WO2022035012A1 - Serveur de certification d'authenticité de lingot d'or pour certifier l'authenticité d'une lingot d'or et son procédé de fonctionnement - Google Patents
Serveur de certification d'authenticité de lingot d'or pour certifier l'authenticité d'une lingot d'or et son procédé de fonctionnement Download PDFInfo
- Publication number
- WO2022035012A1 WO2022035012A1 PCT/KR2021/003514 KR2021003514W WO2022035012A1 WO 2022035012 A1 WO2022035012 A1 WO 2022035012A1 KR 2021003514 W KR2021003514 W KR 2021003514W WO 2022035012 A1 WO2022035012 A1 WO 2022035012A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- identification number
- terminal
- user
- gold bar
- auxiliary identification
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
Definitions
- the present invention relates to a gold bar genuine product authentication server for performing genuine product authentication for gold bars and an operating method thereof.
- a gold bar means a bar-shaped gold bar, and it has a luxurious image, so it is often used as a gift.
- the present invention intends to support the preservation of the value of the gold bar by providing a gold bar genuine product authentication server that performs genuine product authentication for gold bars based on the main identification number and the sub-type code assigned to the gold bars, and a method for operating the same.
- a gold bar genuine authentication server for performing genuine product authentication on a gold bar includes a plurality of preset gold bars - n (n is 2) for identifying each gold bar in each of the plurality of gold bars. More than a natural number) digit main identification number and k (k is a natural number greater than or equal to 2) digit secondary identification number for authenticating each gold bar are allocated, and information on the main identification number of each gold bar is provided to each of the plurality of gold bars A two-dimensional code is printed - each auxiliary identification number and a preset Euclidean Norm of each of the plurality of gold bars -
- the Euclidean norm is an n-digit main number assigned to each of the plurality of gold bars It has a size of nxk generated by calculating the Kronecker product between a column vector having n numbers constituting an identification number as a component and a row vector having k numbers constituting a k-digit auxiliary identification number as a component Means the Euclidean norm of a
- the operating method of the gold bar genuine product authentication server for performing genuine product authentication for gold bars includes a plurality of preset gold bars - each of the plurality of gold bars includes n (n is A primary identification number of 2 or more) digits and a secondary identification number of k (k is a natural number of 2 or more) digits for authenticating each gold bar are allocated, and each of the plurality of gold bars is assigned a primary identification number for each gold bar.
- a two-dimensional code with embedded information is printed -
- Each auxiliary identification number and a preset Euclidean norm of each of the plurality of gold bars is an n-digit main identification number assigned to each of the plurality of gold bars It means the Euclidean norm of a matrix having a size of nxk generated by calculating the Kronecker product between a column vector having n numbers constituting its components and a row vector having k numbers constituting k digits constituting an auxiliary identification number as components.
- the terminal of the first user who purchased the first gold bar which is one of the plurality of gold bars -
- the terminal of the first user is assigned to the first gold bar A first auxiliary identification number with a pre-stored - when a genuine product authentication request for the first gold bar is received from, requesting transmission of the auxiliary identification number for the first gold bar to the terminal of the first user, the
- the first auxiliary identification number pre-stored in the first user's terminal is received from the first user's terminal as the auxiliary identification number for the first gold bar
- the first user's terminal is printed on the first gold bar requesting transmission of a main identification number for the first gold bar inserted in the two-dimensional code, the two-dimensional code printed on the first gold bar is recognized by the terminal of the first user, and the main identification number of the first gold bar is recognized.
- the complex information storage unit extracting a first Euclidean norm corresponding to a first auxiliary identification number; when the first Euclidean norm is extracted, generating a first column vector having n numbers constituting the first main identification number as a component; After generating a first row vector having k numbers constituting the first auxiliary identification number as a component, a Kronecker product between the first column vector and the first row vector is calculated to generate a first operation matrix having a size of nxk After calculating the Euclidean norm of the first operation matrix, check whether the Euclidean norm of the first operation matrix is the same as the first Euclidean norm, so that the Euclidean norm of the first operation matrix is the same as the first Euclidean norm When it is confirmed that the first gold bar is genuine, the step of confirming that the first gold bar is genuine, and when it is confirmed that the first gold bar is genuine, a
- the present invention can support the preservation of the value of the gold bar by providing a gold bar genuine product authentication server that performs genuine product authentication for gold bars based on the main identification number and the sub-type code assigned to the gold bars, and a method for operating the same.
- FIG. 1 is a diagram showing the structure of a gold bar genuine authentication server according to an embodiment of the present invention.
- FIG. 2 is a view for explaining the operation of the gold bar genuine authentication server according to an embodiment of the present invention.
- FIG. 3 is a flowchart illustrating a method of operating a gold bar genuine authentication server according to an embodiment of the present invention.
- each of the components, functional blocks or means may be composed of one or more sub-components, and the electrical, electronic, and mechanical functions performed by each component are electronic.
- a circuit, an integrated circuit, an ASIC (Application Specific Integrated Circuit), etc. may be implemented as various well-known devices or mechanical elements, and may be implemented separately or two or more may be integrated into one.
- the blocks in the accompanying block diagram or steps in the flowchart are computer program instructions that are loaded in a processor or memory of equipment capable of data processing, such as a general-purpose computer, a special-purpose computer, a portable notebook computer, and a network computer, and perform specified functions.
- a processor or memory of equipment capable of data processing such as a general-purpose computer, a special-purpose computer, a portable notebook computer, and a network computer, and perform specified functions.
- these computer program instructions may be stored in a memory provided in a computer device or in a memory readable by a computer
- the functions described in the blocks of the block diagrams or the steps of the flowcharts are produced as articles of manufacture containing instruction means for performing the same. it might be
- each block or each step may represent a module, segment, or portion of code comprising one or more executable instructions for executing the specified logical function(s).
- FIG. 1 is a diagram showing the structure of a gold bar genuine authentication server according to an embodiment of the present invention.
- the gold bar genuine product authentication server 110 is a server that performs genuine product authentication for gold bars, and includes a complex information storage unit 111, a secondary identification number request unit 112, a main identification number request unit 113, and Euclid. It includes a gambling extracting unit 114 , a calculating unit 115 , a genuine product checking unit 116 , and a message transmitting unit 117 .
- n is a natural number greater than or equal to 2
- k is a natural number equal to or greater than 2
- a digit auxiliary identification number is allocated, and a two-dimensional code in which information on a main identification number of each gold bar is inserted is printed on each of the plurality of gold bars.
- a two-dimensional code 211 in which information about a main identification number assigned to each gold bar is printed may be printed on the surface 210 of each of the plurality of gold bars.
- the two-dimensional code 211 may be a QR code (Quick Response Code) or Veri Code.
- the auxiliary identification number of each of the plurality of gold bars and the preset Euclidean norm corresponding to each of the plurality of gold bars are mutually Correspondingly stored.
- the Euclidean norm is a column vector having n numbers constituting an n-digit main identification number assigned to each of the plurality of gold bars as components, and k numbers constituting a k-digit auxiliary identification number as components. It means the Euclidean norm of a matrix having a size of nxk generated by calculating the Kronecker product between row vectors.
- the Euclidean norm is an L2 norm for indicating the size of a vector or matrix, and may be calculated according to Equation 1 below.
- Equation 1 denotes the Euclidean norm
- x i denotes the i-th component included in a vector or matrix.
- the Kronecker product refers to a matrix that specifically expresses the tensor product of two matrices. Assuming that a matrix M of mxn as in Equation 2 below and a matrix N of pxq as in Equation 3 below are given, the matrix The Kronecker product between M and the matrix N can be expressed as Equation 4 below.
- the 5-digit auxiliary identification number and the Euclidean norm may be stored in correspondence with each other in the complex information storage unit 111 as shown in Table 1 below.
- the auxiliary identification number requesting unit 112 receives the activation request for the first gold bar from the terminal 130 of the first user who has purchased the first gold bar, which is one of the plurality of gold bars.
- the terminal 130 requests transmission of an auxiliary identification number for the first gold bar.
- the first auxiliary identification number assigned to the first gold bar may be pre-stored in the terminal 130 of the first user.
- the user may be given an auxiliary identification number assigned to the corresponding gold bar for use in authenticating the corresponding gold bar, and the auxiliary identification number may be stored in a user terminal owned by the user.
- the auxiliary identification number requesting unit 112 receives the activation request for the first gold bar from the terminal 130 of the first user who purchased the first gold bar from among the plurality of gold bars.
- the terminal 130 may request transmission of an auxiliary identification number for the first gold bar.
- the first user's terminal 130 requests transmission of the auxiliary identification number for the first gold bar from the gold bar genuine authentication server 110 , the first user's terminal 130 is pre-stored in the first user's terminal 130 .
- the auxiliary identification number for the gold bar may be transmitted to the gold bar genuine authentication server 110 .
- the main identification number requesting unit 113 When the main identification number requesting unit 113 receives the first auxiliary identification number stored in advance in the terminal 130 of the first user as the auxiliary identification number for the first gold bar from the terminal 130 of the first user, , requests the first user's terminal 130 to transmit the main identification number for the first gold bar inserted in the two-dimensional code printed on the first gold bar.
- the second user mounted on the terminal 130 of the first user A two-dimensional code printed on the first gold bar may be recognized through a dimension code recognizer, and a main identification number for the first gold bar may be extracted from the two-dimensional code. If the first primary identification number is extracted as the primary identification number for the first gold bar, the first user's terminal 130 may transmit the first primary identification number to the gold bar genuine authentication server 110 .
- the Euclidean norm extracting unit 114 is a first Euclidean norm corresponding to the first auxiliary identification number from the complex information storage unit 111 .
- the operation unit 115 when the first Euclidean norm is extracted by the Euclidean norm extraction unit 114, the operation unit 115 generates a first column vector having n numbers constituting the first main identification number as a component, and the After generating a first row vector having k numbers constituting the first auxiliary identification number as a component, a Kronecker product between the first column vector and the first row vector is calculated to generate a first operation matrix having a size of nxk. .
- the authenticity check unit 116 checks whether the Euclidean norm of the first operation matrix is the same as the first Euclidean norm, so that the Euclidean norm of the first operation matrix is the first 1 When it is confirmed that it is the same as the Euclid norm, it is confirmed that the first gold bar is genuine.
- the first main identification number for the first gold bar received from the terminal 130 of the first user is '321123', and the Assume that the first auxiliary identification number is '12321'.
- the Euclidean norm extraction unit 114 may extract the first Euclidean norm 'N1' corresponding to the first auxiliary identification number '12321' from the complex information storage unit 111 as shown in Table 1 above.
- the calculating unit 115 has the first six numbers constituting the first main identification number '321123' as components. 1 as a column vector ' ' as a first row vector having five numbers constituting '12321', which is the first auxiliary identification number, as components. ' can be created.
- the operation unit 115 calculates the Kronecker product between the first column vector and the first row vector according to Equations 2 to 4, so that the first operation matrix ' having a size of 6 x 5 ' ' can be created.
- the authenticity check unit 116 calculates the Euclidean norm of the first arithmetic matrix as '23.06' according to Equation 1, and then '23.06', which is the Euclidean norm of the first arithmetic matrix, is calculated as the first
- the first main identification number '321123' included in the two-dimensional code printed on the first gold bar was normally issued. Since it can be seen that the main identification number is correct, the first gold bar can be identified as a genuine product.
- the message transmission unit 117 when the first gold bar is confirmed as genuine by the genuine product check unit 116, the message transmission unit 117 generates a genuine product authentication message indicating that the first gold bar is genuine, and generates a genuine product authentication message to the first user. It is transmitted to the terminal 130 of
- the authenticity check unit 116 determines that the first gold bar is not genuine. can be confirmed as
- the message transmitting unit 117 may transmit a non-genuine confirmation message indicating that the first gold bar is not genuine to the terminal 130 of the first user. .
- the gold bar genuine authentication server 110 includes an update event generating unit 118 , a new auxiliary identification number generating unit 119 , an operation processing unit 120 , an update unit 121 , and a replacement request unit. (122) may be further included.
- the update event generator 118 generates an update event for changing the first auxiliary identification number and the first Euclidean norm when the activation message is transmitted to the terminal 130 of the first user.
- the new auxiliary identification number generator 119 randomly generates a k-digit first new auxiliary identification number for the first gold bar.
- the operation processing unit 120 When the first new auxiliary identification number is randomly generated, the operation processing unit 120 generates a second column vector having n numbers constituting the first main identification number as a component, and the first new auxiliary identification number After generating a second row vector having k numbers constituting as components, a Kronecker product between the second column vector and the second row vector is calculated to generate a second operation matrix having a size of nxk.
- the update unit 121 After calculating the Euclidean norm of the second operation matrix, the update unit 121 changes the first Euclidean norm stored in the complex information storage unit 111 to the Euclidean norm of the second operation matrix, and stores the complex information The first auxiliary identification number stored in the unit 111 is changed to the first new auxiliary identification number.
- the replacement request unit 122 transmits the first new auxiliary identification number to the terminal 130 of the first user, and at the same time transmits the first auxiliary identification number stored in the terminal 130 of the first user to the first user. 1 A replacement command instructing to be replaced with a new auxiliary identification number and stored is transmitted to the terminal 130 of the first user.
- the first main identification number is '321123'
- the first auxiliary identification number is '12321'
- the second 1 Assume that the Euclidean norm is 'N1'.
- the update event generation unit 118 sets the first auxiliary identification number '12321' and the first Euclid An update event to change the norm 'N1' may be generated.
- the new auxiliary identification number generating unit 119 may randomly generate a first new auxiliary identification number of five digits for the first gold bar. .
- the operation processing unit 120 configures the first main identification number '321123' As a second column vector with 6 numbers as components, ' ' as a second row vector having five numbers constituting '10101', which is the first new auxiliary identification number, as a component. ' can be created.
- the operation processing unit 120 calculates the Kronecker product between the second column vector and the second row vector according to Equations 2 to 4, thereby forming a second operation matrix having a size of 6 ⁇ 5 ' ' can be created.
- the update unit 121 calculates the Euclidean norm of the second operation matrix as '9.16' according to Equation 1, and then stores the first stored in the complex information storage unit 111 as shown in Table 1 above.
- the Euclidean norm 'N1' is changed to '9.16', which is the Euclidean norm of the second operation matrix, as shown in Table 2 below, and the first auxiliary stored in the complex information storage unit 111 as shown in Table 1 above.
- the identification number '12321' may be changed to '10101', the first new auxiliary identification number, as shown in Table 2 below.
- the replacement request unit 122 transmits '10101', which is the first new auxiliary identification number, to the terminal 130 of the first user, and at the same time, the second stored in the terminal 130 of the first user.
- the first auxiliary identification number '12321' may be replaced with '10101', which is the first new auxiliary identification number, and a replacement command instructing to be stored may be transmitted to the terminal 130 of the first user.
- the first auxiliary identification number is replaced with the first new auxiliary identification number in the terminal 130 of the first user, and if the first user uses the terminal 130 of the first user
- the gold bar genuine product authentication server 110 according to the present invention receives the information from the terminal 130 of the first user.
- the Kronecker product between the column vector according to the first main identification number and the row vector according to the first new auxiliary identification number is calculated, , by comparing whether the Euclidean norm of the calculated value is the same as the new Euclidean norm corresponding to the first new auxiliary identification number stored in the complex information storage unit 111, the activation process for the first gold bar can be re-performed there is.
- the gold bar genuine authentication server 110 may further include a configuration for supporting the transfer of gold bars between users.
- the gold bar genuine authentication server 110 according to the present invention includes a terminal information requesting unit 123 , a requesting unit 124 , a generating unit 125 , an operation matrix generating unit 126 , an update processing unit 127 and It may further include a transmitter 128 .
- the terminal information request unit 123 When a transfer processing command for transferring the first gold bar to the second user is received from the terminal 130 of the first user, the terminal information request unit 123 sends the terminal 130 of the first user to the terminal of the second user. Requests terminal information for (140).
- the first user's terminal 130 transmits the terminal information about the second user's terminal 140 to the gold bar genuine product. It can be transmitted to the authentication server 110 .
- the request unit 124 When terminal information on the terminal 140 of the second user is received from the terminal 130 of the first user, the request unit 124 establishes a communication connection with the terminal 140 of the second user based on the terminal information. When an attempt is made and a communication connection is established with the terminal 140 of the second user, the main identification number for the first gold bar is inserted into the two-dimensional code printed on the first gold bar by the terminal 140 of the second user. request the transmission of
- the second user requests transmission of the primary identification number for the first gold bar from the gold bar genuine authentication server 110 to the second user's terminal 140 .
- the 2 installed in the second user's terminal 140 A two-dimensional code printed on the first gold bar may be recognized through a dimension code recognizer, and a main identification number for the first gold bar may be extracted from the two-dimensional code. If the first primary identification number is extracted as the primary identification number for the first gold bar, the second user's terminal 140 may transmit the first primary identification number to the gold bar genuine authentication server 110 . .
- the gold bar genuine authentication server 110 from the second user's terminal 140
- the generator 125 randomly generates a second new auxiliary identification number of k digits for the first gold bar.
- the operation matrix generation unit 126 When the second new auxiliary identification number is randomly generated, the operation matrix generation unit 126 generates a third column vector having n numbers constituting the first main identification number as a component, and the second new auxiliary identification number is generated. After generating a third row vector having k numbers constituting an identification number as a component, a Kronecker product between the third column vector and the third row vector is calculated to generate a third operation matrix having a size of nxk.
- the update processing unit 127 calculates the Euclidean norm of the third operation matrix, then changes the first Euclidean norm stored in the complex information storage unit 111 to the Euclidean norm of the third operation matrix, and stores the complex information
- the first auxiliary identification number stored in the unit 111 is changed to the second new auxiliary identification number.
- the transmission unit 128 transmits the second new auxiliary identification number to the terminal 140 of the second user, and at the same time uses the second new auxiliary identification number as an auxiliary identification number for the first gold bar of the second user.
- a storage command instructing the terminal 140 to be stored is transmitted to the terminal 140 of the second user.
- the first main identification number for the first gold bar received from the terminal 140 of the second user is '321123'. It is assumed that the first auxiliary identification number is '12321' and the first Euclidean norm is 'N1'.
- the generator 125 may randomly generate a 5-digit second new auxiliary identification number for the first gold bar.
- the operation matrix generation unit 126 may generate six As a third column vector with numbers as components ' ' as a third row vector having five numbers constituting '20002', which is the second new auxiliary identification number, as a component. ' can be created.
- the update processing unit 127 calculates the Kronecker product between the third column vector and the third row vector according to Equations 2 to 4, so that the third operation matrix ' having a size of 6 x 5' ' can be created.
- the update processing unit 127 calculates the Euclidean norm of the third operation matrix as '14.96' according to Equation 1, and then the first stored in the complex information storage unit 111 as shown in Table 1 above. 1, the Euclidean norm 'N1' is changed to '14.96', the Euclidean norm of the third operation matrix, as shown in Table 3 below, and the first auxiliary stored in the complex information storage unit 111 as shown in Table 1 above.
- the identification number '12321' may be changed to '20002', the second new auxiliary identification number, as shown in Table 3 below.
- the transmitting unit 128 transmits the second new auxiliary identification number '20002' to the terminal 140 of the second user and simultaneously transmits the second new auxiliary identification number '20002' to the first user.
- a storage command instructing to be stored in the terminal 140 of the second user as the auxiliary identification number for the gold bar may be transmitted to the terminal 140 of the second user.
- the second new auxiliary identification number is stored in the second user's terminal 140 , and if the second user receives the first gold bar and then uses the second user's terminal 140 to view it
- the gold bar genuine product authentication server 110 according to the present invention receives the first product from the terminal 140 of the second user.
- the activation process for the first gold bar After receiving the first main identification number included in the two-dimensional code printed on 1 gold bar, calculating the Kronecker product between the column vector according to the first main identification number and the row vector according to the second new auxiliary identification number, By comparing whether the Euclidean norm of the calculated value is the same as the new Euclidean norm corresponding to the second new auxiliary identification number stored in the complex information storage unit 111, the activation process for the first gold bar can be performed. .
- the gold bar genuine authentication server 110 may further include a deletion command transmission unit 129 .
- the deletion command transmitting unit 129 transmits the second new auxiliary identification number to the second user's terminal 140 and at the same time the storage command is transmitted to the second user's terminal 140, the first user's terminal A deletion command instructing to delete the first auxiliary identification number stored in 130 is transmitted to the terminal 130 of the first user.
- the deletion command transmitting unit 129 transmits the second new auxiliary identification number '20002' to the second user's terminal 140 by the transmitting unit 128 and simultaneously transmits the storage
- a deletion command instructing to delete the first auxiliary identification number '12321' stored in the terminal 130 of the first user is transmitted to the terminal of the first user ( 130) can be transmitted.
- the first auxiliary identification number is deleted from the terminal 130 of the first user.
- FIG. 3 is a flowchart illustrating an operation method of a gold bar genuine product authentication server performing genuine product authentication for a gold bar according to an embodiment of the present invention.
- a plurality of gold bars in each of the plurality of gold bars, n (n is a natural number of 2 or more) digit main identification number for identifying each gold bar and k (k is 2 or more) for authenticating each gold bar
- n is a natural number of 2 or more
- k is 2 or more
- a two-dimensional code in which information on the main identification number of each gold bar is inserted is printed on each of the plurality of gold bars) each auxiliary identification number and the plurality of gold bars
- Each preset Euclidean norm is a column vector having as components n numbers constituting an n-digit main identification number assigned to each of the plurality of gold bars, and k constituting a k-digit auxiliary identification number It maintains a complex information storage unit in which the Euclidean norm of a matrix having a size of nxk generated by calculating the Kronecker product between row vectors having numbers as components) corresponds to each other and is stored.
- step S320 the terminal of the first user who purchased the first gold bar which is one of the plurality of gold bars (the first user's terminal stores the first auxiliary identification number assigned to the first gold bar in advance, When a genuine product authentication request for the first gold bar is received from ), a request is made to transmit an auxiliary identification number for the first gold bar to the terminal of the first user.
- step S330 when the first auxiliary identification number pre-stored in the first user's terminal is received as the auxiliary identification number for the first gold bar from the first user's terminal, it is transmitted to the first user's terminal. It requests transmission of the main identification number for the first gold bar, which is inserted in the two-dimensional code printed on the first gold bar.
- step S340 the two-dimensional code printed on the first gold bar is recognized by the terminal of the first user and the first main identification number that is the main identification number of the first gold bar is extracted, so that the terminal of the first user When the first main identification number is received from , a first Euclidean norm corresponding to the first auxiliary identification number is extracted from the composite information storage unit.
- step S350 when the first Euclidean norm is extracted, a first column vector having n numbers constituting the first main identification number as components is generated, and k numbers constituting the first auxiliary identification number After generating a first row vector having as components, a Kronecker product between the first column vector and the first row vector is calculated to generate a first operation matrix having a size of nxk.
- step S360 after calculating the Euclidean norm of the first operation matrix, it is checked whether the Euclidean norm of the first operation matrix is the same as the first Euclidean norm, so that the Euclidean norm of the first operation matrix is the first Euclidean norm If it is confirmed that it is the same as , it is confirmed that the first gold bar is genuine.
- step S370 when it is confirmed that the first gold bar is genuine, a genuine product authentication message indicating that the first gold bar is genuine is generated and transmitted to the terminal of the first user.
- the Euclidean norm of the first operation matrix is not the same as the first Euclidean norm in step S360, it can be confirmed that the first gold bar is not genuine. there is.
- a non-genuine confirmation message indicating that the first gold bar is not genuine may be transmitted to the terminal of the first user.
- the operating method of the gold bar activation server is to change the first auxiliary identification number and the first Euclidean norm when the activation message is transmitted to the first user's terminal.
- the first user when a transfer processing command for transferring the first gold bar to the second user is received from the terminal of the first user, the first user requesting terminal information on the terminal of the second user from a terminal of, when terminal information on the terminal of the second user is received from the terminal of the first user, based on the terminal information of the second user
- a communication connection is attempted with a terminal and a communication connection is established with the terminal of the second user, a note about the first gold bar inserted in the two-dimensional code printed on the first gold bar to the terminal of the second user requesting the transmission of an identification number, as the two-dimensional code printed on the first gold bar is recognized by the terminal of the second user and the first main identification number is extracted, the first from the terminal of the second user
- the primary identification number is received, randomly generating a second new secondary identification number of k digits for the first gold bar; when the second new secondary identification number is randomly generated, the first primary identification number is configured After generating
- the second new auxiliary identification number is transmitted to the second user's terminal and, at the same time, the storage command is transmitted to the second user's terminal
- the method may further include transmitting a deletion command instructing to delete the first auxiliary identification number stored in the terminal of the first user to the terminal of the first user.
- the operation method of the gold bar genuine authentication server according to an embodiment of the present invention has been described with reference to FIG. 3 .
- the operation method of the gold bar genuine authentication server according to an embodiment of the present invention may correspond to the configuration of the operation of the gold bar genuine authentication server 110 described with reference to FIGS. 1 and 2 , a more detailed description thereof is to be omitted.
- the operating method of the gold bar genuine authentication server may be implemented as a computer program stored in a storage medium for execution through combination with a computer.
- the operating method of the gold bar genuine authentication server may be implemented in the form of a program command that can be executed through various computer means and recorded in a computer readable medium.
- the computer-readable medium may include program instructions, data files, data structures, etc. alone or in combination.
- the program instructions recorded on the medium may be specially designed and configured for the present invention, or may be known and available to those skilled in the art of computer software.
- Examples of the computer-readable recording medium include magnetic media such as hard disks, floppy disks and magnetic tapes, optical media such as CD-ROMs and DVDs, and magnetic such as floppy disks.
- - includes magneto-optical media, and hardware devices specially configured to store and execute program instructions, such as ROM, RAM, flash memory, and the like.
- Examples of program instructions include not only machine language codes such as those generated by a compiler, but also high-level language codes that can be executed by a computer using an interpreter or the like.
Landscapes
- Business, Economics & Management (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Development Economics (AREA)
- Accounting & Taxation (AREA)
- Economics (AREA)
- Finance (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Entrepreneurship & Innovation (AREA)
Abstract
L'invention concerne un serveur de certification d'authenticité de lingot d'or pour certifier l'authenticité d'un lingot d'or, et son procédé de fonctionnement. La présente invention concerne une technologie qui peut aider à préserver la valeur d'un lingot d'or par la certification de l'authenticité du lingot d'or sur la base d'un numéro d'identification principal et d'un numéro d'identification auxiliaire attribué au lingot d'or.
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR10-2020-0101655 | 2020-08-13 | ||
KR20200101655 | 2020-08-13 | ||
KR10-2020-0169209 | 2020-12-07 | ||
KR1020200169209A KR102302948B1 (ko) | 2020-08-13 | 2020-12-07 | 골드바에 대한 정품 인증을 수행하는 골드바 정품 인증 서버 및 그 동작 방법 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2022035012A1 true WO2022035012A1 (fr) | 2022-02-17 |
Family
ID=77926630
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/KR2021/003514 WO2022035012A1 (fr) | 2020-08-13 | 2021-03-22 | Serveur de certification d'authenticité de lingot d'or pour certifier l'authenticité d'une lingot d'or et son procédé de fonctionnement |
Country Status (2)
Country | Link |
---|---|
KR (1) | KR102302948B1 (fr) |
WO (1) | WO2022035012A1 (fr) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2013134515A (ja) * | 2011-12-26 | 2013-07-08 | Nisemono Shikibetsu Gijutsu Kenkyusho:Kk | 複製不可能な識別マークと情報コードによる物品の真贋判定方法 |
KR101420361B1 (ko) * | 2012-07-17 | 2014-07-21 | 석인수 | 큐알코드를 이용한 정품인증시스템과 방법 및 그를 실행하기 위한 프로그램이 기록되는 컴퓨터로 읽을 수 있는 기록매체 |
KR20170132291A (ko) * | 2015-09-24 | 2017-12-01 | 구글 엘엘씨 | 빠른 직교 투영 |
KR20180131046A (ko) * | 2017-05-31 | 2018-12-10 | 권형석 | 상품의 결제 식별 코드를 이용한 모바일 품질보증서 관리 시스템 및 방법. |
KR102062771B1 (ko) * | 2019-04-08 | 2020-01-06 | (주)유비펀 | 위치 정보를 기초로 오프라인 가맹점에 대한 상품 정보 제공 및 가상통화 기반의 결제 처리를 지원하는 결제 서비스 장치 및 그 동작 방법 |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101839348B1 (ko) * | 2016-07-13 | 2018-03-22 | 주식회사 비케이소프트 | 개인키 기반의 위조품 발견시스템, 방법 및 프로그램 |
-
2020
- 2020-12-07 KR KR1020200169209A patent/KR102302948B1/ko active IP Right Grant
-
2021
- 2021-03-22 WO PCT/KR2021/003514 patent/WO2022035012A1/fr active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2013134515A (ja) * | 2011-12-26 | 2013-07-08 | Nisemono Shikibetsu Gijutsu Kenkyusho:Kk | 複製不可能な識別マークと情報コードによる物品の真贋判定方法 |
KR101420361B1 (ko) * | 2012-07-17 | 2014-07-21 | 석인수 | 큐알코드를 이용한 정품인증시스템과 방법 및 그를 실행하기 위한 프로그램이 기록되는 컴퓨터로 읽을 수 있는 기록매체 |
KR20170132291A (ko) * | 2015-09-24 | 2017-12-01 | 구글 엘엘씨 | 빠른 직교 투영 |
KR20180131046A (ko) * | 2017-05-31 | 2018-12-10 | 권형석 | 상품의 결제 식별 코드를 이용한 모바일 품질보증서 관리 시스템 및 방법. |
KR102062771B1 (ko) * | 2019-04-08 | 2020-01-06 | (주)유비펀 | 위치 정보를 기초로 오프라인 가맹점에 대한 상품 정보 제공 및 가상통화 기반의 결제 처리를 지원하는 결제 서비스 장치 및 그 동작 방법 |
Also Published As
Publication number | Publication date |
---|---|
KR102302948B1 (ko) | 2021-09-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2018030707A1 (fr) | Système et procédé d'authentification, et équipement d'utilisateur, serveur d'authentification, et serveur de service pour exécuter ledit procédé | |
WO2021010766A1 (fr) | Dispositif et procédé d'authentification électronique faisant appel à une chaîne de blocs | |
WO2020171538A1 (fr) | Dispositif électronique et procédé de fourniture de service de signature numérique de chaîne de blocs utilisant ce dernier | |
WO2018194379A1 (fr) | Procédé d'approbation de l'utilisation d'une carte à l'aide d'un identificateur de jeton sur la base d'une chaîne de blocs et structure en arbre de merkle associée à celui-ci, et serveur l'utilisant | |
WO2018124857A1 (fr) | Procédé et terminal d'authentification sur la base d'une base de données de chaînes de blocs d'un utilisateur sans face-à-face au moyen d'un id mobile, et serveur utilisant le procédé et le terminal | |
WO2020204444A2 (fr) | Procédé de sécurité par clé secrète consistant en la distribution et le stockage de clé dans un noeud de chaîne de blocs et/ou un dispositif personnel renfermant une application portefeuille installée | |
WO2013157864A1 (fr) | Procédé d'authentification d'utilisateur à l'aide d'une icône combinée à un motif d'entrée, et dispositif d'entrée de mot de passe | |
WO2020246706A1 (fr) | Dispositif de gestion d'informations de document à base de chaîne de blocs pour garantir la fiabilité d'un document et son procédé de fonctionnement | |
WO2021137396A1 (fr) | Procédé de service de certificat basé sur une preuve à connaissance nulle utilisant un réseau de chaîne de blocs, serveur de support de certification l'utilisant et terminal utilisateur l'utilisant | |
WO2018124856A1 (fr) | Procédé et terminal d'authentification d'un utilisateur au moyen d'un id mobile grâce à une base de données de chaînes de blocs, et serveur utilisant le procédé et le terminal | |
WO2023038242A1 (fr) | Serveur d'opération de service de métavers à base de chaîne de blocs pour le fonctionnement d'un service de métavers capable de fournir, dans un environnement de métavers, un article associé à un produit réel par l'intermédiaire d'une liaison avec un code bidimensionnel imprimé sur un produit réel, et son procédé de fonctionnement | |
WO2021241821A1 (fr) | Serveur de service de gestion de lingots d'or basé sur une chaîne de blocs et son procédé de fonctionnement pour prendre en charge la certification d'authenticité et des transactions de lingots d'or sur lesquels est imprimée une image protégée par le droit d'auteur | |
WO2016085062A1 (fr) | Procédé d'authentification par carte d'authentification nfc | |
WO2022250213A1 (fr) | Appareil de terminal mobile pour effectuer une authentification vocale d'appelant lorsqu'un appel est connecté, et son procédé de fonctionnement | |
WO2019198849A1 (fr) | Passeport mobile, système de production de passeport mobile permettant de produire celui-ci, et procédé de certification de passeport mobile | |
WO2023013861A1 (fr) | Procédé et dispositif de gestion de jetons non fongibles pour contenu numérique | |
WO2021172668A1 (fr) | Système d'authentification de premier détenteur de droits d'auteur utilisant une chaîne de blocs, et procédé associé | |
WO2021101020A1 (fr) | Serveur de traitement d'une médiation d'investissement immobilier sur la base d'un jeton de sécurité et procédé de fonctionnement associé | |
WO2020032351A1 (fr) | Procédé permettant d'établir une identité numérique anonyme | |
WO2015069028A1 (fr) | Authentification multicanal, procédé de transfert financier et système utilisant un terminal de communication mobile | |
AU2021333448A1 (en) | Method for mediating virtual asset transmission | |
WO2021107195A1 (fr) | Système de partage d'identité d'utilisateur mettant en œuvre une plateforme de sécurité à dispositif d'enregistrement électronique partagé pour service d'actifs virtuels | |
WO2022035012A1 (fr) | Serveur de certification d'authenticité de lingot d'or pour certifier l'authenticité d'une lingot d'or et son procédé de fonctionnement | |
WO2022203199A1 (fr) | Serveur de gestion de données de contenu susceptible de stocker et de gérer des données de contenu par interfonctionnement avec un code bidimensionnel inséré dans un produit en métal précieux, et son procédé de fonctionnement | |
WO2022186504A1 (fr) | Serveur d'authentification de produit authentique de métal précieux permettant d'effectuer une authentification de produit authentique d'un produit de métal précieux sur la base d'un code bidimensionnel, et procédé de mise en œuvre associé |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 21856021 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 21856021 Country of ref document: EP Kind code of ref document: A1 |