WO2020162739A1 - 칩 고유값 기반의 가상코드를 이용하여 장치를 식별하는 방법, 프로그램 및 장치 - Google Patents
칩 고유값 기반의 가상코드를 이용하여 장치를 식별하는 방법, 프로그램 및 장치 Download PDFInfo
- Publication number
- WO2020162739A1 WO2020162739A1 PCT/KR2020/003192 KR2020003192W WO2020162739A1 WO 2020162739 A1 WO2020162739 A1 WO 2020162739A1 KR 2020003192 W KR2020003192 W KR 2020003192W WO 2020162739 A1 WO2020162739 A1 WO 2020162739A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- virtual code
- code
- virtual
- chip
- detailed codes
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 70
- 238000012795 verification Methods 0.000 claims abstract description 137
- 238000010845 search algorithm Methods 0.000 claims description 25
- 238000013475 authorization Methods 0.000 claims description 13
- 230000002159 abnormal effect Effects 0.000 claims description 12
- 239000000284 extract Substances 0.000 abstract description 4
- 230000006870 function Effects 0.000 description 61
- 238000004891 communication Methods 0.000 description 12
- 238000010586 diagram Methods 0.000 description 10
- 238000012545 processing Methods 0.000 description 8
- 238000005516 engineering process Methods 0.000 description 5
- 239000004065 semiconductor Substances 0.000 description 4
- 230000000694 effects Effects 0.000 description 3
- 230000007774 longterm Effects 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000006698 induction Effects 0.000 description 1
- 238000003780 insertion Methods 0.000 description 1
- 230000037431 insertion Effects 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000001151 other effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/10—Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/18—Payment architectures involving self-service terminals [SST], vending machines, kiosks or multimedia terminals
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/20—Point-of-sale [POS] network systems
- G06Q20/202—Interconnection or interaction of plural electronic cash registers [ECR] or to host computer, e.g. network details, transfer of information from host to ECR or from ECR to ECR
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/20—Point-of-sale [POS] network systems
- G06Q20/204—Point-of-sale [POS] network systems comprising interface for record bearing medium or carrier for electronic funds transfer or payment credit
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/308—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using the Internet of Things
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/322—Aspects of commerce using mobile devices [M-devices]
- G06Q20/3223—Realising banking transactions through M-devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/322—Aspects of commerce using mobile devices [M-devices]
- G06Q20/3229—Use of the SIM of a M-device as secure element
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/325—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices using wireless networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/326—Payment applications installed on the mobile devices
- G06Q20/3265—Payment applications installed on the mobile devices characterised by personalisation for use
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/327—Short range or proximity payments by means of M-devices
- G06Q20/3278—RFID or NFC payments by means of M-devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/341—Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/351—Virtual cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/385—Payment protocols; Details thereof using an alias or single-use codes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/409—Device specific authentication in transaction processing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/409—Device specific authentication in transaction processing
- G06Q20/4097—Device specific authentication in transaction processing using mutual authentication between devices and transaction partners
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/0806—Details of the card
- G07F7/0813—Specific details related to card security
- G07F7/0826—Embedded security module
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0853—Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3228—One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/068—Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/69—Identity-dependent
- H04W12/72—Subscriber identity
Definitions
- the present invention relates to a method, a program, and a device for identifying a device using a virtual code based on a chip-specific value, and more particularly, a method for identifying a device using a virtual code that is not duplicated at each time point, a program And an apparatus.
- Code shape data is used in many areas.
- the card number and account number used at the time of payment, as well as the IPIN number and resident registration number for user identification are code data.
- drone is a generic term for an airplane or helicopter-shaped military unmanned aerial vehicle (UAV) capable of flying and controlling by induction of radio waves without a pilot.
- UAV unmanned aerial vehicle
- the problem to be solved by the present invention is to provide a method, a program, and a device for identifying a device using a virtual code generated based on an inherent value of a chip inside the device without a separate procedure for identifying the device.
- a problem to be solved by the present invention is to provide a method, program, and apparatus for generating a virtual code that is not duplicated whenever a code for identifying a device is requested.
- the problem to be solved by the present invention is to provide a device identification method, a program, and a device that can be used by adding only an algorithm without changing an existing process.
- a method of identifying a device using a virtual code based on a chip-specific value according to an aspect of the present invention for solving the above-described problem includes the steps of: receiving a virtual code generated by a virtual code verification means by a virtual code generating means, The virtual code verification means extracting a plurality of detailed codes included in the virtual code, and the virtual code verification means searching for a storage location of an actual code based on the plurality of detailed codes, and the virtual code verification means
- the code is generated based on an intrinsic value previously assigned to the chip inside the virtual code generating means, and is generated by combining the plurality of detailed codes, and the plurality of detailed codes are used to search the storage location of the real code. It has a correlation and changes for each unit count, and the unit count is set at a specific time interval and changes as the time interval elapses.
- the virtual code verification means includes a search algorithm, and the search algorithm passes through a stopover point corresponding to at least one detail code among the plurality of detail codes, and the plurality of detail codes from the transit point It is to search for the storage location of the actual code by calculating based on the correlation between the two.
- the plurality of detailed codes include a first code and a second code
- the search algorithm passes through a transit point corresponding to the first code, and from the transit point, the first code and the The calculation is based on the correlation of the second code to search for the storage location of the actual code.
- the virtual code generating means is a control device
- the virtual code is generated by using the intrinsic value of the chip included in the control device as seed data, the intrinsic value of the chip included in the control device Is a serial number that is not duplicated for each control device.
- the method further comprises the step of confirming, by the virtual code verification means, whether or not the control device is authorized, and when the received virtual code is a normal virtual code, the authorization information for the registered control device is checked, and If the received virtual code is not an abnormal virtual code or a virtual code generated at the present time, it is determined as an unauthorized control device.
- the method further comprises, when the virtual code generating means is a SIM card, the virtual code is generated by using the intrinsic value of the chip included in the SIM card as seed data, and the intrinsic value of the chip included in the SIM card Is an ICCID or IMSI that is not duplicated for each SIM card.
- the method further comprises the step of verifying the virtual code by determining whether the virtual code verification means matches the received virtual code received from the virtual code generation means and the generated virtual code generated in the virtual code verification means.
- the virtual code generation means and the virtual code verification means include the same virtual code generation function.
- the method further includes registering the unique value of the virtual code generating means with the virtual code verifying means.
- the virtual code generating means may be a control device or a SIM card.
- the method includes the steps of generating a plurality of detailed codes by a virtual code generation means, generating a virtual code by combining the plurality of detailed codes by the virtual code generation means, and the virtual code generation means And providing the virtual code to the outside, wherein the virtual code is generated based on a unique value previously assigned to the chip inside the virtual code generating means, and the plurality of detailed codes are stored by the virtual code verification means It has a correlation to search for a location, and is changed for each unit count, and the unit count is set at a specific time interval and is changed as the time interval elapses.
- the virtual code verification means includes a search algorithm, and the search algorithm passes through a stopover point corresponding to at least one detail code among the plurality of detail codes, and the plurality of detail codes from the transit point The storage location of the actual code is searched by calculating based on the correlation between the two.
- a program for identifying a device using a virtual code based on a chip unique value according to another aspect of the present invention for solving the above-described problem is combined with hardware to execute the above-mentioned device identification method, and is stored in a medium. .
- a virtual code receiving unit in which the virtual code verification means receives the virtual code generated by the virtual code generation means.
- the virtual code verification means extracts a plurality of detailed codes included in the virtual code, the detailed code extracting unit and the virtual code verification means search for a storage location of the actual code based on the plurality of detailed codes.
- a code search unit wherein the virtual code is generated based on a unique value previously assigned to a chip inside the virtual code generating means, and is generated by combining the plurality of detailed codes, and the plurality of detailed codes are It has a correlation to search for the storage location of the code, and is changed for each unit count, and the unit count is set at a specific time interval and is changed as the time interval elapses.
- An apparatus for generating a virtual code based on a chip intrinsic value for solving the above-described problem, a detailed code generation unit, wherein the virtual code generation means generates a plurality of detailed codes, A virtual code generation unit for generating a virtual code by combining the plurality of detailed codes, and
- the virtual code generation means includes a virtual code providing unit that provides the virtual code to the outside, and the virtual code is generated based on a unique value previously assigned to a chip inside the virtual code generation means, and the plurality of The detailed code has a correlation for the virtual code verification means to search for the storage location of the actual code, and is changed for each unit count, and the unit count is set at a specific time interval and is changed as the time interval elapses.
- the virtual code for device identification is generated based on an internal value of the device, it is possible to accurately identify the device because it is not duplicated regardless of the time when the virtual code is generated.
- an algorithm for generating a virtual code and searching for an actual code need only be added to the virtual code generating device and the virtual code verification device, so that the existing process can be maintained as it is.
- FIG. 1 is a block diagram of a system for identifying a device using a virtual code based on a chip eigenvalue according to an embodiment of the present invention.
- FIG. 2 is a block diagram of an apparatus for generating a virtual code based on a chip eigenvalue according to an embodiment of the present invention.
- FIG. 3 is a block diagram of an apparatus for verifying a virtual code based on a chip eigenvalue according to an embodiment of the present invention.
- FIG. 4 is a block diagram of an apparatus for verifying a virtual code based on a unique value of a chip further including a virtual code verification unit according to an embodiment of the present invention.
- FIG. 5 is a flowchart schematically illustrating a method of identifying a device using a virtual code based on a chip eigenvalue according to an embodiment of the present invention.
- FIG. 6 is an exemplary diagram of a search algorithm for searching an actual code storage location by moving on a track based on a detailed code according to an embodiment of the present invention.
- FIG. 7 is a flowchart schematically illustrating a method of identifying a device using a virtual code based on a chip eigenvalue further comprising verifying a virtual code according to an embodiment of the present invention.
- FIG. 8 is a flowchart schematically illustrating a process of checking whether or not a control device is applied according to an embodiment of the present invention.
- unique value means a value given differently for each device.
- the unique value is a unique number assigned to the device itself or a chip included in the device.
- serial number assigned to a device or a chip included in the device
- IMSI Subscriber identification module card
- SIM card Subscriber identification module card
- chip refers to a component including an integrated circuit (IC) capable of storing and managing information on a device (eg, a unique value assigned to each device), and a system It is a concept that includes System on Chip (SoC).
- IC integrated circuit
- SoC System on Chip
- Applet refers to a small program composed of JAVA language or a very small application program (Application).
- character is an element constituting a code, and includes all or part of an uppercase alphabet, a lowercase alphabet, numbers, and special characters.
- code means a character string in which characters are listed.
- virtual code refers to a code that is temporarily generated to be connected to an actual code, and refers to a code of a specific number of digits made of characters.
- tail code refers to a code used to generate a virtual code. That is, when the virtual code is generated by combining a plurality of separately generated codes, the detailed code means an individual code that is separately generated and constitutes the virtual code.
- the "unit count” is a unit defined as being set at a specific time interval and changing as the time interval elapses. For example, 1 count may be set and used at a specific time interval (eg, 1.5 seconds).
- the "virtual code generation function” means a function used to generate a virtual code.
- the "detail code generation function” means a function that generates each detailed code constituting a virtual code.
- tail code combining function means a function for generating a virtual code by combining or combining a plurality of detail codes.
- FIG. 1 is a block diagram of a system for identifying a device using a virtual code based on a chip eigenvalue according to an embodiment of the present invention.
- a system 1000 for identifying a device using a virtual code based on a chip unique value includes a virtual code generating unit 10 and a virtual code verifying unit 20 do.
- the virtual code generation means 10 plays a role of generating a virtual code including information by which the virtual code verification means 20 can search for an actual code.
- the virtual code generation means 10 generates a virtual code based on an internal value of the device according to the virtual code generation function. That is, the virtual code generation means 10 generates a virtual code by using the chip-specific value inside the device as seed data.
- searching for the actual code is to search for the actual code itself, the storage location of the actual code, a value matching the storage location of the actual code, or a value corresponding to the storage location of the actual code.
- the "chip-specific value” is a value given differently so as not to be duplicated for each device at a specific point in time (eg, during manufacturing, during registration). For example, the serial number assigned differently for each device, the unique chip value in the IC card, the device identification value of the mobile device where the App Card is installed, the ICCID or IMSI of the SIM card (Subscriber identification module card), the semiconductor chip There is a unique number of, and is not limited to the above-described example and is an arbitrary value that can identify the device.
- the virtual code and the real code are codes that perform a corresponding role according to the type of the virtual code generating apparatus 100.
- the virtual code/real code corresponds to the virtual card number (or virtual token number)/real card number (or real token number).
- the virtual code/real code corresponds to the virtual device identification value/real device identification value.
- the roles of the virtual code and the real code are not limited to the above-described examples, and may be variously applied according to the role and purpose of the virtual code generating apparatus 100.
- the virtual code generating means 10 when the virtual code generating device 100 is an IC card, it may be implemented in the form of an applet in the IC card chip.
- the virtual code generating means 10 when the virtual code generating device 100 is a mobile terminal, it may be implemented in the form of an applet in the USIM included in the mobile terminal. Accordingly, the present invention can be implemented not only when the mobile terminal is a device that supports a near field communication (NFC) function, such as a smartphone, but also does not support the NFC function.
- NFC near field communication
- the present invention is applied by implementing the virtual code generating means 10 in the form of an applet in the USIM inserted in the 2G mobile phone. can do.
- the virtual code is generated through the applet implemented in the USIM, and the generated virtual code is output through the display unit.
- the user may transmit the virtual code to the virtual code verification device 200 or the virtual code verification device 200 to a device and a server that transmits the virtual code by directly inputting the output virtual code.
- the virtual code generation means 10 may not store the actual code. Through this, it is possible to prevent the real code from being leaked through hacking of the virtual code generation means 10. A detailed description of the virtual code generation function will be described later.
- the virtual code verification means 20 serves to search for an actual code based on the virtual code provided from the virtual code generation means 10.
- the virtual code verification means 20 stores the same virtual code generation function as the virtual code generation means 10 in order to search for an actual code from the virtual code received from the virtual code generation means 10. A detailed description of how the virtual code verification means 20 searches for an actual code based on the virtual code will be described later.
- the virtual code verification means 20 serves to verify whether the virtual code is a code normally generated by the virtual code generation means 10 or a code generated at the present time. A detailed description of the manner in which the virtual code verification means 20 determines whether the virtual code is normal will be described later.
- the virtual code verification means 20 may receive the virtual code from the virtual code generation means 10 through various methods.
- the virtual code verification means 20 may receive a virtual code from the virtual code generation means 10 through wireless communication.
- the virtual code generating device 100 including the virtual code generating means 10 includes an NFC antenna module, a Bluetooth communication module, etc.
- the virtual code is virtualized through communication with the virtual code verification device 200. It can be transmitted to the code verification device 200.
- the virtual code verification device 200 directly inputs and receives the virtual code generated by the virtual code generation device 100 on a mobile terminal connected to the virtual code verification device 200 through communication. can do.
- the virtual code verification means 20 may be transmitted from another server that has received the virtual code from the virtual code generation means 10.
- FIG. 2 is a block diagram of an apparatus for generating a virtual code based on a chip eigenvalue according to an embodiment of the present invention.
- an apparatus 100 for generating a virtual code based on a unique chip value includes a detailed code generation unit 110, a virtual code generation unit 120, and a virtual code providing unit ( 130).
- the virtual code generation apparatus 100 may be a device in which a program corresponding to the virtual code generation means 10 is embedded or a program corresponding to the virtual code generation means 10 is installed. .
- the virtual code generation device 100 includes an IC card with a built-in program corresponding to the virtual code generation means 10, a control device (for example, an IoT device, a drone, an unmanned vehicle, etc.), and financial automation. It may be a device (for example, an automated teller machine (ATM), a cash dispenser (CD) device, etc.), a mobile device in which an application corresponding to the virtual code generation means 10 is installed.
- the virtual code generation device 100 is not limited to the above-described example, and is an arbitrary device capable of generating and transmitting a virtual code.
- the virtual code generation unit 120 serves to generate a virtual code based on an inherent chip value inside the virtual code generation apparatus 100. That is, the virtual code generation unit 120 generates a virtual code by using a chip-specific value inside the virtual code generation apparatus 100 as seed data.
- the virtual code generation unit 120 plays a role of generating a virtual code by combining one or more detailed codes.
- the virtual code is generated by combining a plurality of detailed codes according to a specific rule.
- the virtual code generation apparatus 100 includes a virtual code generation function for generating a virtual code, and the virtual code generation function is a detailed code generation function for generating a plurality of detailed codes and a rule for combining a plurality of detailed codes (i.e. Code combining function).
- the virtual code generating apparatus 100 may generate a virtual code without external communication. That is, the virtual code generating apparatus 100 may generate a virtual code without receiving data from the outside.
- the virtual code generation device 100 when the virtual code generation device 100 is an IC card, a virtual code generation function is stored in an IC chip included in the IC card, and the virtual code generation function stores the intrinsic value and time data given to the IC chip. Generate virtual code based on it.
- the IC card may include a clock for measuring the time data.
- the IC card includes a battery for a clock that supplies power to the clock, but a battery for supplying power for driving other components other than the clock (for example, power required for generating and providing a virtual code Battery for supply) may not be provided. In this case, power for driving components other than the clock may be supplied from an external device (a financial transaction terminal, a financial automation device, etc.) at the time a financial transaction request is made by the user.
- the virtual code generating device 100 when the virtual code generating device 100 is a SIM card, a virtual code generating function is stored in an IC chip included in the SIM card, and the virtual code generating function is a unique value assigned to the IC chip. Generate virtual code based on time data.
- the SIM card may include a clock for measuring the time data.
- the characteristics of power supply may be applied in the same manner as in the example of the above-described IC card, and external power may be supplied from a user terminal into which the SIM card is inserted.
- the virtual code generation device 100 when the virtual code generation device 100 is a control device, a virtual code generation function is stored in a chip or semiconductor included in the control device, and the virtual code generation function is assigned to the chip or semiconductor. Generate virtual code based on eigenvalue and time data.
- the control device may include a clock for measuring the time data.
- Various methods may be applied as a method of generating one virtual code by combining a plurality of detailed codes.
- the virtual code generator 120 may generate a virtual code by alternately arranging an N-digit first code and an N-digit second code.
- the detailed code combining function may be a function combining the second code after the first code. As the number of detailed codes included in the virtual function increases, various detailed code combining functions can be generated.
- the detailed code generation unit 110 serves to generate one or more detailed codes.
- the virtual code generation function includes each detailed code generation function.
- the virtual code generation function generates a plurality of detailed codes using a plurality of detailed code generation functions, and generates a virtual code using a detailed code combining function that combines a plurality of detailed codes.
- the plurality of detailed codes have a correlation used by the virtual code verification means 20 to search for an actual code.
- the virtual code verification means 20 includes a search algorithm, and the search algorithm passes through a transit point corresponding to one or more detailed codes of the plurality of detailed codes. , It is possible to search for the storage location of the actual code by calculating based on the correlation between the plurality of detailed codes from the transit point. In this case, there may be one or more transit points, and there is no limit to the number.
- the plurality of detailed codes may include a first code and a second code
- the detailed code generation unit 110 is a detailed code generation function, which is a first function and a second function. Including, to generate the first code and the second code.
- the first code and the second code have a correlation for searching for the storage location of the actual code in the virtual code verification means 20, but the virtual code generation device 100 generates the first code to increase security.
- the first function and the second function for generating the second code are included as the detailed code generation function, and data on the correlation between the first code and the second code may not be included.
- the first code includes information on a transit point
- the second code includes information necessary for an operation that can reach the actual code storage location from the transit point. can do.
- the detailed code generation unit 110 may generate one or more detailed codes based on a unique value of a chip included in the device.
- the virtual code verification means 20 may receive the intrinsic value of the chip included in the virtual code generating device 100 and store it together in a storage location of the actual code or in a separate storage space connected to the actual code storage location.
- the virtual code generating device 100 provides the virtual code generated based on the chip's unique value to the virtual code verification means 20, the virtual code verification means 20 extracts the unique value of the chip stored therein to generate the actual code. Use it to search.
- the virtual code verification means 20 generates a virtual code by applying the extracted chip intrinsic value and time data to the virtual code generation function, and the virtual code (receive virtual code) received from the virtual code generation means 10 It is determined whether or not the addition code (generated virtual code) generated by the virtual code verification means 20 matches.
- the virtual code generation means 10 and the virtual code verification means 20 may include the same virtual code generation function.
- the virtual code verification device 200 since there may be a difference between the time when the virtual code generation device 100 generates the virtual code and the time when the virtual code is received by the virtual code verification device 200, the virtual code verification device 200 reduces a time delay.
- a virtual code within a specific time range (for example, within a specific count range based on the time when the virtual code is received) and check whether a value that matches the virtual code received from the virtual code generation device 100 exists. do. If the virtual code verification means 20 matches the received virtual code and the generated virtual code, it is determined as a normal virtual code.
- the virtual code verification means 20 may determine whether the virtual code is a normal virtual code, an abnormal virtual code, or a virtual code generated at the present time.
- the virtual code verification means 20 performs a process corresponding to the determination result. For example, when the virtual code generating device 100 is a control device, processing corresponding to the determination result is as follows.
- the virtual code verification means 20 checks the authorization information for the registered control device, and the received virtual code is an abnormal virtual code or at the present time. If it is not the generated virtual code, it can be determined as an unauthorized control device.
- the detailed code generation unit 110 In another embodiment of a method in which the detailed code generation unit 110 generates a detailed code, the detailed code generation unit 110 generates the detailed code by using an inherent value of a chip included in the device.
- one of a plurality of detailed codes may be generated as an OTP code.
- the OTP code may be generated by using an intrinsic value of a chip included in the device as seed data. Through this, even a detailed code generated at the same time may generate a different detailed code for each user or device.
- the detailed code generation unit 110 when a plurality of detailed codes includes a first code and a second code, the detailed code generation unit 110 generates an OTP code by using the chip-specific value inside the device as seed data, and the OTP code By generating a second code based on, it is possible to generate a second code that is not duplicated for each user or device at the same time.
- the detailed code generation unit 110 In another embodiment of the method in which the detailed code generation unit 110 generates a detailed code, the detailed code generation unit 110 generates a new detailed code for each unit count, and accordingly, the virtual code generation device 100 A new virtual code is generated for each count. Virtual codes that are newly generated for each unit count are not duplicated. Specifically, the detailed code generation unit 110 not only does not duplicate a virtual code newly generated for each unit count for a predetermined period for a specific user or a specific virtual code generation device 100, but also among users belonging to a specific group. It is set not to be duplicated.
- the virtual code providing unit 130 serves to provide a virtual code to the outside.
- the virtual code providing unit 130 directly provides the virtual code to the virtual code verification device 200, provides the virtual code to a device or server that delivers the virtual code to the virtual code verification device 200, or allows the user to directly check the virtual code. It may be provided to the display unit of the virtual code generation apparatus 100 so that the data can be input.
- the virtual code providing unit 130 may include various configurations capable of providing a virtual code to the outside.
- the virtual code providing unit 130 may include all or part of a wireless Internet module, a short range communication module, and a display unit.
- the wireless Internet module refers to a module for wireless Internet access, and may be built in or external to the virtual code generating apparatus 100.
- Wireless Internet technologies include WLAN (Wireless LAN) (Wi-Fi), Wibro (Wireless broadband), Wimax (World Interoperability for Microwave Access), HSDPA (High Speed Downlink Packet Access), LTE (long term evolution), LTE-A. (Long Term Evolution-Advanced) or the like may be used.
- the short-range communication module refers to a module for short-range communication.
- Short-range communication technology such as Bluetooth, Bluetooth Low Energy (BLE), Beacon, Radio Frequency Identification (RFID), Near Field Communication (NFC), Infrared Data Association (IrDA), UWB (Ultra Wideband), ZigBee, etc. may be used.
- FIG. 3 is a block diagram of an apparatus for verifying a virtual code based on a chip eigenvalue according to an embodiment of the present invention.
- an apparatus for verifying a virtual code based on a chip intrinsic value includes a virtual code receiving unit 210, a detailed code extracting unit 220, and an actual code searching unit 230. do.
- the virtual code verification device 200 is a device and a server in which a program corresponding to the virtual code verification means 20 is embedded or a program corresponding to the virtual code verification means 20 is installed. I can.
- the virtual code verification device 200 may be a device and a server that identify whether a specific control device is an authorized device.
- the virtual code generation device 100 is a drone
- the virtual code verification device 200 may identify the authorization state of the drone in flight.
- the virtual code received from the drone is a normal virtual code
- the virtual code generating apparatus 100 checks authorization information for the registered drone by matching the corresponding normal virtual code.
- Anti-drone treatment includes crashing, collecting, or returning drones by interfering with or disrupting radio waves, and there are no restrictions on how to do so.
- the virtual code verification apparatus 200 may be a card company server that performs payment by searching for an actual code after receiving a virtual code for a specific type of card of a specific card company held by a specific user. Specifically, in the case of card payment, the virtual code verification device 200 receives the virtual code generated by the virtual code generation device 100 through the POS device and the PG company server. When the received virtual code is a normal code, the virtual code verification device 200 approves the requested transaction. On the other hand, if the received virtual code is an abnormal virtual code or is not a virtual code generated at the moment, the requested transaction is rejected.
- the user may perform financial transactions (eg, cash deposit/withdrawal, remittance, account inquiry, etc.) through an automated financial device using the virtual code generating device 100.
- the virtual code verification apparatus 200 may be a financial institution server.
- the financial institution server After receiving the virtual code, the real code is searched.
- the virtual code generated by the user terminal which is the virtual code generating device 100
- the virtual code generation device 100 generates a virtual code from an app card installed in a user terminal or an applet in a USIM included in the user terminal.
- the user can request a financial transaction by directly inputting the virtual code output on the display unit of the user terminal into the ATM device.
- the virtual code verification device 200 approves and processes the requested financial transaction.
- the received virtual code is an abnormal virtual code or is not a virtual code generated at the moment, the requested financial transaction is rejected.
- the virtual code receiving unit 210 serves to receive a virtual code from the virtual code generating device 100.
- the virtual code receiving unit 210 may directly receive a virtual code from the virtual code generating device 100 or receive a virtual code generated by the virtual code generating device 100 through communication with another server. have.
- the detailed code extracting unit 220 serves to extract a plurality of detailed codes included in the virtual code.
- the virtual code is generated by combining a plurality of detailed codes according to specific rules.
- the detailed code extracting unit 220 includes the same detailed code combining function as the virtual code generating device 100 of a specific group, and the detailed code extracting unit 220 applies a detailed code combining function to Multiple detailed codes can be extracted from.
- the detailed code extracting unit 220 is a character arrangement of the virtual code.
- the first code and the second code can be separated by applying the detailed code combining function.
- the real code search unit 230 searches for a storage location of the real code based on a plurality of detailed codes.
- Various methods may be applied as a method in which the real code search unit 230 searches for an actual code storage location based on each detailed code.
- a correlation may be included between the detailed codes.
- the virtual code verification means 20 sets a movement path for searching the storage location of the actual code.
- the movement path is a sequence in which the virtual code verification means 20 searches for the storage location of the actual code based on the correlation of the plurality of detailed codes. That is, the virtual code verification means 20 searches for a storage location of an actual code according to a movement path and order set according to a correlation of a plurality of detailed codes.
- the virtual code verification means 20 operates based on the correlation between the plurality of detailed codes from the transit point via a transit point corresponding to at least one detailed code among a plurality of detailed codes, You can search the storage location. In this case, there may be one or more transit points, and there is no limit to the number.
- the virtual code is composed of a first code and a second code
- the first code includes information on the point of transit
- the second code is used in an operation to reach the storage location of the real code from the point of transit. You can include the necessary information. A specific example will be described later with reference to FIG. 6.
- the real code search unit 230 determines a search start point corresponding to the first code, and a second code from the search start point.
- the moved point can be found as the storage location of the actual code according to the search path corresponding to.
- the detailed code may include a first code for setting a starting point of the storage location search and a second code for setting a search path from the starting point to the storage location according to a specific search method.
- the virtual code verification device 200 starts searching based on the first code and the second code that are changed for each count. By setting the point and the search path, you can search the storage location of the actual code.
- the real code search unit 230 may include a search algorithm to find the storage location of the real code by using a plurality of detailed codes having correlations.
- the search algorithm is an algorithm that enables a storage location search when applying each detailed code included in the virtual code.
- the search algorithm is It is an algorithm that adjusts so that the storage location matching the actual code is placed at the corresponding location by performing an operation based on the information included in the second code through the transit point corresponding to the first code.
- the virtual code verification apparatus 200 can find the actual code storage location or a point matched to the storage location even if the first code and the second code included in the virtual code are changed.
- Various methods can be applied to the search algorithm. A detailed description of the search algorithm will be provided later.
- FIG. 4 is a block diagram of an apparatus for verifying a virtual code based on a unique value of a chip further including a virtual code verification unit according to an embodiment of the present invention.
- an apparatus for verifying a virtual code based on a chip intrinsic value further includes a virtual code verification unit 240.
- the virtual code verification unit 240 determines whether or not the virtual code received by the virtual code verification device 200 is authentic.
- the virtual code verification apparatus 200 may include the same virtual code generation function as the virtual code generation apparatus 100.
- the virtual code verification unit 240 determines whether the virtual code verification means matches the received virtual code received from the virtual code generation means 10 and the generated virtual code generated in the virtual code verification means 20 to determine the virtual code. Verify.
- FIG. 5 is a flowchart schematically illustrating a method of identifying a device using a virtual code based on a chip eigenvalue according to an embodiment of the present invention.
- a method of identifying a device using a virtual code based on a chip-specific value includes the steps of, by the virtual code verification means, receiving a virtual code provided from the virtual code generation means ( S300), the virtual code verification means extracting a plurality of detailed codes included in the virtual code (S400), the virtual code verification means searching for a storage location of the actual code based on the plurality of detailed codes (S500). Include.
- the virtual code verification means receives a virtual code provided from the virtual code generation means ( S300), the virtual code verification means extracting a plurality of detailed codes included in the virtual code (S400), the virtual code verification means searching for a storage location of the actual code based on the plurality of detailed codes (S500).
- Step S300 is a step in which the virtual code verification means 20 receives the virtual code provided by the virtual code generation means 10.
- the virtual code is generated in the virtual code generating device 100 and provided to the virtual code verification device 200.
- the virtual code verification device 200 directly receives the virtual code from the virtual code generation device 100, or receives a virtual code from the virtual code generation device 100 and transmits it to the virtual code verification device 200. It can be received from intermediate devices and servers.
- step S400 the virtual code verification means 20 extracts a plurality of detailed codes included in the virtual code received from the virtual code generation means 10.
- the virtual code verification means 20 includes a virtual code generation function included in the virtual code generation means 10, a rule (ie, a detailed code combination function) that combines a plurality of detailed codes is the same. Apply to extract multiple detailed codes. That is, the detailed code combining function corresponds to a rule for arranging a plurality of detailed codes, and is included in the virtual code generation function.
- a rule ie, a detailed code combination function
- step S500 the virtual code verification means 20 searches for a storage location of the actual code based on the plurality of detailed codes extracted in step S400.
- the plurality of detailed codes have correlations that allow the virtual code verification means 20 to search for the actual code. That is, the virtual code verification means 20 searches for an actual code storage location based on the correlation between the detailed codes.
- the virtual code verification means 20 includes a search algorithm, and the search algorithm passes through a transit point corresponding to one or more detailed codes of the plurality of detailed codes. , It is possible to search for the storage location of the actual code by calculating based on the correlation between the plurality of detailed codes from the transit point. In this case, there may be one or more transit points, and there is no limit to the number.
- the virtual code may be composed of a first code and a second code as detailed codes.
- the first code and the second code have a correlation that enables the virtual code verification means 20 to search for a storage location of the actual code.
- the first code may include information on a transit point
- the second code may include information necessary for an operation capable of reaching a storage location of an actual code from the transit point.
- the first code is generated by the sum of the count corresponding to the request time and the OTP code
- the second code is generated by subtracting the storage location value of the actual code from the first code. That is, an embodiment of the first code and the second code generated by the virtual code generation means 10 is as follows.
- the OTP (One time password) code is a code generated by the OTP code generation function included in the detailed code generation function, and is generated differently every time. Therefore, since the detailed code is generated differently according to the generation time of the virtual code, it is possible to prevent duplicate generation and enhance security.
- FIG. 6 is an exemplary diagram of a search algorithm for searching an actual code storage location by moving on a track based on a detailed code according to an embodiment of the present invention.
- the virtual code verification means 20 includes a search algorithm, and the search algorithm moves on the track based on a plurality of detailed codes constituting the virtual code, and moves to a point matched to the actual code storage location. Search the actual code.
- the point matched with the real code storage location may be a point on the track corresponding to the count (ie, time point) of which the real code was issued to the virtual code generating means.
- a virtual code includes a first code and a second code as a plurality of detailed codes generated based on a time elapsed from a time when the virtual code generation function is driven.
- the code value (first code value) corresponding to the first code is a value obtained by adding the OTP code value from the count corresponding to the current time point based on the time point at which the virtual code generation function is driven.
- the first code value serves as a transit point in the actual code search process.
- the code value (second code value) corresponding to the second code is a value obtained by subtracting the storage location value of the actual code from the first code value. Further, the second code value is a count from the point of transit (first code value) to the actual code storage position value.
- the virtual code verification means 20 passes the count on the track matching the first code value to the transit point, and moves along the track in a direction set by a count corresponding to the second code value.
- the virtual code generation means 10 searches for a point on the track at the time of issuing the actual code (that is, a point matched to the actual code storage location).
- FIG. 7 is a flowchart schematically illustrating a method of identifying a device using a virtual code based on a chip-specific value further comprising verifying a virtual code according to an embodiment of the present invention.
- step S600 the virtual code verification means 20 verifies whether the virtual code received from the virtual code generation means 10 is a normal virtual code. That is, the virtual code verification means 20 determines whether the virtual code received from the virtual code generation means 10 is a normal virtual code, an abnormal virtual code, or a virtual code generated at the present time.
- the virtual code verification means 20 verifies whether it corresponds to a normally generated virtual code (normal virtual code) by applying an inverse function corresponding to the detailed code generation function. For example, when the virtual code is composed of a first code and a second code, the virtual code verification means 20 applies an inverse function to the first function and the second function for generating the first code and the second code. So, you can verify whether the virtual code is normal.
- a normally generated virtual code normal virtual code
- the virtual code verification means 20 includes the same virtual code generation function as the virtual code generation means 10.
- the virtual code verification means 20 checks and receives the virtual code generated by the same virtual code generation function as the virtual code generation means 10 and the received virtual code received from the virtual code generation means 10. You can verify whether the virtual code is a normally generated virtual code.
- the virtual code verification device 200 reduces a time delay.
- a virtual code within a specific time range (for example, within a specific count range based on the time when the virtual code is received) to check whether a value that matches the virtual code received from the virtual code generation device 100 exists. I can. In other words, the virtual code can be verified by applying the error tolerance.
- FIG. 8 is a flowchart schematically illustrating a process of checking whether or not a control device is applied according to an embodiment of the present invention.
- the virtual code generating device 100 may be a control device.
- the virtual code verification device 200 receives a virtual code from the virtual code generation device 100.
- the virtual code verification apparatus 200 verifies whether the received virtual code is a normal virtual code, and performs a process corresponding to the verification result.
- Step S610 is a step of performing processing when the virtual code verification means 20 verifies the received virtual code and confirms it as a normal virtual code.
- “Normal virtual code” is a virtual code that is normally generated through the correct virtual code generation function.
- the virtual code verification means 20 may search for an actual code based on the normal virtual code, check authorization information for the registered control device, and perform a corresponding process. For example, if the control device is approved as a result of checking the authorization information, the operation of the control device is maintained, and if the control device is not authorized as a result of checking the authorization information, a process of stopping the operation of the control device may be performed.
- Step S620 is a step of performing processing when the virtual code verification unit 20 verifies the received virtual code and is found to be an abnormal virtual code.
- the “abnormal virtual code” is a code that cannot be identified by the virtual code verification means 20. For example, a code having a different digit or shape from a virtual code generated by the virtual code generating means 10 corresponds to an abnormal virtual code.
- Step S630 is a step of performing processing when the virtual code verification means 20 verifies the received virtual code, and it is confirmed that the virtual code is not generated at the present time.
- the "virtual code not created at the present time” is a virtual code whose number of digits and form of the code is the same as that of a normal virtual code, but the underlying time data is at a different point in time. Since the authorization information for the control device can be changed in real time, it is important to check the status at the time (current) when the authorization information is checked. Therefore, in the case of a virtual code generated at a time other than the present time, the control device is determined to be an unauthorized control device.
- the virtual code verification device 200 may pre-register and manage the virtual code generation device 100. That is, the virtual code verification apparatus 200 may hold data for verifying the virtual code generation apparatus 100 that has transmitted the virtual code.
- the virtual code verification device 200 is located in a storage location that matches the time when the registration of the virtual code generation device 100 is performed in the search algorithm included in the virtual code verification means 20. Save the code.
- the virtual code verification device 200 stores registration information (for example, owner information, device information, authorization information, etc.) for the virtual code generation device 100 together in a storage location of the actual code or stores the actual code. It can be stored in a separate storage space connected to the location.
- the virtual code verification device 200 when the virtual code generation device 100 is a control device, the virtual code verification device 200 stores registration information such as a device identification value (serial number, etc.) and an authorization state for the control device in advance. I can. Through this, when the virtual code verification apparatus 200 receives the virtual code, it is possible to quickly perform the corresponding processing by checking the registration information matching the corresponding virtual code. As a result of checking the registration information, if the virtual code generating device 100 that has transmitted the virtual code is confirmed as a pre-registered control device, the operation of the corresponding control device is not blocked, and if it is confirmed as a control device that has not been pre-registered, the operation of the corresponding control device Can be controlled.
- registration information such as a device identification value (serial number, etc.) and an authorization state for the control device in advance. I can.
- the virtual code generating apparatus 100 may be a drone
- the virtual code verification apparatus 200 may be a server such as a control center that identifies and verifies the drone.
- the server stores and manages the actual code and registration information for the drone registered by the drone registration procedure.
- the server performs a drone identification process to determine whether to stop the operation of the drone to be identified. That is, the server receives the virtual code from the drone, searches for a storage location of the real code matching the received virtual code, checks the registration information of the drone to be identified, and performs corresponding processing.
- the server does not block flight if the drone to be identified is a drone that is permitted to fly for official service, and if the drone to be identified is a non-registered drone (private drone, etc.) Carry out processing.
- the drone which is the virtual code generation apparatus 100, periodically or continuously includes a virtual code or outputs a signal of a frequency corresponding to the virtual code.
- a server such as a control center, which is a virtual code verification device 200, obtains the signal from the drone and determines whether the drone is authorized.
- the virtual code verification apparatus 200 pre-stores a virtual code value matched to a usable frequency range and a sub-unit range within the usable range, and can identify the virtual code based on the frequency of the signal received from the drone. .
- the virtual code verifying apparatus 200 may store in advance information about a unique value (ICCID or IMSI, etc.) of the SIM card and user information.
- ICCID unique value
- IMSI information about a unique value of the SIM card
- the virtual code verification device 200 stores the registration information (unique value of USIM, user information, etc.) Store them together in a location or in a separate storage space connected to the actual code storage location.
- the virtual code verification apparatus 200 searches for a storage location of the real code matching the received virtual code, checks registration information, and performs a corresponding process.
- RAM Random Access Memory
- ROM Read Only Memory
- EPROM Erasable Programmable ROM
- EEPROM Electrically Erasable Programmable ROM
- Flash Memory hard disk, removable disk, CD-ROM, or It may reside on any type of computer-readable recording medium well known in the art to which the present invention pertains.
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Finance (AREA)
- Signal Processing (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Computing Systems (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
- Mobile Radio Communication Systems (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Description
Claims (14)
- 가상코드검증수단이 가상코드생성수단에 의해 생성된 가상코드를 수신하는 단계;상기 가상코드검증수단이 상기 가상코드에 포함된 복수의 세부코드를 추출하는 단계; 및상기 가상코드검증수단이 상기 복수의 세부코드를 기반으로 실제코드의 저장위치를 탐색하는 단계;를 포함하고,상기 가상코드는 상기 가상코드생성수단 내부의 칩에 사전 부여된 고유값을 기반으로 생성되며, 상기 복수의 세부코드를 조합하여 생성되는 것이고,상기 복수의 세부코드는 상기 실제코드의 저장위치를 탐색하기 위한 상관관계를 가지며, 단위카운트마다 변경되는 것이고,상기 단위카운트는 특정한 시간간격으로 설정되어 상기 시간간격이 경과됨에 따라 변경되는 것인, 칩 고유값 기반의 가상코드를 이용하여 장치를 식별하는 방법.
- 제1항에 있어서,상기 가상코드검증수단은 탐색알고리즘을 포함하고,상기 탐색알고리즘은 상기 복수의 세부코드 중 하나 이상의 세부코드와 대응하는 경유지점을 경유하여, 상기 경유지점으로부터 상기 복수의 세부코드 간의 상관관계를 기반으로 연산하여 상기 실제코드의 저장위치를 탐색하는, 칩 고유값 기반의 가상코드를 이용하여 장치를 식별하는 방법.
- 제2항에 있어서,상기 복수의 세부코드는 제1코드 및 제2코드를 포함하고,상기 탐색알고리즘은 상기 제1코드에 대응하는 경유지점을 경유하여, 상기 경유지점으로부터 상기 제1코드 및 상기 제2코드의 상관관계를 기반으로 연산하여 상기 실제코드의 저장위치를 탐색하는, 칩 고유값 기반의 가상코드를 이용하여 장치를 식별하는 방법.
- 제3항에 있어서,상기 가상코드생성수단이 제어장치인 경우,상기 가상코드는 상기 제어장치에 포함된 칩의 고유값을 시드데이터로 이용하여 생성되며,상기 제어장치에 포함된 칩의 고유값은 제어장치별로 중복되지 않게 부여된 시리얼번호인 것인, 칩 고유값 기반의 가상코드를 이용하여 장치를 식별하는 방법.
- 제4항에 있어서,상기 가상코드검증수단이 상기 제어장치의 인가여부를 확인하는 단계를 더 포함하고,상기 수신한 가상코드가 정상 가상코드인 경우, 등록된 제어장치에 대한 인가정보를 확인하고,상기 수신한 가상코드가 비정상 가상코드이거나 현시점에 생성된 가상코드가 아닌 경우, 인가되지 않은 제어장치로 판단하는, 칩 고유값 기반의 가상코드를 이용하여 장치를 식별하는 방법.
- 제3항에 있어서,상기 가상코드생성수단이 SIM카드인 경우,상기 가상코드는 상기 SIM카드에 포함된 칩의 고유값을 시드데이터로 이용하여 생성되며,상기 SIM카드에 포함된 칩의 고유값은 SIM카드별로 중복되지 않게 부여된 ICCID 또는 IMSI인 것인, 칩 고유값 기반의 가상코드를 이용하여 장치를 식별하는 방법.
- 제1항에 있어서,상기 가상코드검증수단이 상기 가상코드생성수단으로부터 수신한 수신가상코드와 상기 가상코드검증수단 내에서 생성된 생성가상코드의 일치여부를 판단하여 가상코드를 검증하는 단계;를 더 포함하고,상기 가상코드생성수단과 상기 가상코드검증수단은 동일한 가상코드생성함수를 포함하는, 칩 고유값 기반의 가상코드를 이용하여 장치를 식별하는 방법.
- 제7항에 있어서,상기 가상코드생성수단의 고유값을 상기 가상코드검증수단에 등록하는 단계;를 더 포함하는, 칩 고유값 기반의 가상코드를 이용하여 장치를 식별하는 방법.
- 제8항에 있어서,상기 가상코드생성수단은 제어장치 또는 SIM카드인, 칩 고유값 기반의 가상코드를 이용하여 장치를 식별하는 방법.
- 가상코드생성수단이 복수의 세부코드를 생성하는 단계;상기 가상코드생성수단이 상기 복수의 세부코드를 조합하여 가상코드를 생성하는 단계; 및상기 가상코드생성수단이 상기 가상코드를 외부로 제공하는 단계;를 포함하고,상기 가상코드는 상기 가상코드생성수단 내부의 칩에 사전 부여된 고유값을 기반으로 생성되는 것이고,상기 복수의 세부코드는 가상코드검증수단이 실제코드의 저장위치를 탐색하기 위한 상관관계를 가지며, 단위카운트마다 변경되는 것이고,상기 단위카운트는 특정한 시간간격으로 설정되어 상기 시간간격이 경과됨에 따라 변경되는 것인, 칩 고유값 기반의 가상코드를 이용하여 장치를 식별하는 방법.
- 제10항에 있어서,상기 가상코드검증수단은 탐색알고리즘을 포함하고,상기 탐색알고리즘은 상기 복수의 세부코드 중 하나 이상의 세부코드와 대응하는 경유지점을 경유하여, 상기 경유지점으로부터 상기 복수의 세부코드 간의 상관관계를 기반으로 연산하여 상기 실제코드의 저장위치를 탐색하는,칩 고유값 기반의 가상코드를 이용하여 장치를 식별하는 방법.
- 하드웨어인 컴퓨터와 결합되어, 제1항 내지 제11항 중 어느 한 항의 방법을 실행시키기 위하여 매체에 저장된, 칩 고유값 기반의 가상코드를 이용하여 장치를 식별하는 프로그램.
- 가상코드검증수단이 가상코드생성수단에 의해 생성된 가상코드를 수신하는, 가상코드수신부;상기 가상코드검증수단이 상기 가상코드에 포함된 복수의 세부코드를 추출하는, 세부코드추출부; 및상기 가상코드검증수단이 상기 복수의 세부코드를 기반으로 실제코드의 저장위치를 탐색하는, 실제코드탐색부;를 포함하고,상기 가상코드는 상기 가상코드생성수단 내부의 칩에 사전 부여된 고유값을 기반으로 생성되며, 상기 복수의 세부코드를 조합하여 생성되는 것이고,상기 복수의 세부코드는 상기 실제코드의 저장위치를 탐색하기 위한 상관관계를 가지며, 단위카운트마다 변경되는 것이고,상기 단위카운트는 특정한 시간간격으로 설정되어 상기 시간간격이 경과됨에 따라 변경되는 것인, 칩 고유값 기반의 가상코드를 검증하는 장치.
- 가상코드생성수단이 복수의 세부코드를 생성하는, 세부코드생성부;상기 가상코드생성수단이 상기 복수의 세부코드를 조합하여 가상코드를 생성하는, 가상코드생성부; 및상기 가상코드생성수단이 상기 가상코드를 외부로 제공하는, 가상코드제공부;를 포함하고,상기 가상코드는 상기 가상코드생성수단 내부의 칩에 사전 부여된 고유값을 기반으로 생성되는 것이고,상기 복수의 세부코드는 가상코드검증수단이 실제코드의 저장위치를 탐색하기 위한 상관관계를 가지며, 단위카운트마다 변경되는 것이고,상기 단위카운트는 특정한 시간간격으로 설정되어 상기 시간간격이 경과됨에 따라 변경되는 것인, 칩 고유값 기반의 가상코드를 생성하는 장치.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US17/391,844 US11379837B2 (en) | 2019-02-08 | 2021-08-02 | Method, program, and apparatus for identifying device by using chip unique value-based virtual code |
US17/830,613 US11887118B2 (en) | 2019-02-08 | 2022-06-02 | Method, program, and apparatus for identifying device by using chip unique value-based virtual code |
Applications Claiming Priority (8)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR20190015223 | 2019-02-08 | ||
KR10-2019-0015223 | 2019-02-08 | ||
KR10-2019-0043118 | 2019-04-12 | ||
KR20190043118 | 2019-04-12 | ||
KR20190107065 | 2019-08-30 | ||
KR10-2019-0107065 | 2019-08-30 | ||
KR10-2019-0130742 | 2019-10-21 | ||
KR1020190130742A KR102243532B1 (ko) | 2019-02-08 | 2019-10-21 | 칩 고유값 기반의 가상코드를 이용하여 장치를 식별하는 방법, 프로그램 및 장치 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US17/391,844 Continuation US11379837B2 (en) | 2019-02-08 | 2021-08-02 | Method, program, and apparatus for identifying device by using chip unique value-based virtual code |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2020162739A1 true WO2020162739A1 (ko) | 2020-08-13 |
Family
ID=71947944
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/KR2020/003192 WO2020162739A1 (ko) | 2019-02-08 | 2020-03-06 | 칩 고유값 기반의 가상코드를 이용하여 장치를 식별하는 방법, 프로그램 및 장치 |
Country Status (2)
Country | Link |
---|---|
US (2) | US11379837B2 (ko) |
WO (1) | WO2020162739A1 (ko) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20220131700A1 (en) * | 2020-10-26 | 2022-04-28 | Micron Technology, Inc. | Virtual Subscriber Identification Module and Virtual Smart Card |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2004274429A (ja) * | 2003-03-10 | 2004-09-30 | Sony Corp | 情報処理装置、およびアクセス制御処理方法、情報処理方法、並びにコンピュータ・プログラム |
KR20130134581A (ko) * | 2012-05-31 | 2013-12-10 | 한국전자통신연구원 | 로드 가능한 모듈에 대한 가상화 지원 방법 및 장치 |
KR20140144684A (ko) * | 2012-02-22 | 2014-12-19 | 퀄컴 인코포레이티드 | 디바이스 식별자를 숨기기 위한 방법 및 장치들 |
KR101928519B1 (ko) * | 2018-01-29 | 2018-12-12 | 수상에스티(주) | 보안성이 강화된 레지덴셜 게이트웨이 장치를 이용한 헬스케어 서비스 시스템 |
KR20190005985A (ko) * | 2016-05-11 | 2019-01-16 | 알리바바 그룹 홀딩 리미티드 | 신원 검증 방법 및 시스템, 및 지능형 웨어러블 디바이스 |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9110815B2 (en) * | 2012-05-07 | 2015-08-18 | International Business Machines Corporation | Enhancing data processing performance by cache management of fingerprint index |
CN102761870B (zh) * | 2012-07-24 | 2015-06-03 | 中兴通讯股份有限公司 | 一种终端身份验证和服务鉴权的方法、系统和终端 |
KR101316466B1 (ko) | 2012-11-20 | 2013-10-08 | 신한카드 주식회사 | 다이나믹 트랙 2 정보를 이용한 모바일 결제 시스템 및 방법 |
KR101542111B1 (ko) | 2013-12-20 | 2015-08-12 | 주식회사 씽크풀 | 카드를 이용한 결제방법, 이를 위한 디지털 시스템, 및 결제측 시스템 |
KR101755858B1 (ko) | 2015-10-13 | 2017-07-07 | 주식회사 케이비국민카드 | 앱카드 연동 대표카드, 그 결제시스템 및 결제방법 |
KR101751894B1 (ko) | 2015-12-29 | 2017-07-03 | 한국정보통신주식회사 | 결제 단말 장치 및 일회용 카드 코드를 이용한 결제 처리 방법 |
KR102099973B1 (ko) | 2019-02-15 | 2020-04-10 | 주식회사 센스톤 | 가상코드제공시스템, 가상코드생성장치, 가상코드검증장치, 가상코드제공방법 및 가상코드제공프로그램 |
-
2020
- 2020-03-06 WO PCT/KR2020/003192 patent/WO2020162739A1/ko active Application Filing
-
2021
- 2021-08-02 US US17/391,844 patent/US11379837B2/en active Active
-
2022
- 2022-06-02 US US17/830,613 patent/US11887118B2/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2004274429A (ja) * | 2003-03-10 | 2004-09-30 | Sony Corp | 情報処理装置、およびアクセス制御処理方法、情報処理方法、並びにコンピュータ・プログラム |
KR20140144684A (ko) * | 2012-02-22 | 2014-12-19 | 퀄컴 인코포레이티드 | 디바이스 식별자를 숨기기 위한 방법 및 장치들 |
KR20130134581A (ko) * | 2012-05-31 | 2013-12-10 | 한국전자통신연구원 | 로드 가능한 모듈에 대한 가상화 지원 방법 및 장치 |
KR20190005985A (ko) * | 2016-05-11 | 2019-01-16 | 알리바바 그룹 홀딩 리미티드 | 신원 검증 방법 및 시스템, 및 지능형 웨어러블 디바이스 |
KR101928519B1 (ko) * | 2018-01-29 | 2018-12-12 | 수상에스티(주) | 보안성이 강화된 레지덴셜 게이트웨이 장치를 이용한 헬스케어 서비스 시스템 |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20220131700A1 (en) * | 2020-10-26 | 2022-04-28 | Micron Technology, Inc. | Virtual Subscriber Identification Module and Virtual Smart Card |
US12089049B2 (en) * | 2020-10-26 | 2024-09-10 | Micron Technology, Inc. | Virtual subscriber identification module and virtual smart card |
Also Published As
Publication number | Publication date |
---|---|
US11379837B2 (en) | 2022-07-05 |
US11887118B2 (en) | 2024-01-30 |
US20210390543A1 (en) | 2021-12-16 |
US20220300967A1 (en) | 2022-09-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR102243532B1 (ko) | 칩 고유값 기반의 가상코드를 이용하여 장치를 식별하는 방법, 프로그램 및 장치 | |
WO2019031644A1 (ko) | 가상카드번호 기반의 금융거래제공시스템, 가상카드번호생성장치, 가상카드번호검증장치, 가상카드번호 기반의 금융거래제공방법 및 가상카드번호 기반의 금융거래제공프로그램 | |
WO2019031627A1 (ko) | 가상코드제공시스템, 가상코드생성장치, 가상코드검증장치, 가상코드제공방법 및 가상코드제공프로그램 | |
WO2017043717A1 (ko) | 생체인식 본인인증 방법 | |
WO2020032498A1 (ko) | 인증용가상코드를 이용한 사용자 인증 방법 및 시스템 | |
WO2020162739A1 (ko) | 칩 고유값 기반의 가상코드를 이용하여 장치를 식별하는 방법, 프로그램 및 장치 | |
WO2018169150A1 (ko) | 잠금화면 기반의 사용자 인증 시스템 및 방법 | |
JP2017059060A (ja) | 生体照合システム、生体照合方法、生体照合装置及び制御プログラム | |
WO2020189811A1 (ko) | 전자 장치 및 그 제어 방법 | |
WO2015163739A1 (ko) | 클라우드 se 기반의 클라우드-se 시스템, 모바일 단말 및 그의 모바일 결제 방법 | |
WO2019031716A2 (ko) | 가상토큰 기반의 결제제공시스템, 가상토큰생성장치, 가상토큰검증서버, 가상토큰 기반의 결제제공방법 및 가상토큰 기반의 결제제공프로그램 | |
WO2020184815A1 (ko) | 일회용 패스워드 기반 모바일 자동 결제방법 및 이를 이용한 시스템 | |
WO2022186653A1 (ko) | 스마트 카드 장치, 데이터 일치 여부 판단을 통해 가상보안코드를 생성하는 장치 및 그 방법 | |
WO2022186605A1 (ko) | 스마트 카드 장치, 인증용가상코드 생성 장치, 이를 이용한 인증용가상코드 생성 방법 및 인증용가상코드 검증 서버 | |
WO2021172876A1 (ko) | 가상인증코드 기반의 절차 승인 장치 및 방법 | |
WO2011078603A2 (en) | Method for mutual authentication between tag and reader in radio frequency identification system | |
WO2023167482A1 (ko) | 결제를 위한 인증방법 및 시스템 | |
WO2017018861A1 (ko) | 생체정보를 이용하는 금융기기 및 그것의 동작방법 | |
WO2022045508A1 (ko) | 게이트 출입을 위한 인증 방법 및 시스템 | |
WO2023167390A1 (ko) | 인증용 가상코드를 이용하여 홀더리스 카드에 사용자를 등록하는 방법 | |
WO2014010875A1 (ko) | 페어장치와 연동되는 애플리케이션 실행 및 결제방법, 이를 위한 디지털 시스템 | |
WO2020032344A1 (ko) | 구체 기반의 가상코드 검증 방법, 장치, 및 시스템 | |
WO2020162738A1 (ko) | 웨어러블 디바이스 기반의 금융거래를 제공하는 방법, 프로그램, 서버 및 웨어러블 디바이스 | |
WO2019031666A1 (ko) | 가상카드번호를 생성하는 스마트카드, 스마트카드 기반의 가상카드번호 제공방법 및 프로그램 | |
WO2024090683A1 (ko) | 모바일 신분증 기반 얼굴인식 엣징 노드 구현을 통한 출입 및 근태관리시스템 연계서비스 구축 시스템 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 20752836 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 20752836 Country of ref document: EP Kind code of ref document: A1 |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 22/04/2022) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 20752836 Country of ref document: EP Kind code of ref document: A1 |