827953 Country of ref document: EP Kind code of ref document: A1 |