WO2024025030A1 - Système pour prouver la propriété d'une signature privée par émission de nft pour des données de signature privée - Google Patents
Système pour prouver la propriété d'une signature privée par émission de nft pour des données de signature privée Download PDFInfo
- Publication number
- WO2024025030A1 WO2024025030A1 PCT/KR2022/012279 KR2022012279W WO2024025030A1 WO 2024025030 A1 WO2024025030 A1 WO 2024025030A1 KR 2022012279 W KR2022012279 W KR 2022012279W WO 2024025030 A1 WO2024025030 A1 WO 2024025030A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- nft
- user terminal
- data
- user
- personal signature
- Prior art date
Links
- 238000012546 transfer Methods 0.000 abstract description 2
- 238000000034 method Methods 0.000 description 15
- 238000010586 diagram Methods 0.000 description 12
- 238000012545 processing Methods 0.000 description 10
- 230000008569 process Effects 0.000 description 9
- 238000004891 communication Methods 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 3
- 238000012795 verification Methods 0.000 description 3
- 230000009471 action Effects 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- YSCNMFDFYJUPEF-OWOJBTEDSA-N 4,4'-diisothiocyano-trans-stilbene-2,2'-disulfonic acid Chemical compound OS(=O)(=O)C1=CC(N=C=S)=CC=C1\C=C\C1=CC=C(N=C=S)C=C1S(O)(=O)=O YSCNMFDFYJUPEF-OWOJBTEDSA-N 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 230000003247 decreasing effect Effects 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000005728 strengthening Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/101—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measures for digital rights management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
- H04L9/3213—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
Definitions
- the present invention relates to a system for proving ownership of personal signature data through the issuance of NFT for personal signature data. More specifically, the present invention proves ownership by issuing an NFT for personal signature data (image data) based on a private key combined with the user's biometric information, and stores the original data of the personal signature in storage that the user can control. It relates to a system for proving ownership of personal signatures through the issuance of NFTs for personal signature data that can be used by receiving the original data of the signature stored in storage when performing actions such as electronic signatures.
- Blockchain refers to a data distribution processing technology that distributes and stores all data subject to management by all users participating in the network. It is also called 'Distributed Ledger Technology (DLT)' or 'Public Transaction Ledger' in that the ledger containing transaction information is not held by the transaction subject or a specific institution, but is shared by all network participants.
- DLT distributed Ledger Technology
- Blockchain is a name given to a chain of blocks containing transaction information. This blockchain is a technology to prevent hacking such as forgery and falsification of transaction details. It sends transaction details to all users participating in the transaction and compares them for each transaction to prevent data forgery.
- Blockchain has decentralization as its core concept, moving away from the existing financial system in which all transactions are secured and managed by financial institutions and oriented toward P2P (Peer to Peer) transactions.
- P2P refers to a communication network that connects personal computers without a server or client, and each connected computer acts as a server and client and shares information.
- a digital trust relationship is formed through multiple nodes sharing and verifying the same data. This environment makes it possible to implement smart contracts that can conveniently conclude and modify contracts through P2P without an intermediary.
- the present invention seeks to propose a system that can prove ownership of a user's personal signature data by issuing an NFT for the personal signature data based on a private key combined with biometric information.
- the technical problem that the present invention aims to solve is to prove ownership by issuing an NFT based on a private key combined with the user's biometric information regarding personal signature data that has the possibility of being stolen, and to store the original personal signature in storage that the user can control. It provides a system for proving ownership of personal signatures through the issuance of NFTs for personal signature data that can store the data and then receive the original data of the personal signature when necessary to perform an electronic signature.
- the system for proving ownership of a personal signature through the issuance of NFT for personal signature data receives information input from the user for an encryption code combining user biometric information and a DID-based private key.
- a user terminal that restores the private key using biometric information receives a request for issuing an NFT for personal signature data based on the private key from the user terminal, issues and stores the NFT, and sends the issued NFT to the user. It includes a blockchain transmitted to the terminal, and a DIDH server that receives original data of a personal signature signed using the private key from the user terminal and stores the original data.
- the user terminal may request the original data from the DIDH server and receive the original data stored in the DIDH server.
- the user terminal requests the original data after signing using the private key when requesting the original data to the DIDH server, and the DIDH server authenticates the request with Verifiable Credential (VC).
- the original data can be transmitted to the user terminal.
- the user terminal may transmit electronic signature information to the service providing server using the original data received from the DIDH server and the NFT stored in the user terminal.
- ownership of the user's personal signature data can be proven by issuing an NFT for the personal signature data (image data) based on a private key combined with the user's biometric information.
- the original data of the personal signature is stored in a storage accessible only to the user, and the original data of the personal signature can be used when necessary, making storage convenient.
- the original data of the personal signature is stored in a storage accessible only to the user, the possibility of data theft for personal authentication is reduced and security can be improved.
- Figure 1 is a diagram showing a distributed processing system using blockchain to which the technical idea according to the present invention can be applied.
- Figures 2 and 3 are block diagrams showing the connection of blocks used in a blockchain system.
- Figure 4 is a block diagram schematically showing the configuration of a system for proving ownership of personal signatures through issuance of NFT for personal signature data according to an embodiment of the present invention.
- Figure 5 is a diagram illustrating the NFT issuance process in the personal signature ownership certification system according to an embodiment of the present invention.
- Figure 6 is a diagram illustrating the process of performing an electronic signature in the personal signature ownership certification system according to an embodiment of the present invention.
- Figure 7 is a configuration diagram of a node computing device according to an embodiment of the present invention.
- Figure 1 is a diagram showing a distributed processing system using blockchain to which the technical idea according to the present invention can be applied.
- a distributed processing system using blockchain is a distributed network system consisting of a plurality of nodes (110 to 170).
- the nodes 110 to 170 constituting the distributed network 100 may be electronic devices with computing capabilities, such as computers, mobile terminals, and dedicated electronic devices.
- the distributed network 100 can store and reference information commonly known to all participating nodes within a connected bundle of blocks called a blockchain.
- the nodes 110 to 170 are capable of communicating with each other and can be divided into full nodes, which are responsible for storing, managing, and disseminating the blockchain, and light nodes, which can simply participate in transactions. .
- a node When a node is mentioned without further explanation in this specification, it often refers to a full node that participates in the decentralized network 100 and performs the operation of creating, storing, or verifying the blockchain, but is not limited to this. .
- Each block connected to the blockchain contains transaction details, that is, transactions, within a certain period of time.
- the nodes can manage transactions by creating, storing, or verifying blockchains according to their respective roles.
- the transaction may represent various types of transactions.
- the transaction may correspond to a financial transaction to indicate the ownership status of virtual currency and its changes.
- the transaction may correspond to a physical transaction to indicate the ownership status of an item and its changes.
- the transaction may correspond to an information sharing process to represent the recording, storage, and transfer of information. Nodes that perform transactions in the distributed network 100 may have a private key and public key pair with a cryptographic relationship.
- Figures 2 and 3 are block diagrams showing the connection of blocks used in a blockchain system.
- the blockchain 200 is a type of distributed database of one or more sequentially connected blocks 210, 220, and 230.
- the blockchain 200 is used to store and manage users' transaction details within the blockchain system, and each node participating in the network of the blockchain system creates a block and connects it to the blockchain 200.
- a limited number of blocks 210, 220, and 230 are shown in Figure 2, the number of blocks that can be included in the blockchain is not limited thereto.
- Each block included in the blockchain 200 may be configured to include a block header 211 and a block body 213.
- the block header 211 may include the hash value of the previous block 220 to indicate the connection relationship between each block. In the process of verifying whether the blockchain 200 is valid, the connection relationship within the block header 211 is used.
- the block body 213 may include data stored and managed in the block 210, for example, a transaction list or a transaction chain.
- the block header 211 may include a hash 2112 of the previous block, a hash 2113 of the current block, and a nonce 2114. Additionally, the block header 211 may include a root 2115 indicating the header of the transaction list within the block.
- the blockchain 200 may include one or more connected blocks.
- the one or more blocks are connected based on the hash value in the block header 211.
- the hash value 2112 of the previous block included in the block header 211 is a hash value for the previous block 220 and is the same as the current hash 2213 included in the previous block 220.
- the one or more blocks are chained by the hash value of the previous block in each block header. Nodes participating in the decentralized network 100 verify the validity of blocks based on the hash value of the previous block included in the one or more blocks, so that a single malicious node cannot forge or alter the contents of an already created block. The action is impossible.
- the block body 213 may include a transaction list 2131.
- the transaction list 2131 is a list of blockchain-based transactions.
- the transaction list 2131 may include records of financial transactions made in the blockchain-based financial system.
- the transaction list 2131 may be expressed in the form of a tree.
- the amount sent by user A to user B is recorded in the form of a list, and the storage length in the block is the length of the transaction included in the current block. It can be increased or decreased based on the number.
- the block 210 may include other information 2116 other than the information included in the block header 211 and the block body 213.
- Nodes participating in the decentralized network 100 have the same blockchain, and the same transaction is stored in the block. Blocks containing the transaction list are shared across the network, so all participants can verify them.
- DIDH DID-Identity Data Hub
- the present invention uses an encrypted code by combining the user's biometric information and a DID-based private key, restores the user's private key through biometric information recognition for the encryption code, and uses the private key.
- NFT is issued for the user's personal signature data (e.g., image data) to prove ownership
- the original data of the personal signature is stored in DID-based access control storage (DIDH)
- DIDH DID-based access control storage
- DIDH DID-based access control storage
- DIDH defines a logical storage (hub instance) for each user, and the original data of the user's personal signature can be stored in a logically separated storage space.
- a request by the user's private key signature is provided from the user terminal, and VC authentication must be performed on the DIDH server for this, thereby improving the convenience of managing the original data of the personal signature and the user's personal information. Strengthening security can be achieved at the same time.
- DID refers to a unique identifier that can prove your identity by CRUD (Create, Read, Update, Delete) information that can identify an individual without a central agency.
- DID is a key value that serves as a pointer to the DID document of a blockchain transaction.
- DID is an identifier generated based on the user's public key.
- a DID document refers to a set of documents required for an individual to authenticate himself and prove his association with a DID.
- the object of DID's CRUD performance is the DID document, which refers to the information required for verification when using the DID service, and the data set contains properties such as public key and authentication method.
- DID and DID document The relationship between DID and DID document is to search DID in the blockchain and create DID document based on transaction contents, and the method of reading DID document based on DID may be different for each blockchain.
- the ownership proof system of a personal signature through the issuance of an NFT for personal signature data according to the present invention is an organic relationship between the user terminal 300, the DIDH server 500, the blockchain 200, and the service providing server 400. It operates by motion.
- Figure 4 is a block diagram schematically showing the configuration of a system for proving ownership of personal signatures through issuance of NFT for personal signature data according to an embodiment of the present invention.
- Figure 5 is a diagram illustrating the NFT issuance process in the personal signature ownership certification system according to an embodiment of the present invention.
- Figure 6 is a diagram illustrating the process of performing an electronic signature in the personal signature ownership certification system according to an embodiment of the present invention.
- the ownership proof system of a personal signature through issuing an NFT for personal signature data includes a user terminal 300, a blockchain 200, a DIDH server 500, Includes a service provision server 400.
- the operation of the personal signature ownership verification system through the issuance of NFT for personal signature data according to the present invention may be an algorithm implemented through an application.
- the user terminal 300 is a terminal device that receives the user's biometric information after installing an application, and may be implemented as a computer that can access a remote server or terminal through a network.
- the computer may include, for example, a laptop equipped with a navigation system and a web browser, a desktop, a laptop, etc.
- the user terminal 300 is, for example, a wireless communication device that guarantees portability and mobility, and includes navigation, personal communication system (PCS), global system for mobile communications (GSM), personal digital cellular (PDC), and PHS ( Personal Handyphone System), PDA (Personal Digital Assistant), IMT (International Mobile Telecommunication)-2000, CDMA (Code Division Multiple Access)-2000, W-CDMA (W-Code Division Multiple Access), Wibro (Wireless Broadband Internet) terminal , may include all types of handheld-based wireless communication devices such as smartphones, smartpads, tablet PCs, etc.
- PCS personal communication system
- GSM global system for mobile communications
- PDC personal digital cellular
- PHS Personal Handyphone System
- PDA Personal Digital Assistant
- IMT International Mobile Telecommunication
- CDMA Code Division Multiple Access
- W-CDMA Wide-Code Division Multiple Access
- Wibro Wireless Broadband Internet
- the user terminal 300 receives user biometric information and can restore the DID-based private key using the biometric information input from the user for an encrypted code that combines the user biometric information and the DID-based private key. there is.
- the encryption code is an encrypted code generated by converting the user's biometric information (image data, etc.) into data, converting the user's DID-based private key into data, and combining them using a predetermined algorithm (e.g., XOR operation, etc.). , the original private key can be restored by decoding it using the matched user's biometric data.
- a predetermined algorithm e.g., XOR operation, etc.
- the blockchain 200 receives a request to issue an NFT for personal signature data based on a private key from the user terminal 300, issues and stores the NFT, and delivers the issued NFT to the user terminal 300.
- NFT Non-Fungible Token
- NFT Non-Fungible Token
- an NFT is created at a blockchain node to prove ownership of personal signature data signed based on the user's private key. Since NFTs are not issued in duplicate, in the personal signature ownership verification system according to the present invention, only the user's unique personal signature data can be created and proven as an NFT.
- the DIDH server 500 receives original data of a personal signature signed using a private key from the user terminal 300 and stores the original data.
- the DIDH server 500 stores the original data of the personal signature in a logical storage (hub instance) individually defined for each user, and can also use HUB DID to distinguish logical storage for each user.
- the reason why the DIDH server 500 uses the identifier as DID is to protect the user's personal information from the service company that operates the DIDH server 500.
- all identifiers are de-identified as DIDs to protect user personal information from malicious users.
- the process of issuing an NFT to prove ownership of a personal signature in the system first receives user biometric information from the user terminal 300, and receives an encryption code from the user.
- the DID-based private key is restored using the entered biometric information.
- the user terminal 300 requests the issuance of an NFT for personal signature data (eg, image data) based on the user's private key, and the blockchain 200 operates to issue and store the NFT.
- the blockchain 200 delivers the issued NFT to the user terminal 300, and the user terminal 300 stores the NFT.
- the NFT stored in the blockchain 200 contains the user's personal signature data information, and since the NFT is uniquely issued, it can be proven that the personal signature data is owned by the only user.
- the user terminal 300 may request that original data regarding personal signature data issued as NFT be stored in the DIDH server 500 after signing using a private key. Later, the user can receive the original data of the user's personal signature stored in the DIDH server 500 and use it for electronic signature acts, and the risk of personal signature data being stolen can be reduced by omitting personal authentication through email, etc. there is.
- the process of a user performing an electronic signature in a system is to first receive user biometric information from the user terminal 300, and then input biometric information from the user for an encryption code. Restore the DID-based private key using . Then, the user terminal 300 transmits a request for the original data of the personal signature signed with the user's private key to the service providing server 400.
- the service providing server 400 may be a server that performs business processing such as electronic payment.
- the service providing server 400 transmits a request for the original data of the personal signature to the DIDH server 500, and the DIDH server 500 authenticates the original data of the personal signature to the user terminal 300 after VC (Verifiable Credential) authentication. ) and transmit the original data of the personal signature.
- VC Very Credential
- the DIDH server 500 performs VC authentication, and VC is a verifiable credential.
- Claim is a description of a subject and subject-characteristics- It is expressed as a relationship of information.
- Credential is a certificate issued by an issuer and is a set of one or more claims made for one subject.
- Verifiable Credential is a set of data containing the issuer's electronic signature and metadata such as information on whether the issued Credential has been changed, issuer information, and electronic signature.
- the user terminal 300 transmits electronic signature information to the service providing server 400 using the original data of the personal signature received from the DIDH server 500 and the NFT stored in the user terminal 300, and the service providing server ( 400) can perform business processing such as electronic payments.
- the risk of private key loss or theft can be reduced by encrypting and managing the user's biometric information and DID-based private key with an encryption code, and when the user wishes to sign using the private key for personal authentication. You can easily secure your private key simply by recognizing your biometric information.
- the original data of the user's personal signature can be stored in a storage (DIDH server) accessible only to the user based on DID, thereby facilitating the management of the original data of the personal signature and reducing the risk of loss or theft of the personal signature data.
- DIDH server storage accessible only to the user based on DID, thereby facilitating the management of the original data of the personal signature and reducing the risk of loss or theft of the personal signature data.
- Personal signature data can be secured by requesting it to the DIDH server 500 when necessary.
- Figure 7 is a configuration diagram of a node computing device according to an embodiment of the present invention.
- the computing device 1000 of the node includes a processor 1100 and a memory 1200, and the processor 1100 includes one or more cores, a graphics processing unit, and/or other components and signals. It may include a connection passage (for example, a bus, etc.) for transmitting and receiving.
- a connection passage for example, a bus, etc.
- the processor 1100 executes one or more instructions stored in the memory 1200, thereby executing the operation of the personal signature ownership certification system described in relation to FIGS. 4 to 6.
- the processor 1100 collects information about data upload/download occurring in one or more nodes by executing one or more instructions stored in memory, records the collected information in a block, and executes the information recorded in the block. Based on the information, relevant information is provided for at least one node.
- the processor 1100 may further include RAM (Random Access Memory) and ROM (Read-Only Memory) that temporarily and/or permanently store internally processed signals (or data). . Additionally, the processor 1100 may be implemented in the form of a system on chip (SoC) including at least one of a graphics processing unit, RAM, and ROM.
- SoC system on chip
- the memory 1200 may store programs (one or more instructions) for processing and controlling the processor 1100. Programs stored in the memory 1200 may be divided into a plurality of modules according to their functions.
- the operations of the system described in relation to embodiments of the present invention may be implemented directly in hardware, implemented as a software module executed by hardware, or a combination thereof.
- the software module may be RAM (Random Access Memory), ROM (Read Only Memory), EPROM (Erasable Programmable ROM), EEPROM (Electrically Erasable Programmable ROM), Flash Memory, hard disk, removable disk, CD-ROM, or It may reside on any type of computer-readable recording medium well known in the art to which the present invention pertains.
- the components of the present invention may be implemented as a program (or application) and stored in a medium in order to be executed in conjunction with a hardware computer.
- Components of the invention may be implemented as software programming or software elements, and similarly, embodiments may include various algorithms implemented as combinations of data structures, processes, routines or other programming constructs, such as C, C++, , may be implemented in a programming or scripting language such as Java, assembler, etc.
- Functional aspects may be implemented as algorithms running on one or more processors.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
La présente invention concerne un système pour prouver la propriété d'une signature privée par l'intermédiaire d'une émission de NFT pour des données de signature privée qui comprend : un terminal d'utilisateur qui reconstruit une clé privée au moyen d'informations biométriques reçues depuis un utilisateur sur la base d'un code de chiffrement dans lequel des informations biométriques d'utilisateur et une clé privée à base de DID sont combinées ; une chaîne de blocs qui reçoit, depuis le terminal d'utilisateur, une demande d'émission de NFT pour des données de signature privée sur la base d'une clé privée, émet et stocke un NFT, et transfère le NFT émis au terminal d'utilisateur ; et un serveur DIDH qui reçoit des données d'origine d'une signature privée générée au moyen d'une clé privée provenant du terminal d'utilisateur, et stocke celles-ci.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR10-2022-0091912 | 2022-07-25 | ||
KR1020220091912A KR20240014317A (ko) | 2022-07-25 | 2022-07-25 | 개인서명 데이터에 대한 nft 발행을 통한 개인서명의 소유권 증명 시스템 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2024025030A1 true WO2024025030A1 (fr) | 2024-02-01 |
Family
ID=89706824
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/KR2022/012279 WO2024025030A1 (fr) | 2022-07-25 | 2022-08-17 | Système pour prouver la propriété d'une signature privée par émission de nft pour des données de signature privée |
Country Status (2)
Country | Link |
---|---|
KR (1) | KR20240014317A (fr) |
WO (1) | WO2024025030A1 (fr) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR102024379B1 (ko) * | 2017-11-22 | 2019-09-24 | 동국대학교 산학협력단 | 생체 정보 기반의 전자 서명이 가능한 데이터 전송 장치 및 그 동작 방법 |
KR102332503B1 (ko) * | 2019-11-20 | 2021-11-30 | 주식회사 아몬드컴퍼니 | 전화번호 이용한 가상화폐 계정 생성 장치 및 방법 |
US20220006634A1 (en) * | 2019-08-29 | 2022-01-06 | American Express Travel Related Services Company, Inc. | Decentralized data authentication |
KR102354758B1 (ko) * | 2020-03-20 | 2022-01-25 | 케이포시큐리티(주) | 영지식 증명 기술 기반 분산 디지털 인증 시스템 및 방법 |
KR20220066769A (ko) * | 2020-11-16 | 2022-05-24 | 포항공과대학교 산학협력단 | 토큰 모델링 장치 및 이를 포함하는 데이터 무결성 검증 시스템 및 방법 |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101936758B1 (ko) | 2018-06-08 | 2019-01-11 | 주식회사 미탭스플러스 | 정보 조회 기록의 무결성을 위한 암호화 장치, 방법 및 블록체인에서 정보 조회 기록의 무결성을 위한 분산 원장 장치 |
-
2022
- 2022-07-25 KR KR1020220091912A patent/KR20240014317A/ko unknown
- 2022-08-17 WO PCT/KR2022/012279 patent/WO2024025030A1/fr unknown
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR102024379B1 (ko) * | 2017-11-22 | 2019-09-24 | 동국대학교 산학협력단 | 생체 정보 기반의 전자 서명이 가능한 데이터 전송 장치 및 그 동작 방법 |
US20220006634A1 (en) * | 2019-08-29 | 2022-01-06 | American Express Travel Related Services Company, Inc. | Decentralized data authentication |
KR102332503B1 (ko) * | 2019-11-20 | 2021-11-30 | 주식회사 아몬드컴퍼니 | 전화번호 이용한 가상화폐 계정 생성 장치 및 방법 |
KR102354758B1 (ko) * | 2020-03-20 | 2022-01-25 | 케이포시큐리티(주) | 영지식 증명 기술 기반 분산 디지털 인증 시스템 및 방법 |
KR20220066769A (ko) * | 2020-11-16 | 2022-05-24 | 포항공과대학교 산학협력단 | 토큰 모델링 장치 및 이를 포함하는 데이터 무결성 검증 시스템 및 방법 |
Also Published As
Publication number | Publication date |
---|---|
KR20240014317A (ko) | 2024-02-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR102054410B1 (ko) | 블록체인 서비스 운영을 위해 위탁된 컴퓨팅 파워에 대한 보상을 제공하는 방법 | |
KR101893729B1 (ko) | 복수의 블록체인에 기반한 데이터 공유 방법 | |
KR101964254B1 (ko) | 블록체인과 dht를 이용한 p2p 거래 방법 및 장치 | |
US11361316B2 (en) | Systems and methods for providing a personal distributed ledger | |
US20190370479A1 (en) | Method for providing simplified account registration service and user authentication service, and authentication server using same | |
KR20190075793A (ko) | 블록체인을 이용한 일회성 접근 권한 부여 시스템 | |
Vangipuram et al. | CoviChain: a blockchain based framework for nonrepudiable contact tracing in healthcare cyber-physical systems during pandemic outbreaks | |
KR102383099B1 (ko) | 블록체인 기반의 did 서비스, ipfs 기반의 데이터 공유 기술, 및 개인키 분산 저장 기술이 결합된 비대면 대용량 문서 접근 블록체인 시스템 | |
WO2020071650A1 (fr) | Système de gestion de données de traitement de dépenses basé sur une chaîne de blocs et procédé et programme informatique associé | |
KR102465467B1 (ko) | Did 기반의 탈중앙화된 사용자 데이터 저장 및 공유 시스템 | |
WO2019125041A1 (fr) | Système d'authentification utilisant une séparation, puis un stockage distribué d'informations personnelles utilisant une chaîne de blocs | |
CN112991045B (zh) | 基于区块链的医疗健康消费融资方法、装置、设备及介质 | |
WO2023095967A1 (fr) | Système d'accès à un grand document avec interaction à distance dans lequel un service did basé sur une chaîne de blocs, une technologie de partage de données basée ipfs et une technologie de stockage distribuée à clé privée sont combinés | |
WO2019209291A1 (fr) | Systèmes et procédés pour la fourniture d'une solution décentralisée universelle destinée à la vérification d'utilisateurs possédant des caractéristiques de vérification croisée | |
WO2019125069A1 (fr) | Système d'authentification à l'aide d'une séparation, puis d'une combinaison d'informations personnelles à l'aide d'une chaîne de blocs | |
CN110276693A (zh) | 保险理赔方法及系统 | |
WO2024025030A1 (fr) | Système pour prouver la propriété d'une signature privée par émission de nft pour des données de signature privée | |
WO2024019217A1 (fr) | Système de reconstruction de clé privée basé sur des informations did et biométriques | |
WO2022060137A1 (fr) | Ordinateur de gestion d'authentification et procédé de gestion d'authentification | |
KR20210041980A (ko) | Kyc 데이터와 생체인증정보를 보유한 스마트 디바이스를 활용한 블록체인 개인키 생성 시스템 | |
WO2023177013A1 (fr) | Système de paiement utilisant une authentification biométrique basée sur un identifiant did | |
WO2023229067A1 (fr) | Système de transaction de nft basé sur did | |
KR20210041984A (ko) | Kyc 데이터와 생체인증정보를 보유한 스마트 디바이스를 활용한 블록체인 개인키 생성 방법 | |
WO2023277556A1 (fr) | Système et procédé d'authentification et d'identification d'informations personnelles au moyen d'un identifiant décentralisé (did) | |
US20230360123A1 (en) | Cryptocurrency exchange platform |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 22953255 Country of ref document: EP Kind code of ref document: A1 |