Nothing Special   »   [go: up one dir, main page]

KR20160076132A - System and method of certificating a genuine article - Google Patents

System and method of certificating a genuine article Download PDF

Info

Publication number
KR20160076132A
KR20160076132A KR1020140185937A KR20140185937A KR20160076132A KR 20160076132 A KR20160076132 A KR 20160076132A KR 1020140185937 A KR1020140185937 A KR 1020140185937A KR 20140185937 A KR20140185937 A KR 20140185937A KR 20160076132 A KR20160076132 A KR 20160076132A
Authority
KR
South Korea
Prior art keywords
authentication
terminal
tag
unit
security key
Prior art date
Application number
KR1020140185937A
Other languages
Korean (ko)
Inventor
김학권
Original Assignee
(주)쎄미시스코
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by (주)쎄미시스코 filed Critical (주)쎄미시스코
Priority to KR1020140185937A priority Critical patent/KR20160076132A/en
Priority to US14/590,858 priority patent/US20150195274A1/en
Publication of KR20160076132A publication Critical patent/KR20160076132A/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/101Collaborative creation, e.g. joint development of products or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Strategic Management (AREA)
  • Operations Research (AREA)
  • Data Mining & Analysis (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • General Physics & Mathematics (AREA)
  • Quality & Reliability (AREA)
  • General Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • Tourism & Hospitality (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Telephone Function (AREA)

Abstract

Disclosed are a genuine product authentication system with reinforced security and a method thereof. The genuine product authentication method includes: a step of running an application on an authentication terminal; a step of receiving authentication information from an authentication confirmation component after first authentication is complete using an authentication number while the application is being run; and a step of authenticating that a target with the attached authentication confirmation component is a genuine product according to the received authentication information. The application authenticates the genuineness of the target based on the received authentication information without comparison of the authentication information.

Description

SYSTEM AND METHOD OF CERTIFICATING A GENUINE ARTICLE [0001]

The present invention relates to an activation system and method.

In general, a consumer wants to know whether the product is genuine at the time of purchase of the product. In particular, when purchasing a high-end and high-priced product such as a famous brand product, a global luxury product, an antique product, Is very high.

The manufacturer takes various measures to authenticate that the product is a genuine product so that the product can be imitated and circulated by the other person and the consumer can trust the product of the company.

In order to prevent the imitation of a product, a manufacturer expresses a specific identification means (such as a trademark, a hologram, a telephone identification code, etc.) on a product and provides it. However, since a counterfeit product imitating the appearance of the product, There is a problem that it is difficult for a general consumer to distinguish counterfeit and genuine products from each other in appearance of the product itself without the help of a specialist.

Therefore, there is a problem in that a genuine confirmation method using a mark, a logo, and the like can be imitated or stolen even if it is a sophisticated and specific logo or display.

Therefore, there is a need for a highly reliable system and method for authenticating a genuine product.

Korean Registered Patent No. 1011516 (registered on Jan. 21, 2011)

The present invention provides a security enhanced activation system and method.

According to an aspect of the present invention, there is provided an authentication terminal connected to an authentication server for recognizing an authentication verification element according to an aspect of the present invention includes an authentication confirmation unit for recognizing the authentication verification element; And transmitting the authentication number transmitted from the authentication confirmation element to the authentication server, and when the transmitted authentication number matches the authentication number stored in the authentication server, And an authentication unit for transmitting the authentication information. Here, when the authentication unit receives the authentication information obtained by the security key from the authentication verification element, the authentication unit authenticates that the authentication is genuine based on the reception.

According to another aspect of the present invention, an authentication server connected to an authentication terminal comprises: a communication unit which is a communication channel with the authentication terminal; A storage unit for storing authentication numbers; And an authentication unit for receiving an authentication number from the authentication terminal, comparing the received authentication number with a corresponding authentication number stored in the storage unit, and firstly authenticating the authentication number. Here, the authentication unit transmits the security key to the authentication terminal when the primary authentication is completed.

According to another aspect, an activation method in an authentication verification device includes: transmitting an authentication number to an authentication terminal; Receiving a security key from the authentication terminal; Comparing the received security key with a security key stored in the authentication confirmation device; Acquiring authentication information in the authentication confirmation device if the comparison result indicates that the security keys match; And transmitting the obtained authentication information to the authentication terminal.

According to another aspect, an activation method comprises: running an application at an authentication terminal; Receiving authentication information from an authentication confirmation device after completion of primary authentication through an authentication number in a state in which the application is activated; And authenticating that the object to which the authentication confirmation element is attached is a genuine article according to the received authentication information. Here, the application authenticates that the object is genuine based on the reception of the authentication information.

The activation system and method according to the present invention performs primary authentication through an authentication number and secondary authentication using a security key and a PID, thus enhancing the security of the activation. In particular, because the authenticating device authenticates the authenticity based on PID reception, the entire authentication procedure can be simplified while enhancing security. As a result, activation time can be shortened.

1 is a diagram illustrating an activation system according to an embodiment of the present invention.
2 is a diagram illustrating a tag recognition process according to an embodiment of the present invention.
FIG. 3 is a diagram illustrating an activation system using authentication numbers according to an exemplary embodiment of the present invention. Referring to FIG.
4 is a flowchart illustrating an activation process according to the first embodiment of the present invention.
5 is a block diagram illustrating a configuration of an authentication terminal according to an embodiment of the present invention.
6 is a block diagram illustrating a configuration of an authentication server according to an embodiment of the present invention.

Hereinafter, embodiments of the present invention will be described in detail with reference to the accompanying drawings.

The present invention relates to an activation system, and more particularly, to a system and method for authenticating an authenticity of an article using NFC (Near Field Communication) technology.

In particular, the activation system of the present invention performs security-enhanced activation when authenticating a valid product. In particular, the activation system of the present invention can enhance the security, but can simplify the overall activation process and optimize the system. Therefore, the activation time can also be shortened.

According to one embodiment, the activation system of the present invention can authenticate a genuine article using a first authentication number registered by a chip manufacturer and a second authentication number registered by a system vendor.

Hereinafter, various embodiments of the activation system and method of the present invention will be described in detail with reference to the accompanying drawings.

FIG. 1 is a diagram illustrating an activation system according to an embodiment of the present invention. FIG. 2 is a diagram illustrating a tag recognition process according to an embodiment of the present invention.

Referring to FIG. 1, the activation system of the present embodiment may include an authentication terminal 100, an authentication server 104, and a manufacturer 106.

An authentication check element, e.g., a tag 110, may be attached to a portion of the article to be authenticated 102, e.g., a wine.

According to one embodiment, the tag 110 may be an NFC tag and may include a manufacturer name, a date of manufacture, a serial number, authentication numbers for activation, security keys, and the like. The tag 110 may be made of aluminum, synthetic resin, paper, or the like.

The authentication terminal 100 is a terminal for performing the authentication process and is generally a terminal owned by the seller that sells the article 102 or a terminal owned by the consumer who purchases the article 102, .

According to one embodiment, the authentication terminal 100 includes an NFC chip and can recognize the tag 110 attached to the article 102 using the NFC chip. For example, the authentication terminal 100 can read the authentication number information, that is, the authentication information, from the tag 100.

Meanwhile, the authentication terminal 100 and the tag 110 can be connected to each other through various wireless communication technologies, in particular, near-field wireless communication technology, in addition to the NFC technology. Hereinafter, for convenience of explanation, it is assumed that the authentication terminal 100 and the tag 110 are connected through NFC technology.

The authentication terminal 100 transmits an authentication request signal including the first authentication number recognized from the tag 110 and / or the identification number (e.g., serial number or MAC address) of the authentication terminal 100 to the authentication server 100 104, and may transmit the security key transmitted from the authentication server 104 to the tag 110.

According to one embodiment, the authentication terminal 100 may be provided with an authentication application. The authentication terminal 100 may obtain an authentication number from the tag 110 while the authentication application is executed and may transmit an authentication request signal including the obtained authentication number to the authentication server 104. [ Meanwhile, the authentication terminal 100 may encrypt the authentication request signal using a Hash code or the like, and then transmit the encrypted authentication request signal to the authentication server 104. In addition, the authentication terminal 100 may transmit the security key transmitted from the authentication server 104 to the tag 110.

The authentication server 104 may be connected to a terminal of the authentication terminal 100 and the manufacturer 106 (hereinafter referred to as a "manufacturer terminal"). The authentication server 104 compares the first authentication number with the previously stored authentication number, .

According to one embodiment, when the first authentication is completed by the authentication server 104, the authentication terminal 100 communicates with the tag 110 to perform secondary authentication. When the secondary authentication is completed, the authentication terminal 100 determines that the authenticated product is authenticated do.

In summary, the activation system of the present embodiment performs secondary authentication for security enhancement as well as primary authentication through comparison of authentication numbers recognized from the tag 110, and when the secondary authentication is completed, it is determined that the genuine article is authenticated do. In particular, the activation is ultimately determined by the authentication terminal 100 and is not determined by the authentication server 104. Accordingly, the activation system can optimize the activation system by simplifying the entire activation process while authenticating the original product while enhancing security.

2, the tag recognition position object 200 is displayed on a part of the screen of the authentication terminal 100 so that an error does not occur when the tag 110 is recognized using the authentication terminal 100 can do.

Generally, the antenna position of the authentication terminal 100, for example, a smart phone differs depending on the manufacturer or model, and therefore, a recognition error occurs when the portion of the authentication terminal 100 corresponding to the antenna faces the tag 110 . Otherwise, an error is likely to occur.

Accordingly, in the activation system of the present invention, an antenna corresponding part (hereinafter referred to as "antenna part" 202) for each terminal type is registered and stored in the authentication server 104 or a separate server. When the authentication terminal 100 executes an application for activation, the application inquires of the authentication terminal 100, for example, a model of the authentication terminal 100, identifies the antenna portion 202, The location object 200 may be displayed. Accordingly, the user can appropriately face the authentication terminal 100 to the tag 110 based on the tag recognition position object 100, and thus the tag recognition error may not occur. Of course, the authentication terminal 100 itself may store information on the tag recognition location object 200 and may display the tag recognition location object 200 on the screen upon tag recognition.

On the other hand, when the authentication terminal 100 does not recognize the tag 110, the authentication terminal 100 can notify the authentication terminal 100 of the information that the tag is not recognized and / Lt; / RTI > can display information.

FIG. 3 is a diagram illustrating an activation system using authentication numbers according to an embodiment of the present invention. FIG. 4 is a flowchart illustrating an activation process according to the first embodiment of the present invention.

3, the tag 110 stores a first authentication number, for example, a UID that is a number assigned by a tag maker, a second authentication number, for example, a PID that is a number assigned by the activation system provider, And the authentication server 104 may store the UID and the secret key. At this time, the authentication terminal 100 does not store the UID, the PID, and the secret key but may have a function of identifying the UID, the PID, and the secret key.

On the other hand, the PID is a kind of authentication information, and may be implemented in various forms such as letters, characters, images, In this case, the tag 110 includes a UID, authentication information, and a secret key, and the authentication server 104 may include a UID and a secret key.

Also, although the UID is different for each tag 110, the PID may be different for each tag 110, and some tags 110 may share the same PID. The reason why the PIDs of some tags 110 may be the same is because the PID is read only by the security key and the security key is different for each tag 110 as described later.

However, for convenience of explanation, the first authentication number and the second authentication number will be referred to as a UID and a PID, respectively.

3 and 4, the user executes the authentication application of the authentication terminal 100, and then requests the UID from the tag 110 using the authentication terminal 100 (S400). At this time, the tag recognition position object 200 can be displayed on the screen of the authentication terminal 100, so that the user can accurately position the authentication terminal 100 in the tag 110 so that the tag 110 can be recognized have.

Then, the tag 110 may transmit the UID to the authentication terminal 100 according to the request (S402). At this time, the UID may be encrypted with a hash code or the like and then transmitted to the authentication terminal 100.

Subsequently, the authentication terminal 100 may transmit the transmitted UID to the authentication server 104 together with its own identification number (S404).

Then, the authentication server 104 may compare the transmitted UID with the UID stored therein (S406).

If the comparison result does not match the UIDs, the authentication server 104 transmits authentication failure information indicating that the UIDs do not match to the authentication terminal 100, and the authentication terminal 100 can display information indicating that the activation has failed .

On the other hand, if the comparison result UIDs match, the authentication server 104 may transmit the security key to the authentication terminal 100 (S408).

Subsequently, the authentication terminal 100 transmits the transmitted security key to the tag 110 (S410).

Then, the tag 110 may compare the transmitted security key with the security key stored therein (S412).

If the security keys match, the tag 110 reads the PID stored therein using the security key, and transmits the read PID to the authentication terminal 100 (S414). According to another embodiment, the tag 110 may transmit a security key authentication signal to the authentication terminal 100 indicating that the security key is not the PID.

In this case, the authentication terminal 100 authenticates the article to which the tag 110 is attached according to the transmitted PID or the security key authentication signal, and displays information indicating authentication success on the screen (S416).

On the other hand, if the security keys do not match, the PID is not read, so the tag 110 may not transmit any information to the authentication terminal 100. If the authentication terminal 100 does not receive the PID from the tag 110 until the preset time passes after transmitting the security key to the tag 110, the authentication terminal 100 may display information indicating that the activation has failed have.

In summary, the activation method of the present embodiment can perform the primary authentication through comparison of the UIDs of the first authentication number, the secondary authentication using the PID, and the final authentication only when the secondary authentication is completed .

In particular, the authentication terminal 100 only authenticates that the article is genuine, and does not compare PIDs, as long as it receives the PID from the tag 110. Therefore, the activation method can simplify the activation procedure while enhancing security by using the security key and the PID.

Of course, although the authentication terminal 100 may complete the activation after comparing the PIDs, the activation procedure may be complicated, the activation time may be delayed, and the load of the authentication terminal 100 may increase.

As another example, the authentication terminal 100 may send the PID to the authentication server 104, and the authentication server 104 may complete the activation after comparing the PIDs. However, there may be a problem that the activation time is considerably delayed.

In the above description, the tag 110 transmits the PID to the authentication terminal 100, but the tag 110 can transmit the authentication information other than the PID to the authentication terminal 100, It can authenticate that the article is a genuine article.

5 is a block diagram illustrating a configuration of an authentication terminal according to an embodiment of the present invention.

5, the authentication terminal 100 includes a control unit 500, a communication unit 502, an application unit 504, a tag unit (authentication confirmation unit 506), an authentication unit 508, a display unit 510, And a storage unit 512.

The communication unit 502 serves as a connection path between the tag 110 and the authentication server 104. For example, the communication unit 502 and the tag 110 may be connected by short-distance communication, and the communication unit 502 and the authentication server 104 may be connected by 4G communication instead of short-distance communication.

The application unit 504 manages an authentication application for performing activation, and the authentication application is installed in the authentication terminal 100. Here, the authentication application may be an application originally installed in the authentication terminal 100, or may be an application downloaded and downloaded from a specific server.

According to one embodiment, the application may display a tag recognition position object on the screen of the authentication terminal 100. [

The tag unit 506 performs the overall operation associated with the tag 110 and may obtain UID, PID and / or location information from the tag 110, for example.

The authentication unit 508 performs an overall operation related to the activation. For example, when the authentication information including the PID is transmitted from the tag 110, the authentication unit 508 can authenticate that the product is genuine.

The display unit 510 can display information, UI, and the like, and has no limitations such as OLED, LCD, and PDP.

The storage unit 512 may store various data such as a program for the application, an authentication result, information obtained from the tag 110, an identification number of the authentication terminal 100, and the like.

The control unit 500 can control the operation of the components of the authentication terminal 100 as a whole.

Although not described above, the authentication terminal 100 may further include a UI unit for managing various UIs.

6 is a block diagram illustrating a configuration of an authentication server according to an embodiment of the present invention.

6, the authentication server 104 of the present embodiment includes a control unit 600, a communication unit 602, an information management unit 604, an external connection unit 606, an authentication unit 608, a signal unit 610, 612 < / RTI >

The communication unit 602 serves as a connection path between the authentication terminal 100, the terminal of the administrator or the terminal of the manufacturer.

The information management unit 604 may register and store an authentication number such as a UID and a security key for activation.

The external connection unit 606 manages connections with external terminals such as the authentication terminal 100, an administrator terminal, or a manufacturer terminal.

The authentication unit 608 performs primary authentication through comparison between the UID transmitted from the authentication terminal 100 and the stored UID, and transmits the security key to the authentication terminal 100 when the primary authentication is completed.

The signaling unit 610 may transmit a signal including the secret key to the authentication terminal 100 or may transmit a signal to the administrator or the manufacturer to inform the authentication terminal 100 of the cloning.

The storage unit 612 stores various kinds of data such as information on the article, an authentication number, and a program.

The control unit 600 controls the operations of the components of the authentication server 104 as a whole.

It will be apparent to those skilled in the art that various modifications, additions and substitutions are possible, without departing from the spirit and scope of the invention as defined by the appended claims. Should be regarded as belonging to the following claims.

100: authentication terminal 102: object, article
104: authentication server 106: manufacturer
110: authentication check element, tag

Claims (10)

An authentication terminal which recognizes an authentication confirmation element and is connected to an authentication server,
An authentication confirmation unit for recognizing the authentication confirmation element; And
Transmits the authentication number transmitted from the authentication confirmation element to the authentication server and transmits the security key transmitted from the authentication server to the authentication confirmation element according to the matching of the transmitted authentication number and the authentication number stored in the authentication server And an authentication unit,
Wherein the authenticating unit authenticates that the authenticating unit is authentic based on the reception of the authentication information acquired by the security key from the authentication confirming element.
2. The system of claim 1, wherein the authentication verification element is an NFC tag, the authentication number is a number (UID) assigned by the tag manufacturer, the authentication information is a number (PID) ,
Wherein the UID and the security key are different for each tag, and the PID can be used jointly in a plurality of tags or differently for each tag.
The method according to claim 1,
Further comprising an application unit for activating an application for activation,
Wherein the authentication terminal authenticates that it is a genuine article based on the reception itself without comparing the authentication information, and the application unit displays an entity indicating a position where the authentication confirmation element can be recognized on the screen of the authentication terminal, Wherein the entity corresponds to the location of the antenna of the authentication terminal.
An authentication server connected to the authentication terminal of claim 1,
A communication unit which is a communication channel with the authentication terminal;
A storage unit for storing authentication numbers; And
And an authentication unit for receiving an authentication number from the authentication terminal, comparing the received authentication number with a corresponding authentication number stored in the storage unit, and performing primary authentication,
Wherein the authentication unit transmits the security key to the authentication terminal when the primary authentication is completed.
In an authentication method in an authentication verification device,
Transmitting an authentication number to an authentication terminal;
Receiving a security key from the authentication terminal;
Comparing the received security key with a security key stored in the authentication confirmation device;
Acquiring authentication information in the authentication confirmation device if the comparison result indicates that the security keys match; And
And transmitting the obtained authentication information to the authentication terminal.
6. The system of claim 5, wherein the authentication verification element is an NFC tag, the authentication number is a number (UID) assigned by the tag manufacturer, and the authentication information is a number (PID) ,
Wherein the UID and the security key are different for each tag, and the PID can be used jointly in a plurality of tags or differently for each tag, and the tag can be read only by the security key. Way.
Driving an application in an authentication terminal;
Receiving authentication information from an authentication verification device after completion of primary authentication through an authentication number in a state in which the application is activated; And
Authenticating that the object to which the authentication confirmation element is attached is genuine according to the received authentication information,
Wherein the application authenticates that the object is a genuine article based on reception of the authentication information.
8. The method according to claim 7, wherein the authentication terminal authenticates that the authenticity is based on the reception itself without comparing the authentication information. 8. The method of claim 7,
Transmitting the security key to the authentication confirmation device after completing the primary authentication,
Wherein the authentication confirmation element is an NFC tag, the authentication number is a number (UID) assigned by the tag manufacturer, the authentication information is a number (PID) assigned by a provider of the activation system, And the key is readable only by the key.
8. The method of claim 7,
Further comprising the step of displaying on the screen of the authentication terminal an entity indicating a recognizable position of the recognition confirmation element,
Wherein the entity corresponds to the location of the antenna of the authentication terminal.

KR1020140185937A 2014-01-06 2014-12-22 System and method of certificating a genuine article KR20160076132A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
KR1020140185937A KR20160076132A (en) 2014-12-22 2014-12-22 System and method of certificating a genuine article
US14/590,858 US20150195274A1 (en) 2014-01-06 2015-01-06 System and method of certificating a genuine article

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
KR1020140185937A KR20160076132A (en) 2014-12-22 2014-12-22 System and method of certificating a genuine article

Related Child Applications (1)

Application Number Title Priority Date Filing Date
KR1020160138340A Division KR20160128258A (en) 2016-10-24 2016-10-24 System and method of certificating a genuine article

Publications (1)

Publication Number Publication Date
KR20160076132A true KR20160076132A (en) 2016-06-30

Family

ID=56352637

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1020140185937A KR20160076132A (en) 2014-01-06 2014-12-22 System and method of certificating a genuine article

Country Status (1)

Country Link
KR (1) KR20160076132A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018111032A1 (en) * 2016-12-15 2018-06-21 장유호 Integrated logistics management system
KR20230075905A (en) * 2021-11-23 2023-05-31 유비벨록스(주) Geuine Product Certification System and Geuine Product Certification Using the Same

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101011516B1 (en) 2010-06-28 2011-01-31 주식회사 딜리 Method for certificating qualifing ink for a printer by using a rfid tag

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101011516B1 (en) 2010-06-28 2011-01-31 주식회사 딜리 Method for certificating qualifing ink for a printer by using a rfid tag

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018111032A1 (en) * 2016-12-15 2018-06-21 장유호 Integrated logistics management system
KR20230075905A (en) * 2021-11-23 2023-05-31 유비벨록스(주) Geuine Product Certification System and Geuine Product Certification Using the Same

Similar Documents

Publication Publication Date Title
US9740847B2 (en) Method and system for authenticating a user by means of an application
JP5990406B2 (en) Electronic key registration method
CN105894304B (en) Product anti-counterfeiting method
US20180047032A1 (en) Merchandise anti-counterfeiting and authentication method and the non-transitory computer readable medium thereof
US9734091B2 (en) Remote load and update card emulation support
US11354677B2 (en) Authentication method and system to verify the authenticity of a product
KR101499906B1 (en) Smart card having OTP generation function and OTP authentication server
EP3282402A1 (en) Merchandise anti-counterfeiting and authentication method and the non-transitory computer readable medium thereof
US20150195274A1 (en) System and method of certificating a genuine article
KR101718789B1 (en) Mobile payment system with contactless mobile payment device using Bluetooth communication,and Payment data processing method using thereof
US20170200154A1 (en) Method for protecting the resale of an object provided with an nfc tag
KR20200124757A (en) NFC tag-based data processing method, its execution system and tag-based receiving terminal
KR20160082100A (en) Mobile ticket security system and method of based location information and terminal unique number
KR101834367B1 (en) Service providing system and method for payment using sound wave communication based on electronic tag
KR20160076132A (en) System and method of certificating a genuine article
KR101699032B1 (en) Service providing system and method for payment using electronic tag
US11631062B2 (en) Voucher verification auxiliary device, voucher verification auxiliary system, and voucher verification auxiliary method
US20170099273A1 (en) Peripheral device, wireless communication chip, computer-readable non-transitory storage medium having application program stored therein, information processing system, and information processing method
KR20150080658A (en) Method for authenticating goods and Apparatus therefor
KR20160037092A (en) An electronic tag and authentication method, device and system thereof
US11763292B2 (en) Dynamic security code for a card transaction
CN102236862A (en) System and method for identifying authenticity of general commodities
KR101285972B1 (en) System and method for preventing forgery and tampering of electronic tag
KR20160128258A (en) System and method of certificating a genuine article
CN104766211A (en) Genuine product authentication system and method thereof

Legal Events

Date Code Title Description
A201 Request for examination
E902 Notification of reason for refusal
E601 Decision to refuse application
A107 Divisional application of patent
J201 Request for trial against refusal decision
J301 Trial decision

Free format text: TRIAL NUMBER: 2016101006062; TRIAL DECISION FOR APPEAL AGAINST DECISION TO DECLINE REFUSAL REQUESTED 20161024

Effective date: 20180919