WO2022030570A1 - 端末装置、情報処理システム及びプログラム - Google Patents
端末装置、情報処理システム及びプログラム Download PDFInfo
- Publication number
- WO2022030570A1 WO2022030570A1 PCT/JP2021/029064 JP2021029064W WO2022030570A1 WO 2022030570 A1 WO2022030570 A1 WO 2022030570A1 JP 2021029064 W JP2021029064 W JP 2021029064W WO 2022030570 A1 WO2022030570 A1 WO 2022030570A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- information
- personal identification
- terminal device
- identification information
- personal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/40—Business processes related to the transportation industry
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/02—Reservations, e.g. for tickets, services or events
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/40—Business processes related to social networking or social networking services
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/40—Business processes related to social networking or social networking services
- G06Q10/42—Determination of affinities or common interests between users
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/01—Customer relationship services
- G06Q30/015—Providing customer assistance, e.g. assisting a customer within a business location or via helpdesk
- G06Q30/016—After-sales
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
- G06Q30/0201—Market modelling; Market analysis; Collecting market data
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
- G06Q30/0207—Discounts or incentives, e.g. coupons or rebates
- G06Q30/0217—Discounts or incentives, e.g. coupons or rebates involving input on products or services in exchange for incentives or rewards
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
- G06Q30/0207—Discounts or incentives, e.g. coupons or rebates
- G06Q30/0225—Avoiding frauds
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
- G06Q30/0207—Discounts or incentives, e.g. coupons or rebates
- G06Q30/0226—Incentive systems for frequent usage, e.g. frequent flyer miles programs or point systems
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/12—Hotels or restaurants
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/18—Legal services
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/26—Government or public services
- G06Q50/265—Personal security, identity or safety
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q2220/00—Business processing using cryptography
Definitions
- the present invention relates to a terminal device, an information processing device, an information processing method and a program that handle personal information.
- Japanese Patent Application Laid-Open No. 2014-238642 As a technique for protecting such personal information, for example, Japanese Patent Application Laid-Open No. 2014-238642 can be mentioned.
- image data is divided into areas including each personal information.
- a protection pattern requesting unit that selectively inputs a protection pattern for whether or not to encrypt personal information area data related to each divided image data, and a protection pattern that the selection input encrypts.
- a personal information protection device equipped with a personal information processing unit that encrypts personal information area data has been proposed.
- the present invention provides an information processing device or the like that shares personal information from a completely different concept from the conventional one.
- the terminal device is A storage unit that stores the first personal identification information, An operation unit for inputting second personal identification information that is associated with the first personal identification information stored in the storage unit, has lower specificity than the first personal identification information, and can be viewed at the provider. Equipped with The second personal identification information may be provided to the provider.
- the first personal identification information may be associated with a plurality of second personal identification information having different specificities.
- the display unit may be capable of displaying both the first personal identification information and the second personal identification information at the same time.
- the terminal device is Further provided with a conversion unit that converts the first personal identification information into the second personal identification information.
- the first personal identification information has a plurality of first personal identification elements, and has a plurality of first personal identification elements.
- the second personal identification information has a plurality of second personal identification elements, and has a plurality of second personal identification elements.
- the conversion unit may convert to the second individual specific element after adjusting the low specificity for each first individual specific element.
- the display unit may be able to display whether or not the destination for providing the second personal identification information can be viewed.
- the operation unit makes it possible for a third party to input trust-specific information to indicate whether the information is reliable.
- the trust identification information may be displayed on the display unit.
- the terminal device is A recording unit for writing the encrypted second personal identification information to the blockchain may be provided.
- the terminal device is A transmission unit that transmits the second personal identification information encrypted using an encryption key to an information processing device, and a transmission unit.
- a recording unit for writing the encryption key to the blockchain may be provided.
- the first personal identification information may include information about the possessed device owned by the provider.
- Multiple avatar information is associated with multiple second personal identification information with different specificities, When the operation is performed using certain avatar information, the information may be provided using the second personal identification information associated with the certain avatar information.
- the terminal device By transmitting the second personal identification information to the provider, recording the second personal identification information in the blockchain, or sharing the second personal identification information stored in the information processing device with the provider.
- the second personal identification information may be made available for viewing at the provider.
- the terminal device is A recording unit for recording the second personal identification information in a blockchain or an information processing device may be further provided.
- the information processing system according to the present invention is An information processing system using the terminal device described above.
- the provider's terminal device provides the provider's terminal device with shared information including any of the second personal identification information, location information, or experience information, the provider gives points / currency to the provider. You may.
- the information processing system according to the present invention is An information processing system using the terminal device described above.
- An information processing system that receives input from the operation unit and controls the provision destination so that the second personal identification information cannot be viewed.
- the information processing system is An information processing system using the above-mentioned terminal device and an information processing device.
- the information processing device may include a matching unit that performs matching based on the second personal identification information provided or provided from the terminal device when receiving a ride request from the terminal device.
- the information processing system is A first terminal device including the first personal identification information, which is a first terminal device composed of the above terminal devices, and a first terminal device for storing the first personal information including the first personal identification information.
- Part or all of the first personal information stored in the storage unit of the first terminal device is stored in the information processing device or recorded in the blockchain.
- a matching unit that performs matching based on the request information from the second terminal device and the first personal information stored in the information processing device or recorded in the blockchain may be provided.
- information indicating the external user who provided the request information may be displayed on the display unit of the first terminal device.
- the first personal information includes multiple first personal information elements By selecting the first personal information element in the first terminal device, the first personal information element may be viewable in the second terminal device.
- the program according to the present invention A program installed in a terminal device or an information processing system using it.
- the terminal device in which the program is installed or the information processing system using the terminal device is An operation function for inputting second personal identification information that is associated with the first personal identification information stored in the storage unit, has lower specificity than the first personal identification information, and can be viewed at the provider. Have, It may function so that the second personal identification information can be viewed at the provider.
- FIG. 1st Embodiment of this invention Schematic block diagram of an information processing system different from FIG.
- the figure which showed the screen display when the point was given to the terminal apparatus used in the 1st Embodiment of this invention.
- the figure which showed the mode in which the possession apparatus such as an electric appliance is registered by the terminal apparatus used in the 1st Embodiment of this invention.
- FIG. 2 a schematic block diagram for explaining an embodiment using an external storage unit.
- First Embodiment not only an information processing device, an information processing system, and a program, but also an information processing method using a recording medium including a USB or the like for recording the program, an information processing device, and an information processing system.
- “or” and “or” also include the meanings of "and” and “and”. That is, for example, in the present embodiment, "A or B” means any of "A, B and A and B".
- the information processing system of the present embodiment may have a plurality of terminal devices 100 and an information processing device 200 capable of communicating with the terminal device 100.
- the terminal device 100 is typically a smartphone, tablet, personal computer or the like.
- the information processing device 200 is typically a server.
- the information processing device 200 of the present embodiment may be composed of one device or a plurality of devices. Further, when the information processing device 200 is configured from a plurality of devices, each device does not need to be provided in the same space such as the same room, and may be provided in different rooms, different buildings, different areas, or the like. , The management right holder and the owner may be different.
- the terminal device 100 has a terminal receiving unit (receiving unit) 190 that receives information from an external device such as an information processing device 200, and a terminal transmitting that transmits information to an external device such as the information processing device 200. It may have a unit (transmitting unit) 195 and a terminal control unit 110 that performs various controls.
- the information processing device 200 stores the device receiving unit (receiving unit) 290 that receives the first personal identification information, the second personal identification information, etc. from the terminal device 100, and the first personal identification information and the second personal identification information in association with each other. It may have a device storage unit (storage unit) 280, a device transmission unit (transmission unit) 295 that transmits second personal identification information to a transmission destination, and a device control unit 210 that performs various controls.
- the terminal device 100 is associated with the first personal identification information recorded or managed by the terminal device 100 and the first personal identification information, is less specific than the first personal identification information, and can be viewed at the provider. It may have an operation unit 121 for inputting personal identification information and a display unit 122 capable of displaying the first personal identification information and the second personal identification information. The terminal device 100 may be in a state of being viewable at the provider by providing the second personal identification information.
- the term "providing" information in the present application is a concept including both a mode of "transmitting" information and a mode of "sharing" information. Making the information viewable at the provider includes the information itself being provided to the provider and the information being shared by an information processing device 200 or the like such as a server.
- Such information may be provided by recording on the blockchain by the recording unit 160, by recording on the information processing apparatus 200 by the recording unit 160, or by mailing to the provider. It may be done by being transmitted by.
- the terminal device 100 may input to the information processing device 200 to allow the information processing device 200 to share the second personal identification information to the provider. The transmission may be made. Unless such permission is given, the second personal identification information may not be shared with a third party.
- Low specificity means abstraction (compartmentalization). The higher the degree of abstraction, the harder it is to be identified as an individual.
- the mode in which the first personal identification information is recorded or managed only by the terminal device 100 since it is basically not leaked to an external device such as the information processing device 200, the personal information should be protected. Can be done.
- information was deposited on a central server, etc. (it is a deposit type), and the subsequent utilization of information was left to a third party. In this aspect, there is a risk that the information will be leaked if the central server is attacked, but according to this aspect, it is possible to fundamentally prevent such a risk from occurring.
- the terminal device 100 may be generated by installing an application (hereinafter referred to as "target application").
- the target application may be obtained by downloading from a server or the like, or may be obtained by other means such as USB and e-mail.
- the display unit 122 and the operation unit 121 may be integrated into the operation display unit 120.
- the terminal device 100 is composed of a smartphone, a tablet, or the like, it is a touch panel, and the operation display unit 120 is adopted.
- the mode in which the operation display unit 120 is adopted will be mainly described, but the present invention is not limited to such a mode, and the display unit 122 and the operation unit 121 may be separated.
- the terminal device 100 also has a terminal storage unit (storage unit) 180 that stores various information including the target application.
- the terminal storage unit 180 In the terminal storage unit 180, the first personal identification information and one or a plurality of second personal identification information may be stored in association with each other.
- the terminal storage unit 180 provided in the terminal device 100 will be described, but the present invention is not limited to such an embodiment, and the external storage unit 380 provided in an external device such as a server or a cloud (FIG. 6). 24) may be used to store the first personal identification information in association with one or more second personal identification information.
- a predetermined area of the external storage unit 380 provided in the external device is assigned to each individual, and the area of the storage unit may be used to store individual information. This information is assigned to each individual and is basically in a mode that cannot be seen by a third party.
- the external storage unit 380 may include an application or a library that can be operated by the terminal device 100. This method involves utilizing virtualization technology and container technology.
- the second personal identification information will be provided to the provider (sender / share destination) specified by the provider (sender / share source).
- the recording unit 160 of the terminal device 100 may write the second personal identification information encrypted using the public key of the provider to the blockchain. According to this aspect, only the provider having the private key can decrypt the second personal identification information written in the blockchain. Therefore, confidentiality can be maintained even when the second personal identification information with high specificity is provided. Moreover, since the information cannot be rewritten by using the blockchain, it is possible to have high credibility.
- the terminal transmission unit (transmission unit) 195 of the terminal device 100 may transmit the second personal identification information encrypted using the encryption key to the information processing device 200.
- the recording unit 160 may write information about the encryption key (encryption key information) to the blockchain using the public key of the provider. According to this aspect, only the provider having the private key can decrypt the encryption key written in the blockchain. Even in this aspect, high credibility can be given.
- the information processing device 200 is distributed to a plurality of devices (typically consisting of a distributed server), the address of the device in which the provided second personal identification information is stored is also provided. It may be encrypted using a public key.
- the second personal identification information is also encrypted in which device (address), higher security can be realized.
- a block which is a collection of transactions (transaction information), is created by encryption, and transactions are recorded by connecting the blocks with a chain.
- Hashing when recording on the blockchain is performed by, for example, SHA256 (SecureHashAlgorithm256-bit).
- writing to the blockchain may be performed using, for example, an electronic signature (digital signature) using the private key and public key of the person who writes (provider / sender).
- digital signature digital signature
- the original data the data encrypted with the private key of the person who writes the hashed data of the original data, and the private key.
- the public key corresponding to the above can be recorded in the blockchain.
- any of public type, consortium type, private type, etc. may be used.
- mining will be performed.
- consortium type mining is not performed and consensus building is performed by consensus among specific persons.
- mining is not performed and consensus building is based on internal approval.
- the consortium type although there is a blockchain administrator, it is advantageous in that it is not centralized.
- Hyperledger Fabric may be used.
- the target application corresponds to the application developed by the company participating in the consortium (hereinafter also referred to as "compatible application"), and the target application can be used together when using the compatible application. You may do so.
- the device storage unit 280 of the information processing device 200 stores the second personal identification information encrypted using the encryption key, and the provider (destination / sharing destination) having the decryption key is the second personal identification.
- the information may be decrypted and viewed.
- the second personal identification information encrypted using the encryption key may be provided to the provider, and the provider may decrypt the second personal identification information using the decryption key and view it.
- the encryption key may be specified by the provider, or the provider may encrypt the encryption key using the encryption key specified by the provider and separately send the encryption key to the provider by e-mail or the like. ..
- the exchange using the target application between the plurality of terminal devices 100 and the exchange using the target application between the terminal device 100 and the information processing device 200 may be recorded in the blockchain by the recording unit 160.
- the reliability of the information can be improved.
- the terminal device 100 may be able to create various second personal identification information having different specificities.
- low-level specific information with a low level of specificity may be browsed for company A
- high-level specific information with a high level of specificity may be browsed for company B.
- the provider (user) can decide the adjustment of the specificity (particle size) by himself / herself.
- the terminal device 100 may have a conversion unit 130 that automatically converts the first personal identification information into the second personal identification information (see FIG. 2).
- a conversion unit 130 that automatically converts the first personal identification information into the second personal identification information (see FIG. 2).
- the first personal identification information may have a plurality of first personal identification elements.
- the second personal identification information may have a plurality of second personal identification elements.
- the conversion unit 130 may adjust the low specificity for each first individual specific element and then convert it into the second individual specific element.
- Each of the first individual specific elements and each of the second individual specific elements may have a one-to-one correspondence.
- the first personal identification information includes name, age, address, work place, telephone number, e-mail address, gender, date of birth, my number, driver's license number, passport number, credit card number, etc. It may include biometric information such as facial photographs, fingerprints, iris information, and vein information.
- the second individual identification element may be converted from these first individual identification elements into less specific information.
- the first personal identification information may include a handle name (“beard glasses” in FIG. 3). This handle name does not have to be converted into a second personal identification element.
- the second personal identification element When highly specific information such as my number, driver's license number, passport number, etc. is used as the second personal identification element, the first personal identification information, the identification information of the terminal device 100 (ID information of the mobile terminal), etc. are used as a medium.
- the second personal identification information including the second personal identification element for example, "glasses whiskers" is associated with another second personal identification information (for example, "glasses glasses”).
- the credibility of another second personal identification information can be enhanced, and for example, the credibility of the information can be guaranteed by the administrator who manages the system.
- face recognition may be used, and the result of the face photo and face recognition of the driver's license or passport may also be provided to the provider.
- a moving image may be used when performing face recognition.
- the operation display unit 120 may be able to display both the first personal identification information and the second personal identification information at the same time.
- the content of the second personal identification information that can be viewed at the provider can be confirmed at the same time as the first personal identification information.
- the first personal identification information is displayed in the first screen area 1210 at the lower side of the screen
- the second personal identification information is displayed in the second screen area 1220 at the upper side of the screen. ..
- the present invention is not limited to such an aspect, and the second personal identification information may be displayed by performing a predetermined operation such as swiping on the operation display unit 120 displaying the first personal identification information. good.
- the first personal identification information may be displayed by performing a predetermined operation such as swiping on the operation display unit 120 displaying the second personal identification information.
- the operation display unit 120 can display whether or not the provision destination is in a state where the second personal identification information can be viewed, and whether the second personal identification information is on the person's side (provider) or on the provision destination. May be displayable. When such an aspect is adopted, it is confirmed whether the second personal identification information can be viewed only by the person himself / herself, or whether the information can be viewed by a provider (destination / sharing destination) other than the person himself / herself. can do.
- the second personal identification information encrypted using the public key of the provider is written in the blockchain, or the encryption key is written in the blockchain using the public key of the provider. In that case, the second personal identification information is in the provider.
- information 1250 indicating the status of the second personal identification information is displayed as an icon in the first screen area 1210 and the second screen area 1220.
- the key mark shown in FIG. 3 it indicates that the second personal identification information cannot be viewed by anyone other than the person (note that, as described above, the first personal identification information cannot be viewed by anyone other than the person). ing.).
- a circular icon called a split icon in which a semicircular filled portion is present, will be described. If the filled part of the semicircle is facing upward (second screen area 1220 side) (see the leftmost screen in FIG. 16), it indicates that the information is shared and is half.
- the filled part of the circle faces downward (first screen area 1210 side) (see the second screen from the left in FIG. 16), it indicates that the information is not shared. ..
- the filled portion of the semicircle is located on the right half or the left half, it may indicate that the second personal identification information is being edited (see FIG. 19).
- the operation display unit 120 may display whether the information is reliable information.
- trust identification information secret
- Code for indicating whether the information transmitted from a third party by the operation display unit 120 or the operation unit 121 is the transmission of information using the second personal identification information of the third party.
- Code 129 can be input, and when the second personal identification information is received from a reliable third party, the trust identification information 129 may be displayed on the operation display unit 120 (see FIG. 4).
- the information may be transmitted by the provider by performing an electronic signature using a blockchain. In this case, it is possible to confirm whether the provider is accurate by the electronic signature.
- the color registered in advance by the person may be displayed in a part of the operation display unit 120 or in the background. Since the color registered in advance by the person is basically unknown to anyone other than the person, even if the information is sent by falsifying the image, the color is basically the color on the operation display unit 120 that received the information. It is not displayed. Therefore, even if the information is sent by falsifying the image, it can be immediately recognized. Therefore, when the information is sent in a false image, it can be confirmed at a glance that the information is unreliable.
- FIG. 4 is a diagram showing an example of a screen displayed on the operation display unit 120 of the terminal device 100 when registering colors in advance. On the left side of FIG.
- the trust specific information 129 can be confirmed by displaying the trust specific information 129 on the operation display unit 120 that the information "Home delivery service has started! From “Super Marukawa” is reliable. On the right side of FIG. 5, the trust specific information 129 is displayed on the operation display unit 120 that the information "Let's answer the questionnaire and get 100 points! From the "system” is reliable. It shows that it can be confirmed.
- the trust identification information 129 various information such as shapes and words can be used in addition to the color.
- the terminal device 100 of the provider may control the second personal identification information so that it cannot be viewed.
- the recording unit 160 may write to the blockchain so that the second personal identification information cannot be viewed by the terminal device 100 of the provider.
- the second personal identification information is stored in the device storage unit 280 of the information processing device 200
- the second personal identification information stored in the device storage unit 280 is received from the terminal device 100. May not be viewable. According to these aspects, it is possible to control the viewing of the second personal identification information once provided after the fact. In the second screen from the left in FIG. 16, the split icon is filled in the lower half, and the second personal identification information once provided in the leftmost screen in FIG. 16 is recovered. Is shown.
- the provider's terminal device 100 provides the provider's terminal device 100 with shared information including location information, experience information, etc. in addition to the second personal identification information, the provider points to the provider including virtual currency. ⁇ Currency may be given.
- the virtual currency may be provided from the terminal device 100 of the provider who received the shared information to the terminal device 100 of the provider using a blockchain. This process may be performed by input from the terminal device 100 of the providing destination that has received the shared information.
- the device control unit 210 may give points / currencies such as virtual currency to the sender who has transmitted the shared information. When such an aspect is adopted, the provider is motivated to actively disclose his / her information.
- FIG. 6 shows an example of a screen displayed on the operation display unit 120 of the terminal device 100 of the sender when points are given to the sender who has transmitted the shared information.
- a blockchain for virtual currency may be prepared as a sidechain.
- Local currency may be given as virtual currency.
- the circulation of virtual currency in the area can be activated, which can be useful for regional revitalization.
- the "point / currency" includes electronic money (including prepaid payment means), virtual currency (including cryptographic assets) and points, and includes electronic money, virtual currency and points. It means any one or more of the points.
- points / currency may be given to the introducer of the target application by the system administrator. Also, if the new person introduces the target application further and the new person installs the target application (even if a grandchild is born), the system administrator will be the first introducer of the target application. You may be given more points / currency from.
- Processing including logs using the target application may be written to the blockchain.
- the blockchain is used in this way, it is possible to manage the processing using the target application at low cost and in a highly reliable state.
- points / currencies such as points may be given to the provider.
- points / currency may be given by refraining from going out from home or moving across prefectures.
- the center of the coordinate axes may be the home.
- FIG. 7 also shows the average waiting time at home in the area where the user lives ( ⁇ city), and points may be given if the average is exceeded.
- points may be awarded when the value exceeds a predetermined threshold value.
- the points may be given by the local government or the national government using a blockchain to give points / currencies such as virtual currency.
- a history of staying in a predetermined area such as a downtown area may be obtained. In this case, you can get information such as how much time you are spending in the downtown area.
- This information may be provided to local governments, national governments, and other governments, and points and currencies such as virtual currencies may be given by the governments. Since such information is provided with permission from the provider, it can be used for various analyzes. Further, the provider who frequently goes out to the downtown area may be encouraged to wait at home by, for example, recommending a video distribution service.
- FIG. 8 shows a screen when displaying information such as personal information, telephone information, and payment information on the operation display unit 120. By operating such a screen, various information may be confirmed and edited.
- FIG. 9 shows a screen for displaying information when receiving various services on the operation display unit 120. By operating such a screen, the desired service may be received. For example, it is conceivable to use a long-term care service or a shopping request service. In this case, for example, when an elderly person makes a request for a nursing care service or a shopping request service using the target application, a helper such as a young person is assigned via the target application. Since this helper is a person who uses the target application by using the second personal identification information, he / she can be trusted to some extent.
- the helper may be a volunteer, but points / currencies such as virtual currency may be provided to the helper by the service user or the local government.
- points / currencies such as virtual currency
- the local government grants points / currencies such as virtual currency, it may be a local currency.
- the value of points / currency given when the specificity of the second personal identification information is high may be higher than the value of points / currency given when the specificity is low.
- the value of points / currency given when low-level specific information is provided is smaller than the value of points / currency given when medium-level specific information or high-level specific information is provided. You may. Since the economic value of information increases as the specificity (particle size) increases, points and currencies that reflect the economic value of information can be given to information providers.
- the level of specificity of personal information is higher for medium-level specific information than for low-level specific information, and higher for high-level specific information than for medium-level specific information.
- the device control unit 210 may confirm the disclosure mode (sharing mode) (for example, as shown in FIG. 10, "let's disclose important personal information". It is also possible to display a term such as ".” On the operation display unit 120 to call attention.)
- the disclosure mode the information as it is may be disclosed, or it may be disclosed as encrypted information such as a two-dimensional bar code or a bar code.
- FIG. 10 shows a screen for selecting whether to disclose with a two-dimensional code or as it is when trying to share My Number.
- the device storage unit 280 has a plurality of avatar information associated with the first personal identification information (shown as a “persona” in FIG. 8) and a plurality of second individual identifications having different specificities associated with the first personal identification information. Information may be stored. Further, the avatar information and the second personal identification information having different specificity may be associated with each other and stored in the device storage unit 280.
- FIG. 11 shows a screen transition when selecting avatar information.
- the second personal identification information associated with the certain avatar information can be viewed on another device terminal using the specific application.
- the accuracy of the specificity of the information to be disclosed (shared) by oneself can be easily selected by appropriately selecting the avatar information.
- select your own avatar information and when the avatar information is selected, you can exchange using the target application using the information linked to the avatar information.
- any of the second personal identification information is provided with personally identifiable information such as a driver's license number or passport number, it is possible to associate with the individual, which is malicious due to spoofing. Actions are even more difficult to take.
- the blockchain it is advantageous in that it cannot be tampered with because a series of exchanges using the target application are recorded in the blockchain.
- the terminal device 100 may be able to send a ride request by using the target application.
- the avatar information may be selected, the information to be disclosed may be selected, and then the ride request may be written in the SNS or transmitted to the information processing apparatus 200.
- the terminal device 100 may have a first matching unit 150 that performs matching based on the second personal identification information when transmitting a shared request (see FIG. 2).
- the second personal identification information may include specific information such as hobbies, teams that are fans, players who are fans, etc. In this case, the first matching unit 150 performs matching using these information. You may do so.
- the first matching unit 150 may select a person to ride by referring to specific information such as a team that is a fan and a player who is a fan.
- the first matching unit 150 may read out the second personal identification information of another user stored in the device storage unit 280 or stored in the blockchain to perform matching.
- the device matching unit 250 may perform matching using the second personal identification information of a plurality of users stored in the device storage unit 280 or stored in the blockchain (see FIG. 30). In this case, the matching result is shown to each matched user, but the matching may be established only when all the matched users approve.
- FIG. 12 shows a screen transition when a ride request is transmitted from the terminal device 100 using the target application.
- the device matching unit 250 performs matching based on specific information, and displays other matched persons who make a ride request. If the consent is given with this content, the matching is completed based on the information by inputting the fact from the operation display unit 120. If you do not agree, you can input from the operation display unit 120 that you want to change, and the matching by the device matching unit 250 will be performed again. This process may be repeated until the final passenger is determined. It should be noted that such approval may not be required, and the device matching unit 250 may be in a mode of getting on a designated vehicle based on the result of matching.
- the designated vehicle may be, for example, a shuttle bus from a station to a stadium, a small vehicle (may be an autonomous driving vehicle), a taxi, or the like.
- a shuttle bus from a station to a stadium
- a small vehicle may be an autonomous driving vehicle
- a taxi or the like.
- it can be expected to be used such as heading to a destination such as a stadium while enjoying a conversation with a passenger who has a good taste.
- the experience information may be shared as shared information, and for example, the result of sharing using the target application may be provided as experience information to a predetermined bulletin board or SNS.
- points / currencies such as virtual currency may be given to the provider.
- FIG. 13 shows the screen transition in the operation display unit 120 when the experience is shared, and shows the screen transition when points are given by sharing the experience.
- the fare for using the vehicle may be able to be paid in points / currencies such as virtual currency.
- the fare divided automatically may be billed to the passengers.
- the fare for the use may be paid in points / currencies such as virtual currency.
- FIG. 14 is a diagram showing screen transitions when points are used as points / currencies.
- the experience information as shared information may include the evaluation of restaurants and the like.
- FIG. 15 is a diagram showing an example of screen transition at that time. Overlay the screen of the target application on the map display screen. By overlapping the screens in this way, the target application will be driven.
- FIG. 15 an embodiment in which information that a meal has been eaten at a place is provided by dragging and dropping a “meal log” on a map display screen and superimposing the “meal log” on the map display screen is shown.
- the position information of the terminal device 100 by GPS or the like, the contents of the meal obtained by analyzing the image taken by the terminal device 100, and the information of the store where the person stayed may be automatically recorded in the terminal device 100. ..
- this information may be provided by dragging and dropping the "meal log". These may also be written to the blockchain by the recording unit 160.
- the information that the person has eaten at the place is provided in this way, it may be possible to write the evaluation at the restaurant.
- the frequency information such as how many times the person who wrote the meal log has visited the store in the past and how often the person has visited the store may be shared. ..
- the shared side can understand whether the evaluation is made by a person who has visited only once, a person who has visited several times in the past, or a description by a regular customer, and enhances the credibility of the information. be able to.
- the meal log may include not only eating and drinking at a restaurant but also eating and drinking at home.
- the "meal log" is dragged and dropped, not only the information recorded in the terminal device 100 as the meal log but also the information associated with the meal log, for example, the place immediately before, the exercise history, etc. are provided to the provider. It may be done.
- These information may be acquired by the position information of the terminal device 100, or may be acquired by using a dedicated application associated with the target application.
- the device control unit 210 determines that the owner of the terminal device 100 has visited the store, and links it with the second specific personal information.
- the information may be stored in the device storage unit 280, or the operator presses a predetermined button such as check-in displayed on the operation display unit 120 of the terminal device 100 when entering the store. As a result, the entry into the store may be linked to the second specific personal information and stored in the device storage unit 280.
- the split icon When the information is sent, the split icon is highlighted, indicating that the shared information is on the destination side.
- the information shared in this way may be recoverable as described above.
- the provider Once the information is collected, the provider will no longer be able to view the information.
- the collection referred to here is typically prohibiting access to the provided destination to the shared information recorded in the information processing apparatus 200 (consisting of distributed servers).
- the blockchain it is possible to follow the information provision destinations on the blockchain and prohibit access to the shared information from all the provision destinations.
- the shared information When the shared information is transmitted to the provider, when the shared information collection command is input from the terminal device 100, the provider issues a command to delete the shared information recorded at the provider. It is conceivable to record that on the blockchain.
- the provided information may be appropriately confirmed on the terminal device 100.
- a predetermined icon split icon
- FIG. 16 it is shown that the activity log, the meal log, the shopping log, and the point balance are shared as shared information.
- the relationship between the store and the operator may be confirmed, or the reason for recommending the store may be confirmed.
- the shared information may be obtained by dragging and dropping each of the first personal identification information or the first personal identification element. (See FIG. 17). Since the second personal identification information is reliable information to some extent, it may be possible to make a reservation with the handle name.
- a predetermined icon may be displayed for writing using the target application.
- the user who uses the meal log can confirm at a glance that the information is written using the second personal identification information and is highly reliable. Will be able to. By tapping a predetermined icon (split icon), it may be possible to see more detailed information regarding the second personal identification information.
- the first personal identification information includes information about the possessed device owned by the provider, and the information about the possessed device may be provided to another terminal device 100 without being converted into the second personal identification element.
- an electric appliance can be mentioned.
- the possessed device may be registered manually, or the information of the purchased device may be recorded in the terminal device 100 when the product is purchased through the target application (for example, when the product is purchased by e-commerce).
- the terminal device 100 may read predetermined information such as a QR code of the product (see FIG. 21). At this time, the date of purchase and the store of purchase may also be entered.
- the target application when communicating with the center that provides after-sales service for home appliances in a chat format via SNS, launch the target application and drag and drop the specified information about the owned device to obtain the information. It may be provided to the center (see Figure 18). Such information may be provided via the blockchain. As shown in FIG. 15, the target application may be made available by sliding the screen of the target application in the horizontal direction to fit the screen during the chat-style exchange. When the mode of sharing information using the target application is adopted in this way, accurate information can be easily provided to the center by a method. For example, by sharing the information of the target home appliances from the list, the model name and serial number can be provided to the center as incidental information. Regardless of the manufacturer, the owned devices such as home appliances may be collectively registered. In addition, since the center also obtains the minimum amount of information as personal information, the management burden can be reduced.
- address information which is one of the first personal identification elements, may be shared by dragging and dropping (see FIG. 19). This aspect is useful in that highly specific information such as actual address information can be provided to the provider only when necessary. Further, the date and time of the reservation may be selected as it is.
- the terminal device 100 may store information related to communication via SNS.
- the memory of this exchange may be enabled by either the terminal device 100 of the person who contacts the center that provides after-sales service or the terminal device 100 at the center. Further, such an exchange may be recorded on the blockchain by the recording unit 160. When such an aspect is adopted, the history can be browsed by reading out the information regarding the exchange between the two at a later date. In addition, the history of exchanges may be confirmed by pressing and holding the split icon. The recording of the information of such exchange may be performed automatically, and may be started and / or stopped by a predetermined operation. At this time, what is recorded may be displayed as an icon (for example, "REC icon").
- the terminal device 100 When the terminal device 100 records the communication with the center, it is advantageous in that the result of the communication can be passed to another company. Specifically, when an inquiry was made to the center of Company S regarding a device defect, the device defect may be caused by another device of Company R. In this case, by transmitting the recorded communication with the center of company S to the center of company R, the circumstances can be easily grasped as company R, and also as the person (user) who made the inquiry. , It is useful in that it does not need to be explained again. In addition, even if the inquiry is made again after a lapse of time, the user can provide the center with the information recorded as the information when the inquiry was made before, so that the user does not need to explain again. Is beneficial.
- the information recorded in this way is also recorded in the terminal device 100 of the center, and even if the center of the company S is to be transmitted to the center of the company R with the permission of the person (user) who made the inquiry. good.
- the content of the exchange may be confirmed by pressing and holding a predetermined icon.
- a predetermined icon such as a split icon
- a predetermined icon may be displayed only for an application corresponding to the target application.
- the split icon when the filled semicircle shape faces upward, it indicates that a part or all of the second personal identification information is provided, and the filled semicircle shape is used. When is facing down, it indicates that the second personal identification information is not shared.
- the height of the specificity of the first personal identification information may be easily adjusted.
- the height of the specificity of the first personal identification information may be adjusted by dragging and dropping the first personal identification information displayed in the first screen area 1210 to the second screen area 1220.
- a control screen for selecting a disclosure method is displayed, and by operating the control screen, the specificity is high.
- a security controller as assisted in FIG. 22 is displayed, with closer to "max" lowering specificity and conversely closer to "min” increasing specificity.
- the specificity at this time may be abstracted according to a predetermined standard, the specificity may be stored in the information processing apparatus 200, and the degree of abstraction may be determined by reading the specificity. ..
- a preview is displayed, and the specificity at which the information is provided is displayed.
- an icon indicating the provider may be displayed. You may be able to confirm the content of the provided information by pressing and holding it.
- the first personal identification information and the second personal identification information are used for explanation, but a mode may be adopted in which the first personal information including information that does not identify an individual is used instead of the first personal identification information.
- a mode may be adopted in which the second personal information including the information that does not specify an individual is used instead of the second personal identification information.
- the first personal information may include a plurality of first personal information elements, and as the first personal information element, the number of steps in a day or a predetermined time, the train boarding section and boarding frequency, the personal computer usage time and usage frequency, the smartphone usage time, and the like. Information such as frequency of use may also be included.
- the second personal information may also include a plurality of second personal information elements. In the embodiments shown in FIGS. 26 to 28, which will be described later, the number of steps (see the picture of the person's shape), the section of the train and the frequency of boarding (see the picture of the train), the time of using the personal computer (see the picture of the personal computer), and the time at home (see the picture of the personal computer). The picture of the house) is shown as the first personal information element in the first screen area 1210. Further, the aspect shown in FIG. 29 shows an aspect in which the running place, distance and time are stored in the terminal device 100 as the first personal information element.
- the second matching unit 650 is configured to perform matching based on the request information and the first personal information stored in the information processing apparatus 200.
- the first personal information may be stored in the information processing apparatus 200 or recorded in the blockchain with the permission of the user.
- Other configurations are the same as those of the first embodiment, and any aspect described in the first embodiment can be adopted.
- the members described in the first embodiment will be described with reference to the same reference numerals.
- the function as the second matching unit 650 may be fulfilled by the above-mentioned device matching unit 250, or the second matching unit 650 may be provided separately from the device matching unit 250.
- the first personal information stored in the information processing device 200 or recorded in the blockchain includes highly specific information (my number, driver's license number, passport number, credit card number, face photo) as personal information. , Fingerprints, iris information, biological information such as vein information, etc.) may not be included. Further, the first personal identification information that is not provided to the information processing apparatus 200 may be specified by the user. Further, the second matching unit 650 may perform matching by using only the second personal identification information in the first embodiment without using the first personal information (the third embodiment described later). reference).
- the first terminal device 100a and the second terminal device 100b of the present embodiment are the terminal devices of the first embodiment, and the first terminal device 100a is typically a terminal managed by an individual user.
- the second terminal device 100b is typically a terminal managed by an external user other than an individual user such as a company, a national government, or a local public body.
- a part or all of the first personal information is stored in the device storage unit 280 of the information processing device 200, or is recorded in the blockchain.
- Request information which is information desired by an external user, may be input from the second terminal device 100b.
- the request information is input in this way, the first personal information stored in the device storage unit 280 of the information processing apparatus 200 or recorded in the blockchain is read out by the second matching unit 650, and the second is read out. Matching may be performed by the matching unit 650.
- the second matching unit 650 may perform matching between the request information and the first personal information by applying the matching model stored in advance in the device storage unit 280.
- the matching model may be a pre-generated model.
- the second matching unit 650 has an artificial intelligence function, and a matching model may be generated by machine learning.
- the second matching unit 650 may generate a matching model by learning an appropriate matching result by using the request information for learning and the first personal information for learning as input information. As the request information for learning and the first personal information for learning, the results actually used in the past may be used, or the information prepared in advance as a model case may be used. Further, the second matching unit 650 may determine that the first personal information is matched when the requirements specified in the request information are satisfied.
- the second matching unit 650 determines that the certain request information and the certain first personal information are matched, and the company that provided the certain request information.
- Information for example, an icon
- Such control may be performed by receiving the information from the information processing device 200 by the first terminal device 100a. Whether or not a certain request information and a certain first personal information are matched may be determined by whether or not the degree of matching is an evaluation of a predetermined threshold value or more.
- the request information is issued for each external user, it is naturally possible that a plurality of matching candidates are displayed on the first terminal device 100a.
- the icon of the external user who has been matched and issued the request information may be displayed on the operation display unit 120 of the first terminal device 100a.
- the reciprocal of the distance from the center and the staying time are multiplied, and then the coefficient is further multiplied to calculate the evaluation value, and the second matching is made to determine whether the evaluation value is equal to or greater than the threshold value. It may be done by unit 650.
- a predetermined model such as when using an artificial intelligence function, a model in which the adoption variables multiplied by the adoption coefficient are added together may be adopted.
- the first personal information is displayed in the first screen area 1210 at the lower side of the screen, and matching candidates may be displayed in the second screen area 1220 at the upper side of the screen.
- the matching candidates are shown in the shape of a balloon, and the matching candidates move as if they are floating in the second screen region 1220.
- the first personal information element is shown within the first screen area 1210.
- the first personal information element in the first screen area 1210 may also move so as to float in the first screen area 1210.
- the first personal information is provided to the matching candidate, and the company, country, or local government that is the matching candidate is provided.
- the first personal information may be made available to a group or the like.
- the first personal information element is shown in the second screen area 1220 as shown in FIG. 27, one or a plurality of specific first personal information elements can be dragged and dropped as matching candidates to obtain one's own. It may be possible to provide the first personal information element selected by oneself to a predetermined matching candidate selected. When this aspect is adopted, it is advantageous in that the first personal information element to be provided can be limited. In the embodiment shown in FIG. 27, information about running is provided by dragging and dropping to matching candidates.
- points / currency such as points may be given to the individual user who is the provider from the external user who is the provider.
- 1000 points are provided from an external user to an individual user.
- the provision of the first personal information and the first personal information element to the second terminal device 100b of the external user may be performed via the block chain, or may be stored in the device storage unit 280 of the information processing device 200. You may be broken.
- the terminal control unit 110 may determine that the stress level of the individual user has increased from various information stored in the first terminal device 100a, and the result may be shown by the operation display unit 120 (FIG. 29). reference). Then, by running with the first terminal device 100a possessed or attached to the body, information about the actually running running is stored in the terminal storage unit 180 as the first personal information element. Such information about running may be used as matching as the first personal information, or may be used as the first personal information element that can be viewed by the second terminal device 100b.
- the matching is performed based on the first personal information, it becomes possible to provide the external user with highly accurate information that matches the requested information.
- the second personal information associated with the first personal information of the first terminal device 100a can be viewed on the second terminal device 100b, and the second matching unit 650 that performs matching based on the second personal information.
- the second matching unit 650 that performs matching based on the second personal information.
- Other configurations are the same as those of the first embodiment and the second embodiment. Any aspect described in the first embodiment and the second embodiment can be adopted. The members described in the first embodiment and the second embodiment will be described with reference to the same reference numerals.
- This embodiment is different from the second embodiment in that matching is performed using the second personal information whose particle size as personal information is reduced.
- the fact that the granularity of personal information is reduced means that the information is difficult to identify as an individual, for example, as described in the first embodiment, and the second personal information is referred to as the first personal information. It is information that is difficult to identify as an individual in comparison.
- the particle size of personal information can be specified by each user.
- the second matching unit 650 of the present embodiment is the same as that of the second embodiment, and the matching model may be generated by machine learning. Further, the second matching unit 650 may determine that the first personal information is matched when the requirements specified in the request information are satisfied.
- the external user can see the second personal information that can be browsed by himself or the like. It is useful in that the requested information can be issued by automatically selecting the second personal information by applying it to a predetermined model.
- the external user who can view the second personal information may be limited to the person designated by the user.
- Matching by the second matching unit 650 may be performed using the request information and the second personal information previously issued by the external user, as in the case of the first personal information in the second embodiment. Specifically, when the evaluation is equal to or higher than the threshold value as a result of the second matching unit 650 applying the certain request information and the certain second personal information issued in advance to the matching model, the certain request information and the second personal information are given. It may be determined that the personal information is matched. When it is determined that the matching is performed, the external user may display it as a matching candidate on the operation display unit 120 of the first terminal device 100a used by the individual user. The display mode, the first personal information, and the selection of the first personal information element can adopt the same mode as in the second embodiment.
- the second individual is referred to the second terminal device 100b of the external user who issued the certain request information.
- the information may be provided by the information processing apparatus.
- the external user can decide whether to formally request the first personal information corresponding to the second personal information.
- an external user formally requests the first personal information, that fact is input from a predetermined terminal such as the second terminal device 100b.
- the external user is displayed on the operation display unit 120 of the first terminal device 100a used by the individual user as a matching candidate. You may.
- the second matching unit 650 performs matching using the request information and the first personal information, and the first personal information is obtained with respect to the second terminal device 100b of the external user who has obtained an evaluation equal to or higher than the threshold value.
- the second personal information corresponding to the above may be provided.
- the external user may decide whether to formally request the first personal information corresponding to the second personal information.
- Each component including the conversion unit 130, the recording unit 160, the first matching unit 150, the terminal control unit 110, etc. of each of the above embodiments is a logic circuit (hardware) formed in an integrated circuit such as an IC chip or an LSI. ), A dedicated circuit, or software using a CPU, memory, or the like. Further, each component may be realized by one or a plurality of integrated circuits, and a plurality of components may be realized by one integrated circuit. Similarly, each component including the device control unit 210, the second matching unit 650, the device matching unit 250, etc. is realized by a logic circuit (hardware) or a dedicated circuit formed in an integrated circuit such as an IC chip or an LSI. It may be realized by software using a CPU, a memory and the like. Further, each component may be realized by one or a plurality of integrated circuits, and a plurality of components may be realized by one integrated circuit.
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Finance (AREA)
- Development Economics (AREA)
- General Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Economics (AREA)
- Marketing (AREA)
- Tourism & Hospitality (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Entrepreneurship & Innovation (AREA)
- Human Resources & Organizations (AREA)
- Computer Security & Cryptography (AREA)
- Bioethics (AREA)
- Primary Health Care (AREA)
- Game Theory and Decision Science (AREA)
- Databases & Information Systems (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Medical Informatics (AREA)
- Computer Hardware Design (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Educational Administration (AREA)
- Data Mining & Analysis (AREA)
- Technology Law (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Information Transfer Between Computers (AREA)
- Storage Device Security (AREA)
Priority Applications (4)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| JP2022503923A JP7313642B2 (ja) | 2020-08-06 | 2021-08-05 | 端末装置、情報処理システム及びプログラム |
| EP21854147.2A EP4195140A4 (en) | 2020-08-06 | 2021-08-05 | TERMINAL DEVICE, INFORMATION PROCESSING SYSTEM AND PROGRAM |
| US18/006,741 US20230297715A1 (en) | 2020-08-06 | 2021-08-05 | Terminal device, information processing system and program |
| JP2023109864A JP2023126889A (ja) | 2020-08-06 | 2023-07-04 | 端末装置、情報処理システム及びプログラム |
Applications Claiming Priority (4)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| JP2020134030 | 2020-08-06 | ||
| JP2020-134030 | 2020-08-06 | ||
| JP2021-039129 | 2021-03-11 | ||
| JP2021039129 | 2021-03-11 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2022030570A1 true WO2022030570A1 (ja) | 2022-02-10 |
Family
ID=80118081
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/JP2021/029064 Ceased WO2022030570A1 (ja) | 2020-08-06 | 2021-08-05 | 端末装置、情報処理システム及びプログラム |
Country Status (5)
| Country | Link |
|---|---|
| US (1) | US20230297715A1 (https=) |
| EP (1) | EP4195140A4 (https=) |
| JP (2) | JP7313642B2 (https=) |
| TW (1) | TWI880013B (https=) |
| WO (1) | WO2022030570A1 (https=) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP4345726A1 (en) | 2022-09-27 | 2024-04-03 | Fujitsu Limited | Information management program, information management method, information processing device, and information sharing system |
Families Citing this family (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| ES2918501T3 (es) * | 2013-12-19 | 2022-07-18 | Novartis Ag | Receptores de antígenos quiméricos de mesotelina humana y usos de los mismos |
Citations (9)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2000322440A (ja) * | 1999-05-13 | 2000-11-24 | Koji Kobayashi | 個人情報管理システム及び方法並びに個人情報管理プログラムを記録した記憶媒体 |
| JP2005115829A (ja) * | 2003-10-10 | 2005-04-28 | Keiogijuku | プライバシを考慮したパーソナライゼーションのためのシステム及び方法 |
| JP2009238067A (ja) * | 2008-03-28 | 2009-10-15 | Dainippon Printing Co Ltd | マッチングシステム及び個人情報管理装置 |
| JP2014238642A (ja) | 2013-06-06 | 2014-12-18 | 沖電気工業株式会社 | 個人情報保護装置および個人情報保護システム並びに個人情報保護方法およびプログラム |
| JP2015508534A (ja) * | 2011-12-28 | 2015-03-19 | インテル・コーポレーション | ネットワーク通信用のペルソナマネージャ |
| JP2019153130A (ja) * | 2018-03-05 | 2019-09-12 | 株式会社Luftホールディングス | データ管理システム及びデータ管理アプリケーション |
| JP2019200606A (ja) * | 2018-05-16 | 2019-11-21 | トヨタ自動車株式会社 | 乗合支援装置、乗合支援システム及び乗合支援方法 |
| JP2020052876A (ja) * | 2018-09-28 | 2020-04-02 | 富士通株式会社 | 情報処理プログラム、情報管理プログラム、装置、及び方法 |
| WO2020152842A1 (ja) * | 2019-01-25 | 2020-07-30 | 光伸 廣瀬 | 分散型台帳履歴書判定システム、分散型台帳履歴書判定方法及びプログラム |
Family Cites Families (11)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7613695B1 (en) * | 1999-12-06 | 2009-11-03 | Reed Elsevier Inc. | Relationship management system that provides an indication of users having a relationship with a specified contact |
| JP2006338587A (ja) | 2005-06-06 | 2006-12-14 | Hitachi Ltd | アクセス制御サーバ、利用者端末及び情報アクセス制御方法 |
| JP2009009468A (ja) | 2007-06-29 | 2009-01-15 | Csk Holdings Corp | 社会的自己形成補助装置及びそのためのプログラム |
| JP2013150026A (ja) | 2012-01-17 | 2013-08-01 | Mitsubishi Electric Corp | データ処理システム及び秘匿化装置及び秘密鍵生成装置及び秘匿化方法及び秘密鍵生成方法及びプログラム |
| WO2013109793A1 (en) * | 2012-01-18 | 2013-07-25 | Kinectus LLC | Systems and methods for establishing communications between mobile device users |
| WO2017222032A1 (ja) | 2016-06-22 | 2017-12-28 | 鍵和田 芳光 | 個人情報提供システム、方法及びプログラム |
| JP6998677B2 (ja) * | 2017-06-01 | 2022-01-18 | 株式会社野村総合研究所 | 端数資金振替蓄積システム |
| JP2020016987A (ja) | 2018-07-24 | 2020-01-30 | 富士通株式会社 | 情報処理プログラム、情報処理方法及び情報処理装置 |
| JP7272771B2 (ja) | 2018-09-25 | 2023-05-12 | Line株式会社 | サーバの通信方法、サーバ、サーバのプログラム、情報処理装置の通信方法、情報処理装置、情報処理装置のプログラム |
| KR102580881B1 (ko) * | 2018-11-08 | 2023-09-20 | 삼성전자주식회사 | 전자 장치, 그의 개인 정보 제공 방법 및 이를 기록한 컴퓨터 판독 가능 기록매체 |
| CN111404863A (zh) * | 2019-01-02 | 2020-07-10 | 中国移动通信有限公司研究院 | 一种数据处理方法及装置 |
-
2021
- 2021-08-05 WO PCT/JP2021/029064 patent/WO2022030570A1/ja not_active Ceased
- 2021-08-05 TW TW110128980A patent/TWI880013B/zh active
- 2021-08-05 JP JP2022503923A patent/JP7313642B2/ja active Active
- 2021-08-05 EP EP21854147.2A patent/EP4195140A4/en active Pending
- 2021-08-05 US US18/006,741 patent/US20230297715A1/en active Pending
-
2023
- 2023-07-04 JP JP2023109864A patent/JP2023126889A/ja active Pending
Patent Citations (9)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2000322440A (ja) * | 1999-05-13 | 2000-11-24 | Koji Kobayashi | 個人情報管理システム及び方法並びに個人情報管理プログラムを記録した記憶媒体 |
| JP2005115829A (ja) * | 2003-10-10 | 2005-04-28 | Keiogijuku | プライバシを考慮したパーソナライゼーションのためのシステム及び方法 |
| JP2009238067A (ja) * | 2008-03-28 | 2009-10-15 | Dainippon Printing Co Ltd | マッチングシステム及び個人情報管理装置 |
| JP2015508534A (ja) * | 2011-12-28 | 2015-03-19 | インテル・コーポレーション | ネットワーク通信用のペルソナマネージャ |
| JP2014238642A (ja) | 2013-06-06 | 2014-12-18 | 沖電気工業株式会社 | 個人情報保護装置および個人情報保護システム並びに個人情報保護方法およびプログラム |
| JP2019153130A (ja) * | 2018-03-05 | 2019-09-12 | 株式会社Luftホールディングス | データ管理システム及びデータ管理アプリケーション |
| JP2019200606A (ja) * | 2018-05-16 | 2019-11-21 | トヨタ自動車株式会社 | 乗合支援装置、乗合支援システム及び乗合支援方法 |
| JP2020052876A (ja) * | 2018-09-28 | 2020-04-02 | 富士通株式会社 | 情報処理プログラム、情報管理プログラム、装置、及び方法 |
| WO2020152842A1 (ja) * | 2019-01-25 | 2020-07-30 | 光伸 廣瀬 | 分散型台帳履歴書判定システム、分散型台帳履歴書判定方法及びプログラム |
Non-Patent Citations (1)
| Title |
|---|
| See also references of EP4195140A4 |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP4345726A1 (en) | 2022-09-27 | 2024-04-03 | Fujitsu Limited | Information management program, information management method, information processing device, and information sharing system |
| US12574391B2 (en) | 2022-09-27 | 2026-03-10 | Fujitsu Limited | Computer-readable recording medium storing information management program, information management method, information processing device, and information sharing system |
Also Published As
| Publication number | Publication date |
|---|---|
| JP7313642B2 (ja) | 2023-07-25 |
| EP4195140A1 (en) | 2023-06-14 |
| TW202207061A (zh) | 2022-02-16 |
| JP2023126889A (ja) | 2023-09-12 |
| JPWO2022030570A1 (https=) | 2022-02-10 |
| US20230297715A1 (en) | 2023-09-21 |
| TWI880013B (zh) | 2025-04-11 |
| EP4195140A4 (en) | 2024-08-21 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US20260024077A1 (en) | Crypto Wallet Configuration Data Retrieval | |
| US20250292235A1 (en) | Partitioned Address Spaces in Blockchain Wallets | |
| US20240346485A1 (en) | Sending secure proxy elements with mobile wallets | |
| US20240005327A1 (en) | User and entity authentication through an information storage and communication system | |
| US20210374736A1 (en) | Wireless based methods and systems for federated key management, asset management, and financial transactions | |
| CN100422988C (zh) | 以用户为中心的上下文知晓转换模型 | |
| CN110419044B (zh) | 信息处理装置和信息处理方法 | |
| US8239684B2 (en) | Software IC card system, management server, terminal, service providing server, service providing method, and program | |
| US20250285107A1 (en) | Cryptographically Enabling Characteristic Assignment to Identities with Tokens, Token Validity Assessments and State Capture Processes | |
| JP2005512234A6 (ja) | 顧客中心コンテキストアウェア切換モデル | |
| US20260004290A1 (en) | Information processing apparatus, program, method and terminal | |
| JP2013065255A (ja) | 情報処理装置、イベント制御方法およびイベント制御用プログラム | |
| US11182777B2 (en) | Systems and methods using a primary account number to represent identity attributes | |
| JP7568171B2 (ja) | アバター管理システム、アバター管理方法、及びプログラム | |
| JP2023126889A (ja) | 端末装置、情報処理システム及びプログラム | |
| JP2024146857A (ja) | 情報処理装置、プログラム、情報処理方法 | |
| WO2019063512A1 (en) | METHOD FOR GENERATING A DIGITAL IDENTITY, DIGITAL IDENTITY, METHOD FOR CREATING AN ELECTRONIC TRANSACTION DOCUMENT AND ELECTRONIC TRANSACTION DOCUMENT | |
| EP2194480A1 (en) | Device for management of personal data | |
| JP7832877B2 (ja) | 情報処理装置、情報処理方法及び情報処理プログラム | |
| KR102630981B1 (ko) | 액세스 카드 제공 방법 및 상기 방법을 수행하는 장치 | |
| JP2021163383A (ja) | ペイメントカード発行方法、ペイメントカード発行装置、及びペイメントカード発行プログラム | |
| KR102619036B1 (ko) | 액세스 카드 처리 방법 및 상기 방법을 수행하는 장치 | |
| KR102578596B1 (ko) | 메타버스를 이용한 자필서명 및 계약 체결 방법 및 시스템 | |
| US20260088999A1 (en) | System for providing blockchain-based mydata card | |
| US20250329098A1 (en) | User interface for interacting with human users |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| ENP | Entry into the national phase |
Ref document number: 2022503923 Country of ref document: JP Kind code of ref document: A |
|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 21854147 Country of ref document: EP Kind code of ref document: A1 |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 202347013755 Country of ref document: IN |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 2021854147 Country of ref document: EP |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| WWG | Wipo information: grant in national office |
Ref document number: 202347013755 Country of ref document: IN |