WO2024090984A1 - Appareil serveur de gestion de reprise et son procédé de fonctionnement - Google Patents

Appareil serveur de gestion de reprise et son procédé de fonctionnement Download PDF

Info

Publication number
WO2024090984A1
WO2024090984A1 PCT/KR2023/016631 KR2023016631W WO2024090984A1 WO 2024090984 A1 WO2024090984 A1 WO 2024090984A1 KR 2023016631 W KR2023016631 W KR 2023016631W WO 2024090984 A1 WO2024090984 A1 WO 2024090984A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
task
access
authority
information
Prior art date
Application number
PCT/KR2023/016631
Other languages
English (en)
Korean (ko)
Inventor
이준섭
김현석
김관래
김용욱
문창호
이종건
이재훈
강수영
Original Assignee
주식회사 엔터프라이즈블록체인
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 주식회사 엔터프라이즈블록체인 filed Critical 주식회사 엔터프라이즈블록체인
Publication of WO2024090984A1 publication Critical patent/WO2024090984A1/fr

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols

Definitions

  • Embodiments disclosed in this document relate to a server device for managing resumes and a method of operating the same.
  • Gig work refers to a form of labor in which companies recruit workers as short-term contract workers or temporary workers as needed and pay for them.
  • Gig labor can be provided based on online platforms, and is expanding into a variety of work fields such as delivery, designated driving, and quick service, as well as restaurant assistance and serving, nursing and hospice, cleaning, and security services.
  • blockchain technology can be used to fairly distribute work to workers and provide objective evaluation and reasonable compensation for the work performed. For example, it is possible to minimize fees and pay appropriate compensation through cryptocurrency operated based on blockchain technology. Additionally, for example, data related to job evaluation can be recorded through blockchain to create data that cannot be manipulated, thereby accumulating reliable evaluation data on workers. Additionally, workers' identities can be easily verified, for example, minimizing concerns about hacking.
  • the online platform manages the information about the task (task contract, TC) provided by the worker to the employer, and the worker, employer, or authorized third party records this information. You will need to provide this information upon request.
  • task contract task contract
  • TC task contract
  • Embodiments disclosed in this document provide a device and a method of operating the same to allow authorized persons (e.g., workers who performed the work, employers who provided the work) to view information about work performed by workers. do.
  • authorized persons e.g., workers who performed the work, employers who provided the work
  • a method of operating a server includes receiving a TC (task contract) of the first device for a first task from a first device, matching with the first device.
  • One device and the second device are included, one of the first device and the second device is a device corresponding to a worker performing the first task, and the other is a device that performs the first task. It may be a corresponding device provided by the employer to the worker.
  • a server includes a memory, a communication unit, and at least one processor electrically connected to the memory and the communication unit, and the at least one processor performs a first task from a first device.
  • Receive a TC (task contract) of the first device for the first device receives a TC of the second device for the first task from a second device matching the first device, and receive the TC of the second device for the first task.
  • TC task contract
  • One device corresponds to a worker, and the other device may correspond to an employer providing the first task to the worker.
  • the server and its operating method provide the effect of safely managing personal information by setting the authority to access information about the work performed by workers.
  • the server and its operating method provide the effect of providing information about work performed by workers to authorized third parties, allowing the information to be utilized as part of property.
  • FIG. 1A shows the configuration of a transaction system including an electronic device, a server, and a blockchain network according to an embodiment.
  • Figure 1B shows the block configuration of a server according to one embodiment.
  • Figure 2 shows an example of generating a curriculum vitae (CV) of a server according to an embodiment.
  • Figure 3 shows an example of CV generation of a server according to an embodiment.
  • Figure 4 shows an example of generating a CV of a server according to an embodiment.
  • Figure 5 shows an example of setting access permissions for a server according to an embodiment.
  • Figure 6 shows the operation flow of a server according to one embodiment.
  • Figure 7 shows the operation flow of a server according to one embodiment.
  • Figure 8 shows the operation flow of a server according to one embodiment.
  • FIG. 1A shows the configuration of a transaction system including an electronic device, a server, and a blockchain network according to an embodiment.
  • the transaction system 100 may include an electronic device 110, a server 130, and a blockchain network 150.
  • the electronic device 110 may include a communication circuit 112, a secure memory 114, a processor 116, and a display 118.
  • the communication circuit 112 may establish a communication channel between the electronic device 110 and an external electronic device (eg, server 130) and transmit and receive data. For example, the communication circuit 112 may transmit data from the electronic device 110 performing a transaction to the server 130.
  • the electronic device 110 may generate a key pair using asymmetric key cryptography (eg, public-key cryptography).
  • a key pair may include a private key and a public key.
  • secure memory 114 may store the generated private key.
  • the secure memory 114 may refer to a hardware type memory that provides a security environment.
  • the secure memory 114 may be built into the electronic device 110 or may be a device that can be separately inserted into the electronic device 110 (eg, a micro SD card).
  • the secure memory 114 may refer to a memory that is hardware-separated from general memory.
  • the secure memory 114 may refer to memory in the form of software that is encrypted to provide a secure environment.
  • secure memory 114 may be a form of software that encrypts and stores data so that it can only be accessed through some configuration (e.g., TEE).
  • the secure memory 114 may be implemented on the same memory as the general memory, but may be in the form of software stored in a secure memory area that is separated by software (eg, memory address).
  • the display 118 may visually provide information to the outside of the electronic device 110 (eg, to a user).
  • the display 118 may externally provide at least one of transaction creation information, balance information, transaction transmission delay information, and transaction completion information of the electronic device 110.
  • the server 130 may include a communication unit 132, a memory 134, and a processor 136.
  • the communication unit 132 may transmit and receive data by establishing a communication channel between the server 130 and an external device (e.g., electronic device 110, blockchain network 150).
  • an external device e.g., electronic device 110, blockchain network 150
  • the communication unit 132 may transmit data received from the electronic device 110 to the blockchain network 150.
  • the transmitted data may be stored in the blockchain node 152.
  • the processor 136 may receive data from the electronic device 110 through the communication unit 132. In one embodiment, the processor 136 may identify a classification flag included in data received from the electronic device 110. In one embodiment, the processor 136 may determine whether to transmit the received data to the blockchain network 150 based on a distinction flag included in the data. For example, when the received data includes a specific classification flag (or when the value of the included classification flag is the first classification value), the processor 136 may store the received data in the memory 134. . For another example, when the received data does not include a specific distinction flag (or, if the value of the included distinction flag is a second distinction value that is distinct from the first distinction value), the processor 136 Data can be transmitted to the blockchain network 150.
  • the distinction flag may mean a distinction value included in a data packet. For example, if some bits of the data packet received from the electronic device 110 include the first classification value “1”, the processor 136 may store the received data in the memory 134. For another example, if some bits of the received data packet include the second distinction value “0”, the processor 136 may transmit the received data to the blockchain network 150.
  • Figure 1A shows only a transaction system in which data generated by the electronic device 110 is transmitted to the blockchain network 150 through the server 130, but in another embodiment, data generated by the electronic device 110 A portion of may be transmitted directly to the blockchain network 150. For example, the electronic device 110 may directly transmit data that does not include a specific classification flag to the blockchain network 150.
  • the electronic device 110 may transmit data including a specific classification flag to the server 130.
  • the server 130 which has received data including a specific classification flag, can monitor the blockchain network 150. When an abnormal transaction is detected in the blockchain network 150, the server 130 may transmit data including a specific classification flag to the blockchain network 150.
  • the electronic device 110 may store data including a specific classification flag in a memory (eg, secure memory 114). When an abnormal transaction is detected in the blockchain network 150, the server 130 may request the electronic device 110 to transmit data including a specific classification flag to the blockchain network 150.
  • Figure 1B shows the block configuration of a server according to one embodiment.
  • the server 130 may refer to a server device for managing and providing information about tasks (eg, task contract (TC)) of a plurality of client devices.
  • tasks eg, task contract (TC)
  • TC task contract
  • the client device may refer to an electronic device used by employers and employees (hereinafter referred to as “service users”) who use the resume creation and management service to receive the service.
  • a client device may mean a service user's portable terminal (e.g., smartphone, personal digital assistant (PDA), tablet PC, wearable device, etc.), laptop, PC, etc.
  • PDA personal digital assistant
  • laptop PC, etc.
  • the server 130 may include a processor 136, a memory 134, and a communication circuit 132.
  • the configuration shown in FIG. 1 illustrates a configuration related to the description of an embodiment according to the present disclosure, and in addition to the illustrated configuration, other configurations for performing server functions may be added, and the illustrated configurations may be omitted.
  • the memory 134 is a storage medium used by the server 130 and can store data such as at least one command 121 or setting information corresponding to at least one program.
  • the program may include an operating system (OS) program and various application programs.
  • OS operating system
  • the memory 134 is a flash memory type, hard disk type, multimedia card micro type, card type memory (e.g., SD or memory, etc.), random access memory (RAM), static random access memory (SRAM), read only memory (ROM), electrically erasable programmable ROM (EEPROM), programmable ROM (PROM), magnetic memory, magnetic disk, It may include at least one type of storage medium, such as an optical disk.
  • RAM random access memory
  • SRAM static random access memory
  • ROM read only memory
  • EEPROM electrically erasable programmable ROM
  • PROM programmable ROM
  • magnetic memory magnetic disk
  • magnetic disk It may include at least one type of storage medium, such as an optical disk.
  • the communication circuit 132 includes the server 130 and an external electronic device (e.g., a client device (not shown), an IAM server (not shown), a billing server (not shown), a cloud server (not shown), Direct (e.g. wired) communication between IPFS (not shown) can be performed.
  • an external electronic device e.g., a client device (not shown), an IAM server (not shown), a billing server (not shown), a cloud server (not shown), Direct (e.g. wired) communication between IPFS (not shown) can be performed.
  • communications circuitry 132 may receive TC data transmitted from a client device. Additionally, for example, communication circuitry 132 may transmit TC data to a cloud server (not shown) and IPFS (not shown) (e.g., blockchain network 150).
  • the communication circuit 132 may include a wireless communication unit (eg, a cellular communication module, a short-range wireless communication module, or a global navigation satellite system (GNSS) communication module) or a wired communication unit.
  • a wireless communication unit e.g., a cellular communication module, a short-range wireless communication module, or a global navigation satellite system (GNSS) communication module
  • GNSS global navigation satellite system
  • the corresponding communication units communicate with external electronic devices (e.g., clients) through networks (e.g., legacy cellular networks, 5G networks, next-generation communication networks, the Internet, or telecommunication networks such as computer networks (e.g., LAN or WAN)). It can communicate with the device, IAM server 130, billing server 170, cloud server 140, and IPFS 150).
  • networks e.g., legacy cellular networks, 5G networks, next-generation communication networks, the Internet, or telecommunication networks such as computer networks (e.g., LAN or WAN)
  • IAM server 130 billing
  • the communication circuitry 132 may support 5G networks after 4G networks and next-generation communication technologies, such as new radio access technology (NR access technology).
  • NR access technology provides high-speed transmission of high-capacity data (enhanced mobile broadband (eMBB)), minimization of terminal power and access to multiple terminals (massive machine type communications (mMTC)), or ultra-reliable and low-latency (URLLC). -latency communications)) can be supported.
  • Communication circuitry 132 may support high frequency bands (e.g., mmWave bands), for example, to achieve high data rates.
  • the communication circuit 132 uses various technologies to secure performance in the high frequency band, for example, beamforming, massive MIMO (multiple-input and multiple-output), and full-dimensional multiple input and output. It may support technologies such as full dimensional MIMO (FD-MIMO), array antenna, analog beam-forming, or large scale antenna.
  • beamforming massive MIMO (multiple-input and multiple-output)
  • massive MIMO multiple-input and multiple-output
  • full-dimensional multiple input and output may support technologies such as full dimensional MIMO (FD-MIMO), array antenna, analog beam-forming, or large scale antenna.
  • the communication circuit 132 includes a server 130, an external electronic device (e.g., a client device (not shown), an IAM server (not shown), a billing server (not shown), a cloud server (not shown), It can support various requirements specified in IPFS (not shown) or network systems.
  • an external electronic device e.g., a client device (not shown), an IAM server (not shown), a billing server (not shown), a cloud server (not shown)
  • IPFS not shown
  • network systems not shown
  • the processor 136 executes software (e.g., a program) and executes at least one other component (e.g., hardware or software component) of the server 130 connected to the processor 136. can be controlled and various data processing or operations can be performed.
  • software e.g., a program
  • at least one other component e.g., hardware or software component
  • processor 136 stores instructions or data received from another component (e.g., communication circuit 132) in volatile memory, and stores the instructions or data stored in volatile memory. Data can be processed and the resulting data can be stored in non-volatile memory.
  • another component e.g., communication circuit 132
  • the processor 136 may be a main processor (e.g., a central processing unit or an application processor) or an auxiliary processor that can operate independently or together (e.g., a graphics processing unit, a neural processing unit (NPU), or a communication processor).
  • a main processor e.g., a central processing unit or an application processor
  • auxiliary processor e.g., a graphics processing unit, a neural processing unit (NPU), or a communication processor
  • processor 136 may receive TC data from at least one client device that includes information about tasks performed by a user of the at least one client device.
  • the processor 136 may perform the operation of the server 130 described through the drawings below.
  • Figure 2 shows an example of CV (Curriculum vitae) generation according to one embodiment.
  • 3 shows an example of CV generation according to one embodiment.
  • 4 shows an example of CV generation according to one embodiment.
  • the server device described in FIGS. 2 to 4 may refer to the server 130 of FIG. 1 .
  • the server device includes a client device (a first device used by the worker performing the task, a second device used by the employer providing the task to the worker) and a blockchain-based cloud server (not shown) or blockchain.
  • Information regarding work performed by at least one node (not shown) on a network (not shown) and an employee may be transmitted and received.
  • an employer may mean a person who instructs employees to do work and provides compensation accordingly, and may be referred to as “company,” “employee,” or equivalent terms.
  • An employee may refer to a person who performs work instructed by an employer and is compensated accordingly, and may be referred to as “worker,” “employee,” “gig,” or equivalent terms.
  • the employer and the employee who use the CV management service may be referred to as “service users.”
  • the first device may represent a device used by an employee to receive a resume management service.
  • the second device may refer to a device used by employers to provide resume management services.
  • the server device generates TCs (220, 320, 420) based on TC data (e.g., 210, 310, 410), and generates CVs (e.g., 230, 420) based on the generated TCs. 330, 430) can be generated.
  • TC data e.g., 210, 310, 410
  • CVs e.g., 230, 420
  • the server device collects information about tasks (task contract, TC) provided by the employee to the employer from the first device and the second device (e.g., information about the work performed by the user (worker) of the first device). Information and information about work provided by the user (employer) of the second device) can be received.
  • the server device, the first device, and the second device may communicate TC through a specific interface (eg, mobile application, etc.).
  • the server device may generate curriculum vitae (CV) through a plurality of blockchain layers.
  • CV may refer to data containing information about at least one task performed by a worker or information about at least one task provided by an employee.
  • the server device may generate TC data based on TC received from the first device and the second device.
  • TC data may be generated for each task performed.
  • TC data may each include unique identification information (TC ID).
  • TC data may include task data (non-fungible token (NFT) task), asset data (NFT-asset), and time (NFT-time) data.
  • NFT non-fungible token
  • TC data can be classified as shown in Table 1 below.
  • NFT Task Task Task information performed by the user Task information created by the employer
  • NFT Assets asset data
  • physical goods membership Not for sale certificate recipe formula e.g. a method of making cosmetics
  • NFT Time time data
  • license License to use recipes/formulas, etc.
  • task data may include information about tasks performed by employees and information about tasks created by employers.
  • TC data may include the type of work performed by the employee, date, time, location, work content, and evaluation information about the employee.
  • Figure 2 shows an example of generating a task data CV by combining task data
  • Figure 3 shows an example of generating an asset data CV by combining asset data
  • Figure 4 shows an example of combining time data to generate a time data CV.
  • An example of creation is shown.
  • the server device includes a plurality of TCs (e.g., TC (210-1), TC (210-2), TC (210-3), ...TC (210-l). Based on this, combined task data can be created.
  • a plurality of TCs may represent task data.
  • task data includes an identification number (ID), employee key value, category of work, subcategory, date of work performance, time of work performance, location of work performance, and information about the work performed. It may include the employer's evaluation, income paid for work performed, and attachments.
  • ID identification number
  • employee key value category of work
  • subcategory date of work performance
  • time of work performance time of work performance
  • location of work performance and information about the work performed. It may include the employer's evaluation, income paid for work performed, and attachments.
  • task data may be created and managed in the form of a table.
  • TC data may be generated and managed in the form shown in Table 2 below.
  • task data may include identification information (e.g., Task ID) of the work performed by the worker.
  • the identification information of the work performed by the worker may represent an identifier generated for each task for the worker.
  • the task data may include information about the object that receives the work performed by the worker (eg, Employer).
  • the object that receives the work performed by the worker could be the employer.
  • the object that receives work performed by a worker may be a third party other than the worker or employer.
  • task data may include information regarding the state of the task data.
  • the state of the task data may include a first state indicating that the employer has created the task, but the worker who will perform the task has not yet been matched.
  • the state of the task data may include a second state indicating that the worker who will perform the task created by the employer has been determined, but has not yet performed the task.
  • the state of the task data may include a third state indicating a state in which the worker has started performing the task.
  • the state of the task data may include a fourth state indicating a state in which the worker has completed performing the task.
  • the state of the task data may include a fifth state indicating that the worker has completed the task and the employer has completed payment of compensation.
  • Task data in the fifth state may also be referred to as TR (task receipt) data.
  • the server device may store a plurality of task data (e.g., TC (210-1), TC (210-2), TC (210-3), ... TC (TR-l) ) can be combined to generate combined task data 220 (TC aggregation).
  • TC aggregation For example, in the combined task data, the categories of work performed by the user are “restaurant” and “cleaning,” and the subcategories are “serving,” “delivery,” and “home cleaning.” clean)” may be included.
  • the combined task data may include information indicating that the user performed work in “Gangnam-Gu” or “Yangcheon-Gu.” Also, for example, the combined data may include information about task performance times (e.g., 140 hours for delivery and 200 hours for serving). Additionally, for example, the combined task data may include feedback information about the work performed by the user (e.g., “excellent” for delivery and “excellent” for serving). there is.
  • each of the plurality of TCs 210 may include a category, subcategory, work performance location, work performance time, and feedback information.
  • the CV 230 includes information 232 regarding the user's personal information, information 234 related to certification of the work performed, information 236 related to the user's educational background, and work experience performed. It may include information 238 about. Information 238 regarding work experience performed may include at least a portion of the combined task data.
  • the server device includes at least one TC (310) among a plurality of TCs (e.g., TC (310-1), TC (310-2), TC (310-3), Based on TC (310-m)), combined asset data (NFT Tasks aggregation) can be created.
  • At least one TC 310 may include a TC corresponding to asset data among a plurality of TCs (task data).
  • asset data may refer to information about assets held by a worker or employer.
  • asset data may include for-sale assets that can be sold and non-sale assets that cannot be sold.
  • assets for sale may include digital content (e.g., images, videos, etc.), goods, membership, etc.
  • non-sale assets may include certificates, recipes, formulas for making cosmetics, etc.
  • asset data may have the form shown in Table 3 below.
  • the asset data may include identification information (e.g., Task ID) of the task.
  • the asset data may include information regarding the state (e.g., state) of the asset data.
  • the status of asset data for sale may include a “creation status” indicating the state in which the asset data was created.
  • the status of asset data for sale may include a “certification status” indicating that authentication has been completed as to whether the asset data is recognized as a valid asset.
  • the status of asset data for sale may include a “matching status” indicating that authentication of the asset data has not been completed, but has not yet been sold and is awaiting matching.
  • the status of asset data for sale may include a “sale complete status” indicating a state in which the sale of the asset data has been completed.
  • the status of non-sale asset data may include a “creation status” indicating the state in which the asset data was created.
  • the status of non-sale asset data may include a “certification status” indicating that authentication has been completed as to whether the asset data is recognized as valid asset data.
  • the status of non-sale asset data may include a “registration complete” status, which indicates that authentication and registration for the asset data have been completed.
  • the asset data may include identifying information (e.g., user address) of the worker or employer.
  • asset data may include information about the type of asset (e.g., Category: Digital contents, Sub-Category: Movie Clip).
  • asset data may include information about the location where the asset is stored (e.g., content ID (CID)).
  • CID content ID
  • a server device may store a plurality of task data (e.g., TC (310-1), TC (310-2), TC (310-3), ... TC (TR-m) ) can be combined to create combined asset data 320 (NFT Assets aggregation).
  • the category of the task performed by the user may be “Digital Contents,” and the subcategories may be “image” and “movie clip.”
  • combined asset data may include the number of asset data (# of assets), asset data sales volume (# of sold assets), total assets, information on market estimated price (market estimated price), total It may include information about total income, average monthly income (income avg per month), etc.
  • the server device includes at least one TC 410 (e.g., TC 410-1, TC 410-2, TC 410-3, ... TC 410).
  • Time data 420 can be generated based on -l)).
  • At least one TC 410 may include a TC corresponding to a non-sale asset among the at least one TC 310.
  • time data may mean data converted from non-saleable asset data into a form that can be sold in the form of a course ticket, usage right, etc.
  • time data may have the form shown in Table 4 below.
  • time data may include identification information (eg, Task ID) of the time data.
  • temporal data may include information regarding the state of the temporal data.
  • the status of time data may include “creation status” indicating the state in which the time data was created.
  • the status of time data may include “authentication status” indicating a state in which authentication regarding whether the time data is valid has been completed.
  • the state of the time data may include a “matching state” indicating a state in which a buyer of the time data is waiting to be matched.
  • the status of the time data may include a “sold” status indicating that a buyer for the time data has been matched.
  • the status of the time data may include a “used status” indicating that the use of the time data has been completed (e.g., license usage complete) after completion of sale.
  • the status of time data may include a “time expiration status” indicating that the validity period of time data has expired after completion of sale.
  • time data with a “completed” or “time expired” status may be delivered back to the Owner (e.g., worker or employer).
  • time data may include worker or employer identifying information (e.g., user address).
  • asset data may include information about the type of asset (e.g., Category: Voucher, Sub-Category: Recipe).
  • time data may include information about the validity period of the time data (eg, expiration date).
  • a server device may store a plurality of time data (e.g., TC (410-1), TC (410-2), TC (410-3), ...TC (410-n) ) can be combined to generate combination time data 420 (NFT Time Aggregation).
  • the category of combination time data may be “Voucher” and the subcategories may be “Recipe” and “Class”.
  • combined time data may include information about the number of assets (# of assets), total income, average income per month (income avg per month), feedback information (e.g. Class feedback: Excellent”, etc.) may include.
  • the server device may generate CVs 230, 330, 430 based on combined TC data (e.g., combined task data, combined asset data, combined time data) combined through the aggregator.
  • the server device may transmit the CV to the first device and the second device through an application programming interface (API).
  • API application programming interface
  • the server device may receive information about the worker's profile (e.g., information about personal information, information about qualifications, education information, etc.) from the first device.
  • the server device may receive information about the employer's profile (e.g., information about personal information, information about operational work, information about the company operated by the employer, etc.) from the second device.
  • the server device may transmit a message requesting to store information about the profiles of workers and employers received from the first device and the second device to the cloud server.
  • the cloud server can store information about the profiles of workers and employers.
  • Figure 5 shows an example of setting access rights for a server device according to an embodiment.
  • Figure 6 shows the operation flow of a server device according to an embodiment.
  • the operations of the server device performed in FIGS. 5 and 6 may be performed on the blockchain layer, and the results generated by performing at each layer (e.g., TC data, TC table, CV data, etc.) are stored only in the memory of the server device. Rather, it can be stored in nodes of the blockchain network.
  • each layer e.g., TC data, TC table, CV data, etc.
  • the server device may receive the TC of the first device for the first task from the first device.
  • the server 130 may receive the TC of the first device 501-1 for the first task from the first device 501-1.
  • the first device may represent a device used by an employee to receive a resume management service.
  • the TC of the first device may mean information about work performed by the worker.
  • the TC of the first device may include task data, asset data, and time data described in FIGS. 2 to 4.
  • the server device may receive the TC of the second device for the first task from the second device that matches the first device.
  • the server 130 may receive the TC of the second device 502-1 for the first task from the second device 502-1.
  • the second device may refer to a device used by an employer to provide a resume management service.
  • the TC of the second device may refer to information about work provided by the employer to the worker.
  • the TC of the first device may include task data, asset data, and time data described in FIGS. 2 to 4.
  • the first device and the second device may be matched when a worker is determined to perform a task created by the employer.
  • the server device may generate first TC data based on the TC of the first device for the first task and the TC of the second device for the first task.
  • the server 130 may generate first TC data 512 based on the TC of the first device 501-1 for the first task and the TC of the second device 502-1 for the first task. can be created.
  • the server device may create a first TC table 513 containing information about devices and applications having access to the first TC.
  • the access rights may include access rights to the TC and access rights to the CV.
  • the access rights may include a first right to view only, a second right to view and modify, and a third right to view, modify, and grant permission.
  • access rights may have the form shown in Table 5 below.
  • Privilege level scope of authority Owner (third authority) - Owner can edit/view - Acting and Viewer ratings can be specified Acting (second authority) - Owner agency, modification/viewing possible - Viewer rating can be specified Viewer (primary authority) - Available for viewing
  • permission levels may include Owner, Acting, and Viewer.
  • Owner may represent the owner of a Task Contract or NFT CV. If you have owner authority, you can edit or view the TC or CV.
  • a device with Owner privileges can specify Acting and Viewer privileges.
  • a device with an Acting level can mean a role that acts as an Owner. For example, when user A performs task B through an application called C, if C is given an Acting grade, after the performed task is created and date or time errors are discovered, TC correction is made to C. You can do it quickly.
  • a device with the Acting level can modify Viewer permissions.
  • a device with the Viewer level can view the TC or CV, but may not have the permission to modify it.
  • priorities among access rights there may be priorities among access rights, and the priorities may be in the following order: Owner, Acting, and Viewer.
  • the server device when a task contract is created, can set the owner first.
  • the worker who performed the task and the employer who provided the task can have owner authority.
  • the server device can set the owner of the Asset as Owner.
  • the Owner may designate a device with Acting authority.
  • a device with Acting authority can take on the role by receiving authority from the Owner. Additionally, after the device with Acting privileges is determined, the device with Owner or Acting privileges can determine the device with Viewer privileges.
  • a table representing access rights may also have the form shown in Table 6 or Table 7 below.
  • the permission table may include information about who is assigned to each permission and how long it is valid. For example, in the case of an Owner, there is no separate validity period and may have a permanent validity period. Also, for example, the validity period of the permission can be set to while subscribed to the app. Also, for example, Platform Company A and B can always have Viewer rights, and Platform Company C can have rights until the end of 22 years. For example, when a server device receives a permission request from a specific device (e.g. Financial Company B), it can be set to have permission for a predetermined period of time (e.g. a week).
  • a predetermined period of time e.g. a week
  • Viewer items may be designated one by one, such as Platform Company A, B, and C, but may be set according to a preset Preset.
  • the server device can enable all job platform companies to view my NFT CV, and financial-related companies can view it at a specific point in time (e.g., 2022).
  • the server device is an object that transmitted the combined TC to generate TC data (e.g., in the case of the first TC data 513, the first device 501-1 and the second device 502-1) Since each TC has been received from , it can be determined that the first device 501-1 and the second device 502-1) have third authority over the TC data.
  • the server 130 has the first device 501-1, the second device 502-1, the third device 502-3, and App01 as the first authority for the first TC data 512.
  • the first TC table 513 can be created so that the first device 501-1 and the second device 501-2 have the second authority and the third authority.
  • the server device may receive TC data of a second device for a second task from a second device, and may receive TC of another first device for a second task from another first device.
  • the server device may generate second TC data based on the TC of the second device for the second task and the TC of another first device for the second task.
  • the server device may create a second TC table containing information about devices and applications that have access to the second TC data.
  • the server 130 receives the TC of the second device for the second task from the second device 502-1 and the TC of the first device for the second task from the first device 501-1. TC can be received.
  • the server 130 may generate the second TC data 514 based on the TC of the second device 502-1 for the second task and the TC of the first device 501-2 for the second task. there is.
  • the server 130 is a device having access to the second TC data 514 (e.g., first authority: second device 502-1, second device 502-2, third device 502- 3), a second TC table 515 containing information about the fourth device (502-4), second authority: application (App01)) can be created.
  • the server device may generate the first CV by combining the first TC data and the second TC data.
  • the server device may create a first CV table containing information about devices and applications that have access to the first CV.
  • the server 130 may generate the first CV 532 by combining the first TC data 512 and the second TC data 514 through the aggregator 522.
  • the server 130 may create a first CV table 533 containing information about devices and applications that have access to the first CV 532.
  • the server 130 may receive a TC of another first device for a third task from another first device and receive a TC of another second device for a third task from another second device. there is.
  • the server device may generate third TC data based on the TC of another first device for the third task and the TC of the other second device for the third task.
  • the server device may set up a third TC table containing information about devices and applications that have access to third TC data. For example, in one embodiment, the server 130 receives the TC of the first device 501-2 for the third task from the first device 501-2, and the second device 502-2 The TC of the second device 502-2 for the third task may be received from.
  • the server 130 may generate third TC data 516 based on the TC of the first device 5021-2 for the third task and the TC of the second device 502-2 for the third task. there is.
  • the server 130 provides information about devices and applications that have access to the third TC data 516 (e.g., the third authority includes the first device 501-2, the second device 502-2, and the third device 501-2).
  • 1 authority is the second device (502-1), the second device (502-2), the third device (502-3), the fourth device (502-4), the second authority is the third device including APP01)
  • the TC table 533 can be set.
  • the server device may combine the second TC data and the third TC data to generate a second CV, the second CV including information about devices and applications that have access to the second CV.
  • the server 130 may generate the second CV 534 by combining the second TC data 514 and the third TC data 516 through the aggregator 524.
  • the server 130 may create a second CV table 535 that includes information about devices and applications that have access to the second CV 534.
  • Figure 7 shows the operation flow of a server device according to an embodiment.
  • the server device may receive a CV access request from a third device.
  • a CV access request may include a request to view or modify a CV.
  • the server device may determine whether the third device has CV access authority in response to receiving the CV access request. In one embodiment, the server device may determine whether the third device has CV access authority based on the CV table for the CV corresponding to the CV access request. For example, if a third device is included in the access authority table of the CV corresponding to the CV access request, it may be determined that the third device has CV access authority. If the third device is not included in the access authority table of the CV corresponding to the CV access request, the server device may determine that the third device does not have CV access authority.
  • the server device when the server device determines that the third device has CV access authority, it may transmit data related to the CV corresponding to the CV access request to the third device.
  • the server device when the server device determines that the third device does not have CV access authority, it transmits an access permission request to at least one device that has access authority to the CV corresponding to the CV access request. can do.
  • the server device when receiving an access authorization response from at least one device with access authority, may transmit data related to the CV to the third device. In one embodiment, when an access authorization response is not received from at least one device with access authority, a rejection may be transmitted to a third device.
  • Figure 8 shows the operation flow of a server device according to an embodiment.
  • the server device may receive a TC modification request from the fourth device. If there is incorrect information in the TC or something needs to be added, it can be modified. However, an entity with the authority to modify the TC (e.g., the employer who created the TC, the worker who performed the task of the TC) needs to modify it. There is.
  • the server device may determine whether a second authority or a third authority for the TC exists in the fourth device.
  • the server device may determine whether the fourth device has second authority or third authority for the TC based on whether the fourth device is included in the TC table.
  • the server device may modify the TC corresponding to the TC modification request.
  • the server device determines that the second authority or the third authority does not exist in the fourth device, in operation 840, the server device grants the third authority to the TC based on the TC's access authority table.
  • a modification confirmation request can be sent to the device having the modification.
  • the server device when the server device receives a modification authorization response from a device with third authority, the server device may modify the TC table by reflecting the modification requested by the fourth device.
  • the server device may send a rejection to the fourth device.
  • the server device when the server device receives a CV access request from a specific application, all CVs given to the specific application with Acting permission can be sent to the specific application.
  • data received by the server device 130 from the electronic device 110 may be stored in the memory of the server device (e.g., memory 134), on an external server (e.g., cloud server), or on the node 152 of the blockchain network 150.
  • a method of operating a server device includes receiving a TC (task contract) of the first device for a first task from a first device, matching with the first device. ), an operation of receiving, from a second device, a TC of the second device for the first task, a TC of the first device for the first task, and a TC of the second device for the first task.
  • TC task contract
  • a method of operating a server device includes receiving a TC of the second device for a second task from the second device, receiving the TC for the second task from a first device different from the first device. An operation of receiving a TC of another first device, an operation of generating second TC data based on the TC of the second device for the second task and the TC of the other first device for the second task, An operation of setting a second TC table containing information about devices and applications having access rights to second TC data, wherein the second TC table may include the other first device and the second device. there is.
  • a method of operating a server device includes generating a first CV by combining the first TC data and the second TC data, and information about devices and applications having access to the first CV.
  • An operation of setting a first CV table including, and the first CV table may include the second device.
  • a method of operating a server device includes receiving a TC of the other first device for a third task from the other first device, receiving a TC of the other first device for the third task from the other second device.
  • An operation of setting a third TC table containing information about devices and applications having access to TC data, and the third TC table may include the other first device and the other second device.
  • a method of operating a server device includes generating a second CV by combining the second TC data and the third TC data, and information about devices and applications having access to the second CV.
  • a method of operating a server device includes receiving a CV access request from a third device, and in response to receiving the CV access request, determining whether the third device has CV access authority; If the third device determines that the third device has CV access authority, transmitting data related to the CV corresponding to the CV access request to the third device. If the third device determines that the third device does not have CV access authority, the third device transmits data related to the CV corresponding to the CV access request. It may include transmitting an access permission request to at least one device that has access authority to the CV corresponding to the CV access request.
  • the operating method of the server device includes, when the third device is included in the access authority table of the CV corresponding to the CV access request, determining that the third device has CV access authority, If the third device is not included in the access authority table of the CV corresponding to the CV access request, it may include determining that the third device does not have CV access authority.
  • the method of operating the server device includes the following: a first authority that allows only viewing, a second authority that allows viewing and modification, and a third authority that allows viewing, modification, and granting of authority. May include permissions.
  • an operating method of a server device includes receiving a TC modification request from a fourth device, and in response to receiving the TC modification request, determining whether the fourth device has the second authority or the third authority. An operation of determining whether the fourth device has the second authority or the third authority, an operation of modifying TC data corresponding to the TC modification request, if the fourth device determines that the second authority or the third authority is When it is determined that there is no third authority, the method may include transmitting a modification confirmation request to a device with the third authority for the TC based on the access authority table of the TC.
  • the operating method of the server device includes receiving a modification permission response in response to the modification confirmation request sent to the device having the third authority for the TC, and responding to receiving the modification authorization response. This may include an operation of modifying the TC data.
  • a server device includes a memory, a communication unit, and at least one processor electrically connected to the memory and the communication unit, wherein the at least one processor receives a first task from a first device. ), receive a TC (task contract) of the first device for the first device, receive a TC of the second device for the first task from a second device matching the first device, and 1 Generating first TC data based on the TC of the first device for the task and the TC of the second device for the first task, and relating to a device and an application having access to the first TC data Set a first TC table containing information, the first TC table includes the first device and the second device, and one of the first device and the second device performs the first task.
  • a device corresponds to a worker, and the other device may correspond to an employer who provides the first task to the worker.
  • the server device receives the TC of the second device for the second task from the second device, and receives the TC of the second device for the second task from the first device and the other first device. Receive a TC of, generate second TC data based on the TC of the second device for the second task and the TC of the other first device for the second task, and generate second TC data for the second TC data.
  • a second TC table containing information about devices and applications with access rights is set, and the second TC table may include the other first device and the second device.
  • the server device generates a first CV by combining the first TC data and the second TC data, and includes information about a device and an application having access to the first CV.
  • 1 CV table is set, and the first CV table may include the second device.
  • the server device receives the TC of the other first device for the third task from the other first device, and receives the TC of the other second device for the third task from the other second device. Receive, generate third TC data based on the TC of the other first device for the third task and the TC of the other second device for the third task, and have access to the third TC data.
  • a third TC table containing information about devices and applications is set, and the third TC table may include the other first device and the other second device.
  • the at least one processor generates a second CV by combining the second TC data and the third TC data, and the device and application have access to the second CV.
  • a second CV table containing information about may be generated, and the second device, the other first device, and the other second device may be included in the second CV table.
  • the server device receives a CV access request from a third device, and in response to receiving the CV access request, determines whether the third device has CV access authority, and determines whether the third device has CV access authority. If it is determined that there is CV access authority, data related to the CV corresponding to the CV access request is sent to the third device, and if the third device determines that there is no CV access authority, data related to the CV corresponding to the CV access request is sent to the third device.
  • An access permission request may be sent to at least one device that has access authority to the CV.
  • the server device determines that the third device has CV access authority when the third device is included in the access authority table of the CV corresponding to the CV access request, and responds to the CV access request. If the third device is not included in the access authority table of the corresponding CV, it may be determined that the third device does not have CV access authority.
  • the access rights to the TC or CV include a first right to view only, a second right to view and modify, and a third right to view, modify, and grant permission. can do.
  • the server device receives a TC modification request from a fourth device, and in response to receiving the TC modification request, determines whether the fourth device has the second authority or the third authority, and , if the fourth device determines that it has the second authority or the third authority, modify the TC data corresponding to the TC modification request, and determine that the fourth device does not have the second authority or the third authority. If determined, a modification confirmation request may be transmitted to the device with the third authority for the TC based on the access authority table of the TC.
  • the server device may store the TC of the first device, the TC of the second device, first TC data, and a first TC table in the memory.
  • Server devices may be of various types. Server devices may include, for example, display devices, portable communication devices (eg, smartphones), computer devices, portable multimedia devices, portable medical devices, cameras, wearable devices, or home appliance devices.
  • the server device according to the embodiment of this document is not limited to the above-described devices.
  • Server devices may be of various types. Server devices may include, for example, display devices, portable communication devices (eg, smartphones), computer devices, portable multimedia devices, portable medical devices, cameras, wearable devices, or home appliance devices.
  • the server device according to the embodiment of this document is not limited to the above-described devices.
  • unit or “module” used in various embodiments of this document may include a unit implemented with hardware, software, or firmware, for example, logic, logic block, component, or circuit. Can be used interchangeably with the same term.
  • the “ ⁇ part” or “ ⁇ module” may be an integrated part or a minimum unit of the part or a part thereof that performs one or more functions.
  • “ ⁇ unit” or “ ⁇ module” may be implemented in the form of an application-specific integrated circuit (ASIC).
  • ASIC application-specific integrated circuit
  • if used in various embodiments of this document means “when” or “when” or “in response to determining” or “in response to detecting,” depending on the context. It can be interpreted. Similarly, “when it is determined” or “when it is detected” is taken to mean “when determining” or “in response to determining,” or “when detecting” or “in response to detecting,” depending on the context. It can be interpreted.
  • the program executed by the server device 200 described throughout this document may be implemented with hardware components, software components, and/or a combination of hardware components and software components.
  • a program can be executed by any system that can execute computer-readable instructions.
  • Software may include a computer program, code, instructions, or a combination of one or more of these, which may configure a processing unit to operate as desired, or may be processed independently or collectively. You can command the device.
  • Software may be implemented as a computer program including instructions stored on computer-readable storage media.
  • Computer-readable storage media include, for example, magnetic storage media (e.g., ROM (Read-Only Memory), RAM (Random-Access Memory), floppy disk, hard disk, etc.) and optical read media (e.g., CD-ROM). (CD-ROM), DVD (Digital Versatile Disc), etc.
  • the computer-readable storage medium is distributed across networked computer systems, so that computer-readable code can be stored and executed in a distributed manner.
  • Computer programs may be distributed (e.g., downloaded or uploaded) online, through an application store (e.g., Play StoreTM) or directly between two user devices (e.g., smart phones).
  • an application store e.g., Play StoreTM
  • two user devices e.g., smart phones
  • at least a portion of the computer program product may be at least temporarily stored or temporarily created in a machine-readable storage medium, such as the memory of a manufacturer's server, an application store server, or a relay server.
  • each component (e.g., module or program) of the above-described components may include a single or plural entity, and some of the plurality of entities may be separately placed in other components. there is.
  • one or more of the components or operations described above may be omitted, or one or more other components or operations may be added.
  • multiple components eg, modules or programs
  • the integrated component may perform one or more functions of each component of the plurality of components identically or similarly to those performed by the corresponding component of the plurality of components prior to the integration. .
  • operations performed by a module, program, or other component may be executed sequentially, in parallel, iteratively, or heuristically, or one or more of the operations may be executed in a different order, or omitted. Alternatively, one or more other operations may be added.

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Human Resources & Organizations (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Strategic Management (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Economics (AREA)
  • General Business, Economics & Management (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • Operations Research (AREA)
  • General Engineering & Computer Science (AREA)
  • Marketing (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Data Mining & Analysis (AREA)
  • Computer Hardware Design (AREA)
  • Development Economics (AREA)
  • Educational Administration (AREA)
  • Game Theory and Decision Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

La divulgation concerne un procédé de fonctionnement d'un appareil serveur. Le procédé de fonctionnement de l'appareil serveur selon un mode de réalisation de la présente divulgation comprend les opérations consistant à : recevoir un contrat de tâche (TC) d'un premier appareil pour une première tâche en provenance du premier appareil ; recevoir un TC d'un second appareil pour la première tâche en provenance du second appareil correspondant au premier appareil ; générer des premières données TC sur la base du TC du premier appareil pour la première tâche et du TC du second appareil pour la première tâche ; et configurer une première table TC comprenant des informations concernant un appareil et une application ayant une autorité d'accès sur les premières données TC, la première table TC comprenant le premier appareil et le second appareil, l'un quelconque du premier appareil et du second appareil correspondant à un travailleur qui effectue la première tâche, et l'autre appareil pouvant correspondre à un employeur qui fournit la première tâche au travailleur.
PCT/KR2023/016631 2022-10-26 2023-10-25 Appareil serveur de gestion de reprise et son procédé de fonctionnement WO2024090984A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
KR10-2022-0139563 2022-10-26
KR1020220139563A KR102518917B1 (ko) 2022-10-26 2022-10-26 이력서를 관리하기 위한 서버 장치 및 그 동작 방법

Publications (1)

Publication Number Publication Date
WO2024090984A1 true WO2024090984A1 (fr) 2024-05-02

Family

ID=85984842

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/KR2023/016631 WO2024090984A1 (fr) 2022-10-26 2023-10-25 Appareil serveur de gestion de reprise et son procédé de fonctionnement

Country Status (2)

Country Link
KR (1) KR102518917B1 (fr)
WO (1) WO2024090984A1 (fr)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR102518917B1 (ko) * 2022-10-26 2023-04-10 주식회사 엔터프라이즈블록체인 이력서를 관리하기 위한 서버 장치 및 그 동작 방법

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20090002252A (ko) * 2007-06-25 2009-01-09 에스케이 텔레콤주식회사 협업 문서 작성 시스템 및 방법
KR20200083210A (ko) * 2019-11-25 2020-07-08 김승수 블록체인 기반의 직업적성평가 및 인력채용 시스템 및 방법
KR102213296B1 (ko) * 2020-05-07 2021-02-05 황정훈 블록체인 기반의 일자리 매칭 시스템 및 그 운영 방법
KR20210055403A (ko) * 2019-11-07 2021-05-17 이중찬 위치 기반 일자리 추천 시스템 및 방법
KR102338589B1 (ko) * 2021-06-22 2021-12-10 임천운 블록체인 기반의 신분증을 이용한 선행포인트 관리 시스템
KR102397793B1 (ko) * 2022-01-20 2022-05-13 주식회사 잡앤피플연구소 채용 시스템
KR102518917B1 (ko) * 2022-10-26 2023-04-10 주식회사 엔터프라이즈블록체인 이력서를 관리하기 위한 서버 장치 및 그 동작 방법

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR102236897B1 (ko) * 2018-12-17 2021-04-07 주식회사 렙딥 영상 데이터 위변조 방지 방법 및 시스템

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20090002252A (ko) * 2007-06-25 2009-01-09 에스케이 텔레콤주식회사 협업 문서 작성 시스템 및 방법
KR20210055403A (ko) * 2019-11-07 2021-05-17 이중찬 위치 기반 일자리 추천 시스템 및 방법
KR20200083210A (ko) * 2019-11-25 2020-07-08 김승수 블록체인 기반의 직업적성평가 및 인력채용 시스템 및 방법
KR102213296B1 (ko) * 2020-05-07 2021-02-05 황정훈 블록체인 기반의 일자리 매칭 시스템 및 그 운영 방법
KR102338589B1 (ko) * 2021-06-22 2021-12-10 임천운 블록체인 기반의 신분증을 이용한 선행포인트 관리 시스템
KR102397793B1 (ko) * 2022-01-20 2022-05-13 주식회사 잡앤피플연구소 채용 시스템
KR102518917B1 (ko) * 2022-10-26 2023-04-10 주식회사 엔터프라이즈블록체인 이력서를 관리하기 위한 서버 장치 및 그 동작 방법

Also Published As

Publication number Publication date
KR102518917B1 (ko) 2023-04-10

Similar Documents

Publication Publication Date Title
WO2024090984A1 (fr) Appareil serveur de gestion de reprise et son procédé de fonctionnement
WO2021010766A1 (fr) Dispositif et procédé d'authentification électronique faisant appel à une chaîne de blocs
WO2018194379A1 (fr) Procédé d'approbation de l'utilisation d'une carte à l'aide d'un identificateur de jeton sur la base d'une chaîne de blocs et structure en arbre de merkle associée à celui-ci, et serveur l'utilisant
US11113377B2 (en) Authentication system, and information recording medium
WO2013025085A2 (fr) Appareil et procédé permettant de prendre en charge un nuage de famille dans un système informatique en nuage
WO2015041490A1 (fr) Appareil et procédé au moyen desquels un dispositif d'utilisateur dans un système de réseau domestique transmet des informations associées à un dispositif domestique
WO2012144850A2 (fr) Système de livraison d'article cadeau à l'aide d'informations de réseau social et son procédé
WO2013176474A1 (fr) Application permettant d'utiliser un terminal de communication mobile à titre de terminal de paiement, procédé et système de fournisseur de services d'applications
WO2015020360A1 (fr) Procédé et dispositif pour enregistrer et certifier un dispositif dans un système de communications sans fil
WO2013141602A1 (fr) Procédé d'authentification et système pour ce procédé
WO2021006531A1 (fr) Procédé et système pour fournir une plateforme de production et de distribution
WO2012169865A2 (fr) Procédé et système de gestion de carte de visite sur internet
WO2013168861A1 (fr) Système et procédé d'intermédiation des paiements
JP7194391B2 (ja) システム中にメールボックアカウントとインスタントメッセージアカウントの内容の操作権限を与える方法
WO2020034527A1 (fr) Procédé, appareil, et dispositif de chiffrement et d'autorisation d'informations personnelles d'utilisateur, et support de stockage lisible
US20100022218A1 (en) Administration and service system for wireless terminal display devices
WO2024043613A1 (fr) Dispositif serveur pour fournir un service de gestion et de génération de curriculum vitae, et son procédé de fonctionnement
WO2024117667A1 (fr) Serveur de gestion de données nft et son procédé de fonctionnement
WO2024117668A1 (fr) Dispositif comprenant un gestionnaire d'agrégateurs pour gérer une pluralité d'agrégateurs, et procédé de fonctionnement associé
WO2024117670A1 (fr) Serveur de génération et de gestion de données avec intégrité et son procédé de fonctionnement
JP4809723B2 (ja) ユーザ認証サーバ、ユーザ管理サーバ、ユーザ端末、ユーザ認証プログラム、ユーザ管理プログラム及びユーザ端末プログラム
WO2019225850A1 (fr) Procédé et appareil de traitement d'informations de certificat
WO2018021864A1 (fr) Procédé pour fournir un service en nuage
WO2022215858A1 (fr) Système de service multimédia local pour étendre des droits de téléchargement de contenu local par émission d'un ticket de voyage
WO2019221309A1 (fr) Procédé et appareil de gestion de tickets