WO2024232035A1 - System and method for authentication certification - Google Patents
System and method for authentication certification Download PDFInfo
- Publication number
- WO2024232035A1 WO2024232035A1 PCT/JP2023/017529 JP2023017529W WO2024232035A1 WO 2024232035 A1 WO2024232035 A1 WO 2024232035A1 JP 2023017529 W JP2023017529 W JP 2023017529W WO 2024232035 A1 WO2024232035 A1 WO 2024232035A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- information
- authentication
- product
- blockchain
- certification
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims description 62
- 238000012795 verification Methods 0.000 claims abstract description 87
- 238000009826 distribution Methods 0.000 claims description 20
- 230000008569 process Effects 0.000 description 21
- 238000012545 processing Methods 0.000 description 17
- 238000005516 engineering process Methods 0.000 description 14
- 238000010586 diagram Methods 0.000 description 13
- 238000004519 manufacturing process Methods 0.000 description 10
- 238000004891 communication Methods 0.000 description 9
- 230000006870 function Effects 0.000 description 5
- 238000012546 transfer Methods 0.000 description 5
- 230000000694 effects Effects 0.000 description 3
- 238000003860 storage Methods 0.000 description 3
- 241000556720 Manga Species 0.000 description 2
- 238000001514 detection method Methods 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 230000008901 benefit Effects 0.000 description 1
- 239000003795 chemical substances by application Substances 0.000 description 1
- 239000002537 cosmetic Substances 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000007781 pre-processing Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Definitions
- the present invention relates to an appraisal certification system and an appraisal certification method.
- Products that require authentication such as bags, luggage, clothing, watches, arts and crafts, and automobiles, usually follow a complex distribution route, being manufactured by a manufacturer, producer, or copyright holder, before being sold to consumers through distributors such as logistics companies, wholesalers, and retailers.
- consumers require authentication certificates, i.e., proof that the item is genuine and not a counterfeit.
- products that require authentication are often sold to consumers over the Internet, and second-hand products of the above-mentioned products that require authentication (including secondary distribution, tertiary distribution, and other n-th distribution (n is an integer of 4 or more)) are also sold to consumers over the Internet.
- secondary distribution, tertiary distribution, and other n-th distribution are also sold to consumers over the Internet.
- the guarantee card contains information about the product, such as the product name, product number, manufacturer/producer (author), place of manufacture, and date of manufacture (hereafter referred to as "product information").
- product information information about the product.
- Patent Document 2 Also disclosed is a technology that attaches an IC chip to a product requiring authentication, making it possible to read the product information recorded on the IC chip using a smartphone, mobile phone, etc. (see, for example, Patent Document 2).
- Patent Document 2 when the technology disclosed in Patent Document 2 is applied to a product requiring authentication, if a password is not set when reading the above-mentioned product information, third parties other than distributors and consumers can also intercept the product information. As a result, third parties can intercept product information that consumers do not want to be known, such as whether the product requiring authentication is genuine or not, or whether the date of manufacture is recent or not.
- a password if a password is set, the password itself may become unknown as the product requiring authentication travels through a complex distribution route, and authentication certification may not be possible when necessary. There is also a risk that the password itself may be hacked.
- a private key and a small recording medium on which product information on the product to be authenticated is recorded are attached to or embedded in the product to be authenticated and the guarantee card (a microchip (IC chip), two-dimensional code, electronic watermark, etc., depending on the shape, structure, size, etc.).
- the guarantee card a microchip (IC chip), two-dimensional code, electronic watermark, etc., depending on the shape, structure, size, etc.
- the product information and transaction information at each distribution stage until the product to be authenticated is delivered to the consumer are recorded on the blockchain.
- the consumer uses the private key attached to the product to be authenticated and the guarantee card, respectively, to read the product information and transaction information from the blockchain. This allows only the consumer to easily provide a highly reliable authentication certificate.
- the product information and transaction information can be accurately recorded while complementing each other, and further, the product information and transaction information can be firmly prevented from being tampered with.
- products requiring authentication naturally include not only analog (physical) goods (hereinafter also referred to as analog goods) but also digital goods (hereinafter also referred to as digital goods).
- Digital goods include, for example, digital images, digital sounds, digital music, digital videos, etc.
- the social need for stronger, more reliable and multifaceted authentication certification of the above digital goods has become particularly evident in recent years with the spread of the Internet.
- the Mangamura Incident a pirated manga website that was established in January 2016 and closed in April 2018, is said to have caused copyright infringement damages of over 300 billion yen (Source: “Mangamura Operator Arrested, Extradited from Philippines, Suspected of Copyright Infringement, Damages Possibly of 320 Billion Yen”, Asahi Shimbun Digital, September 25, 2019).
- Mend versions of magazines, novels, photo books, movies, dramas, and other video content were also available to post for free on the Internet (Source: “Mangamura Incident (Only the Copyright Infringement Portion)”, Professor Okumura Koji, Keio University Law School, June 2, 2021).
- Patent Document 4 discloses technology that focuses on the above-mentioned analog goods. For this reason, the technology disclosed in Patent Document 4 is lacking in reference to authentication certification systems and methods for the above-mentioned digital goods. For these reasons, it is desirable to be able to perform highly reliable authentication certification even when authenticating digital goods.
- the present invention was devised in consideration of the above-mentioned problems, and its purpose is to provide an authentication and certification system and authentication and certification method that can perform highly reliable authentication and certification, even when authenticating digital property.
- the authentication certification system comprises a distributed file server that generates a hashed identifier that is individually assigned to the product to be authenticated based on the digital property data of the product to be authenticated, a dedicated platform that records the NFT (Non-fungible token) information of the product to be authenticated linked to the identifier on a blockchain and outputs the generated transaction hash or a two-dimensional code corresponding thereto, and a recording means that links first verification information held by each of multiple users related to the product to be authenticated to the NFT information and records it in the order in which the multiple users are involved, and is characterized in that, at the time of authentication certification, the first verification information linked to the NFT information corresponding to the transaction hash obtained from the authentication certifier or the two-dimensional code corresponding thereto is read out, and the authentication certification of the product to be authenticated is performed by determining the consistency between the read out first verification information and the first signature information held by the authentication certifier.
- NFT Non-fungible token
- the authentication certification system is the first invention, characterized in that the first verification information read out during the authentication certification is consistent with the first signature information held by a user, among the multiple users, who was involved in the product requiring authentication before the most recent user.
- the authentication certification system is characterized in that in the first invention, the first verification information read out during the authentication certification is consistent with the first verification information held by the latest user, among the multiple users, who is involved in the product requiring authentication.
- the authentication certification system is the first invention, characterized in that the first verification information indicates at least one of the blockchain wallet address held by the user, the public key used to generate the blockchain wallet address, and the private key used to generate the blockchain wallet address.
- the authentication certification system is any one of the first to fourth aspects of the present invention, wherein the plurality of users include at least one of consumers, manufacturers, manufacturers, authors, and various traders, and further includes a small recording medium (a 1 and a transaction hash or two-dimensional code output from and generated by the dedicated platform, and the authentication certification is performed using the product to be authenticated, to which a signature ID of the product to be authenticated is attached or embedded, and the transaction hash or the two-dimensional code output from and generated by the dedicated platform, and the authentication certification is further performed using an application [A] used by at least one of the manufacturer, manufacturer, author, and various traders to record in the blockchain the product information and transaction information at each distribution stage until the product to be authenticated is delivered to the consumer, and an application [B] used by the authentication certifier to read out the product information and the transaction information from the blockchain, wherein the dedicated platform records second verification information obtained based on the product information and/or the transaction information on the blockchain using the application [A] by at least one of the manufacturer
- the authentication certification system of the sixth invention is the fifth invention, wherein further authentication certification is performed using a private key ⁇ 1 and a guarantee card to which a small recording medium (b) recording the product information is attached or embedded, and the transaction hash or the two-dimensional code output and generated from the dedicated platform, and the dedicated platform records third verification information obtained based on the product information and/or the transaction information on the blockchain using the application [A] by at least one of the manufacturer, manufacturer, author, and various traders, and at the time of authentication certification, the authentication certifier uses the private key ⁇ 1 attached to the guarantee card and the application [B] to determine the consistency between the third signature information read from the blockchain based on the product information and the transaction information and the third verification information, thereby authenticating the product to be authenticated.
- the authentication certification system is the sixth invention, characterized in that the dedicated platform records fourth verification information obtained based on the transaction hash or a two-dimensional code corresponding thereto in the blockchain, and at the time of authentication certification, performs authentication certification of the product requiring authentication by determining the consistency between the fourth signature information obtained based on the transaction hash obtained from the authentication certifier or a two-dimensional code corresponding thereto and the fourth verification information.
- the authentication certification system is the seventh invention, characterized in that, at the time of the authentication certification, at least one of the results of the comparison between the first verification information and the first signature information, the results of the comparison between the third verification information and the third signature information, and the results of the comparison between the fourth verification information and the fourth signature information are consistent, and the results of the comparison between the second verification information and the second signature information are consistent, thereby satisfying the authentication of the product requiring authentication.
- the authentication and certification system of the ninth invention is the eighth invention, characterized in that the dedicated platform uses the transaction hash as is as the fourth verification information, and at the time of authentication and certification, uses the transaction hash obtained from the authentication certifier as is as the fourth signature information.
- the authentication method is characterized in that it uses a distributed file server to generate a hashed identifier that is individually assigned to the product to be authenticated based on the digital property data of the product to be authenticated, uses a dedicated platform to record NFT (Non-fungible token) information of the product to be authenticated linked to the identifier on a blockchain and outputs the generated transaction hash or a two-dimensional code corresponding thereto, uses a recording means to link first verification information held by each of multiple users related to the product to be authenticated to the NFT information and record it in the order in which the multiple users are involved, and at the time of authentication certification, reads out the first verification information linked to the NFT information corresponding to the transaction hash obtained from the authentication certifier or the two-dimensional code corresponding thereto, and determines the consistency between the read first verification information and the first signature information held by the authentication certifier, thereby authenticating the product to be authenticated.
- NFT Non-fungible token
- NFT information linked to a unique identifier is recorded in the blockchain data only for genuine products made by multiple users such as manufacturers, producers, and copyright holders.
- This allows NFT information to be recorded accurately and also prevents the NFT information itself from being tampered with.
- This makes it possible to perform highly reliable authentication even when authenticating digital goods.
- a pirated version of a digital good which is a counterfeit or fake, appears, it is possible to incorporate a function into the authentication system that can capture the pirated version along with the "5W1H" information, thereby preventing the leakage of pirated versions.
- FIG. 1 is a diagram showing the system configuration of an authentication and certification system to which the present invention is applied.
- 2A and 2B are diagrams for explaining the processing operation of the digital property authentication certificate.
- FIG. 3 is a flowchart showing the process of generating an NFT transaction hash and a two-dimensional code from digital property data.
- FIG. 4 is a diagram for explaining a configuration required for analog property authentication certification.
- FIG. 5 is a schematic diagram illustrating one embodiment of an analog property authentication certificate.
- FIG. 6 is a diagram showing an example of blockchain data that records product information and transaction information that is recorded on a dedicated platform when performing analog property authentication certification.
- 7(a) and 7(b) are diagrams for explaining the processing operation of a hybrid (analog/digital) authentication certificate.
- FIG. 8 is a flowchart of ownership verification through a blockchain wallet.
- 9(a) and 9(b) are diagrams showing an example of hybrid authentication proof based on a transaction hash or a two-dimensional code together with proof-of-ownership data (blockchain wallet proof-of-ownership).
- 10A and 10B are diagrams showing an example of hybrid authentication certification that combines an identifier or the like with analog property authentication certification.
- FIG. 11 is another diagram showing an example of hybrid authentication certification that combines an identifier or the like with analog property authentication certification.
- FIG. 12 is a diagram showing a flow of an authentication and certification method using traceability.
- FIG. 13 is a diagram showing the flow of a modified example of the authentication and certification method using traceability.
- FIG. 1 shows the system configuration of an authentication certification system 1 to which the present invention is applied.
- the authentication certification system 1 is used by users (including people involved with the product 5 to be authenticated, such as manufacturers, producers, authors, etc., distributors, wholesalers, retailers, etc. (hereinafter collectively referred to as various businesses, etc.), owners, consumers, etc.).
- terminals 2 and 72 operated by users e.g., various businesses, etc.
- a distributed file server 3 operated by an administrator, etc. are connected via a public communication network 10 such as the Internet, forming a dedicated platform 8 via this public communication network 10.
- the users who operate terminals 2 and 72 can be set arbitrarily depending on the purpose, but the following description will be given as an example of a case where terminal 2 is operated by various businesses, etc., and terminal 72 is operated by a consumer as necessary.
- the terminal 2 is composed of electronic devices such as a personal computer (PC), but may be embodied in any other electronic devices such as a mobile phone, smartphone, tablet device, wearable device, etc., other than a PC.
- Various businesses operate the terminal 2 to perform various tasks to generate an identifier from the product 5 requiring authentication.
- the product 5 requiring authentication that is the subject of authentication certification can be broadly classified into analog goods and digital goods.
- analog goods include any product that requires authentication certification, such as bags, satchels, clothing, watches, art and crafts, and automobiles.
- Digital goods include any digital content that requires authentication certification, such as digital images, digital audio, digital music, and digital videos.
- Digital goods also include, for example, information that has been digitized from information about analog goods (for example, product images, serial numbers, authentication certificates, etc.).
- the product 5 requiring authentication includes not only new products, but also second-hand products (secondary distribution, tertiary distribution, and other n-th distribution (n is an integer of 4 or more)).
- the terminal 72 is also configured as an electronic device such as a PC, but may also be embodied as any other electronic device such as a mobile phone, smartphone, tablet device, or wearable device.
- the consumer operates the terminal 72 to attempt to obtain authentication proof for the product 5 requiring authentication.
- the distributed file server 3 is a distributed file system intended to connect the terminals 2 to the same file system, and may be configured as a so-called IPFS (Inter Planetary File System), but is not limited to this.
- IPFS Inter Planetary File System
- the distributed file server 3 is provided with data by various businesses that access the public communication network 10 via the terminals 2, and consumers can request the data in a P2P (Peer to Peer) format.
- the distributed file server 3 is a place to store all digital content that requires authentication proof, such as digital images, digital audio, digital music, and digital videos of the product 5 requiring authentication, and at the same time as the storage, a multi-digit character string called an identifier is generated, as described below. When identifying the identifier of the product 5 requiring authentication, if it is new, the image will be exactly the same, but unique additional information such as a product management number is added along with the digital content, so the identifier generates a unique character string.
- each digital good is individually characterized by its own scratches, scuffs, deformation, etc., so the above identifier generates a unique string.
- Such characterized digital goods which are unique to second-hand goods, are extremely important in providing authentication proof in the resale industry. For example, if someone who purchases a second-hand watch brings the replaced watch to the store where they bought it and requests a return, if the NFT (Non-fungible token) corresponding to the digital good and information based on the identifier described below are stored on the blockchain, they can be used as evidence when checking the difference between the watch sold to the customer and the watch brought in by the customer.
- NFT Non-fungible token
- the dedicated platform 8 references a blockchain 8a.
- a blockchain having a P2P network such as a distributed ledger can be used as the blockchain 8a.
- identifiers generated by hashing based on the digital property data of the product 5 requiring authentication are recorded on this blockchain 8a.
- the blockchain 8a referred to here may be any type of blockchain, including a blockchain with a P2P network such as a distributed ledger, a public blockchain, a private blockchain, a consortium blockchain, etc.
- recording on the blockchain 8a also includes the concept of recording a state in which hash values for proving specific data are linked together.
- Recording on the blockchain 8a also includes the concept of recording information in which various information, such as hash values, is encrypted or digitally signed, and for example, information recorded on the blockchain 8a may be recorded in a format appropriate to the application, such as encryption technology or digital signature technology.
- the authentication certification system 1 to which the present invention is applied can realize two types of authentication certification, broadly classified as digital property authentication certification and hybrid authentication certification, as described below.
- Authentication certification of digital goods involves acquiring digital goods data for the product 5 requiring authentication as shown in FIG. 2(a).
- This digital goods data is acquired for the subject of authentication certification.
- This digital goods data is digital image data consisting of digital goods data captured using a terminal 2 or a digital camera for the product 5 requiring authentication.
- This digital goods data may be configured as digital goods data obtained by a manufacturer, manufacturer, author, etc. capturing images via such a terminal 2, or may be data originally assigned to the product 5 requiring authentication or recorded on a storage medium in association with the product 5.
- This digital goods data is any digital content requiring authentication certification, such as digital images, digital audio, digital music, digital video, etc., and may be assigned an extension such as jpg, png, gif, mp3, mov, etc.
- the manufacturer, creator, author, etc. registers the digital property data of the product 5 to be authenticated thus obtained in the dedicated platform 8.
- the dedicated platform 8 acquires NFT information based on the NFT issued via the blockchain 8a referenced by the dedicated platform 8, and automatically generates a transaction hash and a two-dimensional code corresponding to the NFT information. It becomes possible to determine whether the product 5 to be authenticated is a counterfeit or genuine through the transaction hash and two-dimensional code of the NFT information issued and generated in this manner.
- the NFT information may refer to the publicly known NFT itself, or may refer to information obtained by processing the NFT based on publicly known technology such as encryption or digital signature.
- the NFT information may also include an identifier linked to the NFT.
- digital property data is recorded in a distributed file server and an identifier is issued, from which a unique two-dimensional code A can be generated.
- a unique two-dimensional code B can also be generated from a transaction hash obtained via the blockchain.
- two-dimensional code A and two-dimensional code B are different from each other, they can be used as one of the authentication elements of the appraisal certification system 1.
- Two-dimensional code B is well known, but the addition of two-dimensional code A can increase the security of multisig authentication. Only the two-dimensional code A or only the two-dimensional code B can be used as an authentication element. Furthermore, the two-dimensional codes A and B can be used together as authentication elements to increase the strength of multisig authentication.
- Figure 3 is a flowchart showing the process of issuing a transaction hash or two-dimensional code of NFT information from such digital goods data. Note that Figure 3 shows an example in which an NFT is used as the NFT information.
- step S11 the manufacturer, creator, etc. obtains digital property data for the product 5 requiring authentication and registers it on the dedicated platform 8.
- the processing operation for registering this digital property data is performed by the manufacturer, creator, etc. by accessing the dedicated platform 8 via the terminal 2.
- the manufacturer, creator, etc. may access the dedicated platform 8 from within the terminal 2 and execute the various procedures by installing the applications required for the procedures in advance.
- step S12 the dedicated platform 8 accepts registration of digital goods data.
- the dedicated platform 8 may be configured as a so-called NFT marketplace or the like.
- NFT marketplace a so-called NFT marketplace or the like.
- the dedicated platform 8 accepts registration of digital goods data, it issues, for example, an NFT marketplace registration number to that digital goods data each time. This registration number is issued each time registration of digital goods data is accepted, and is therefore unique.
- step S13 the digital property data accepted for registration in step S12, the issued registration number, and information on the manufacturer, creator, etc. are collected into a single folder or the like, and registered in the distributed file server 3.
- the manufacturer, creator, etc. information include names, corporate information, pen names, pen names, etc.
- work information includes information on the work name, production year, release year, work specifications (size, format, technology used), copyright of the work, and rights information such as portrait rights and design rights included in the work.
- supplementary information any method may be used instead as long as the digital property data, registration number, and information on the manufacturer, creator, etc. (hereinafter collectively referred to as supplementary information), these three pieces of information, are registered in a linked state.
- the distributed file server 3 issues a unique ID for each piece of registered additional information.
- the ID issued for the digital property data is called the first ID
- the ID issued for the registration number is called the second IDa
- the ID issued for information on the manufacturer, producer, author, etc. is called the second IDb.
- the second IDa is unique.
- the information on the manufacturer, manufacturer, author, etc. such as the company name, date of birth, name of the copyright holder, title of the work, etc., may not be unique depending on the content, it is possible to set up a unique ID for each, so the second IDb can also be unique.
- time information such as the date and time and seconds registered in the distributed file server 3 can be added, which can increase the accuracy of uniqueness.
- At least the digital property data is recorded in the distributed file server 3 in step S14.
- the distributed file server 3 is configured to prevent the digital property data from being lost in multiple ways by adopting a distributed form. Such a configuration setting is also possible.
- step S15 a unique identifier is generated based on the associated information linked to each other.
- This generated identifier is linked to the associated information and can become an identifier held by the associated information.
- This identifier is generated based on the first ID, second IDa, and second IDb described above. Since the second IDa is unique and the second IDb is also unique, even if the same digital property data (first ID) is the same or a duplicate, the newly generated identifier will always be unique. This hashed and generated identifier is called an identifier.
- this identifier may be generated based on rules defined in the distributed file server 3, based on the additional information placed in the folder.
- a two-dimensional code may also be generated based on the generated identifier (step S23).
- step S16 the dedicated platform 8 receives an identifier from the distributed file server 3. If a two-dimensional code was generated in step S23, the dedicated platform 8 receives the two-dimensional code from the distributed file server 3.
- step S17 the dedicated platform 8 transmits an identifier based on the additional information to the blockchain 8a.
- step S18 the blockchain 8a records the NFT information issued based on the identifier transmitted from the dedicated platform 8 on the blockchain 8a.
- NFT information linked to the identifier e.g., writing it to the blockchain data 8b
- each block in the blockchain 8a contains a timestamp and a link (hash value) to the previous block, and the data in the block cannot be changed retroactively.
- a transaction hash and/or a two-dimensional code corresponding to the NFT information is generated.
- the generation of this transaction hash and/or two-dimensional code may be performed simultaneously with recording to the blockchain 8a.
- the transaction hash here is indicated by a character string of about 64 digits in the case of Ethereum, for example, for identifying the NFT information.
- a combination of a contract address and a token ID may be used.
- the contract address here refers to a unique address where a contract is deployed on the blockchain (Ethereum, etc.).
- the token ID refers to the NFT information identified by the contract address.
- the two-dimensional code is a code for identifying the transaction hash.
- the issued transaction hash and two-dimensional code are sent to the dedicated platform 8 (which may be, for example, a marketplace), and are received (step S20).
- the blockchain 8a also transmits this NFT information to various businesses, etc. as necessary (step S21).
- This transmitted NFT information may be substituted for the issued transaction hash or two-dimensional code.
- the various businesses, etc. receive this NFT information (step S22).
- the various businesses, etc. can receive such transaction hash or two-dimensional code via the terminal 2.
- the authority to obtain digital property data and register it on the dedicated platform 8 is given only to various businesses, etc.
- the product 5 requiring authentication is a bag, suitcase, clothing, watch, art or craft item, automobile, etc.
- only various businesses, etc. or those authorized to act as sales agents for the product may be given the authority to register the digital property data on this dedicated platform 8.
- Various businesses, etc., or consumers who purchase a new or used product 5 that is to be authenticated as a genuine product receive this transaction hash or two-dimensional code from the various businesses, etc., or the dedicated platform 8 (e.g., a marketplace) along with the product 5 to be authenticated.
- the various businesses, etc., or consumers who receive the transaction hash or two-dimensional code can use the transaction hash or two-dimensional code to access the blockchain 8a of the dedicated platform 8 and read the NFT information of the product 5 to be authenticated that is recorded there. This allows only the true various businesses, etc., or true consumers who possess the transaction hash or two-dimensional code to easily perform a highly reliable authentication certification. For this reason, third parties who do not possess this transaction hash or two-dimensional code cannot perform such authentication certification itself.
- the unique NFT information derived from the unique identifier for only genuine products 5 to be authenticated by various businesses, etc. is written sequentially into the blockchain data 8b of the dedicated platform 8. This allows the NFT information itself to be recorded accurately, and also makes it possible to completely prevent the NFT information itself from being tampered with. Therefore, various businesses, etc. of products to be authenticated 5, or consumers who have purchased products to be authenticated 5 that have been distributed through complex distribution routes or sold over the internet, can easily perform highly reliable authentication certification.
- the digital property appraisal certificate is not limited to the above-mentioned embodiment.
- step S13 the case where additional information is registered together with the digital property data to generate an identifier has been described, but the present invention is not limited to this, and any information may be registered as long as it is linked to at least some information with respect to the digital property data.
- the information referred to here is any information or data related to the digital property data or generated in association with the digital property data, such as the above-mentioned registration number, information on the manufacturer, manufacturer, author, etc.
- the additional information may be composed of only one of the registration number and information on the manufacturer, manufacturer, author, etc.
- the additional information may not include any of the registration number and information on the manufacturer, manufacturer, author, etc., but may be composed of any information or data related to the digital property data or generated in association with the digital property data.
- hybrid authentication certification in addition to the above-mentioned digital property authentication certification, analog property authentication certification is further combined to perform authentication of the product 5 requiring authentication with higher accuracy.
- a small recording medium (a 1 ) 51a is attached or incorporated into the product 5 to be authenticated, and information including a private key ⁇ 1 and product information (product name, product number, manufacturer/manufacturer (author), manufacturing location, manufacturing date, etc.) is recorded therein, and a small recording medium (b) 52a is attached or incorporated into the guarantee card 24, and information including a private key ⁇ 1 and product information is recorded therein.
- small recording media such as IC chips, two-dimensional codes, and electronic watermarks can be appropriately used depending on the shape, structure, size, etc. of the product 5 to be authenticated and the guarantee card 24.
- the "private key” refers to information for realizing authentication certification of the product 5 requiring authentication, and for example, the integrity of the "private key” itself may be judged at the time of authentication certification.
- the “private key” refers to information that cannot be known by anyone other than a specific user, and may be recorded, for example, on the above-mentioned "small recording medium,” or may be recorded within a configuration used in the authentication certification system 1, such as the terminal 72 or the dedicated platform 8.
- a "public key” may be generated as a pair with the "private key”.
- the "private key” and “public key” can be used to implement known encryption techniques or electronic signature techniques.
- consistency may be determined based on whether the "public key” was generated as a pair with the "private key”.
- the "public key” may be recorded, for example, on the above-mentioned “small recording medium”, or may be recorded arbitrarily depending on the application within a configuration used in the authentication and certification system 1, such as the dedicated platform 8.
- the "private key” and “public key” may be generated using known techniques, and may be generated arbitrarily depending on the application, using a configuration used in the authentication and certification system 1, such as the dedicated platform 8 or the distributed file server 3.
- the product information in the small recording medium (a 1 ) 51a of the product to be authenticated 5 and the small recording medium (b) 52a of the guarantee card 24 is input by various businesses etc. when the product to be authenticated 5 is shipped.
- FIG. 5 is a schematic diagram showing one embodiment of analog property authentication certification.
- a dedicated platform 8 that records product information of the product 5 requiring authentication and transaction information at each distribution stage until the product 5 requiring authentication is delivered to the consumer as blockchain data 8b of a blockchain 8a, a terminal 2a connected to the dedicated platform 8 via a public communication network 10 by an application [A] 9, and a terminal 2b connected to the dedicated platform 8 via a public communication network 10 by an application [B] 11.
- the consumer can use the private key ⁇ 1 assigned to the product 5 to be authenticated and the private key ⁇ 1 assigned to the guarantee card 24 to read the product information and transaction information of the product 5 to be authenticated that have been written to the blockchain data 8b of the dedicated platform 8, thereby enabling the consumer to easily obtain a highly reliable authentication certificate.
- Application [A] 9 is downloaded to terminal 2a and operated, and various businesses can use it to write product information and transaction information to the blockchain data 8b of the dedicated platform 8.
- Application [B] 11 is downloaded to terminal 2b and operated, and consumers can read the product information and transaction information of the product 5 requiring appraisal that has been written to the blockchain data 8b of the dedicated platform 8.
- application [A] 9 may have the same functions as application [B] 11
- application [B] 11 may have the same functions as application [A] 9.
- the private key ⁇ 1 and information including product information recorded on the small recording medium (a 1 ) 51a of the product to be authenticated 5, and the private key ⁇ 1 and information including product information recorded on the small recording medium (b) 52a of the guarantee card 24 can be read via wireless communication by bringing a reader 25 connected to the terminal 2a or a terminal 2b configured as a smartphone into close proximity. In this case, the reading can also be performed contactlessly by short-distance wireless communication such as NFC (Near Field Communication) or RFID (Radio Frequency IDenticifier).
- NFC Near Field Communication
- RFID Radio Frequency IDenticifier
- Figure 6 shows an example of blockchain data 8b in which various businesses record product information and transaction information on a dedicated platform 8 for a product 5 requiring authentication when conducting analog property authentication certification.
- the product 5 requiring authentication is manufactured by a manufacturer, creator, author, etc.
- it is shipped together with a guarantee card 24.
- the person in charge at the manufacturer, creator, author, etc. first uses application [A] 9 to write information including the following product information and 5W1H information (who, when, where, what, why, how), such as the product name, product number, manufacturer, manufacturing location, and manufacturing date, into the blockchain data 8b of the dedicated platform 8.
- the responsible person of the manufacturer, creator, author, etc. uses application [A] 9 to write the product information recorded by the person in charge of the manufacturer, creator, author, etc., including the inspection results and 5W1H information, into the blockchain data 8b of the dedicated platform 8.
- the logistics company uses application [A] 9 to write information including the date and time when the product was received from the manufacturer, producer, author, etc., the date and time when it was delivered to the wholesaler, and the 5W1H information, into the blockchain data 8b of the dedicated platform 8.
- the wholesaler uses application [A] 9 to write information including, for example, the date and time the product was delivered by the logistics company, the date and time the logistics company transported it to the retailer, and 5W1H information, into the blockchain data 8b of the dedicated platform 8.
- the authority to write product information and transaction information to the blockchain data 8b is given only to each of the various businesses involved in this information. For example, each of the various businesses may only be given the authority to write product information.
- each block in the blockchain data 8b contains a timestamp and a link (hash value) to the previous block, and the data in a block cannot be changed retroactively.
- a consumer who purchases a new or used product 5 to be authenticated can use the private key ⁇ 1 attached to the product 5 to be authenticated and the private key ⁇ 1 attached to the guarantee card 24 with the terminal 2b to read the product information and transaction information of the product 5 to be authenticated that have been written in the blockchain data 8b of the dedicated platform 8 with the application [B] 11. This allows only the genuine consumer who owns the product 5 to be authenticated and the guarantee card 24 to easily provide a highly reliable authentication certificate.
- analog goods authentication certification a consumer who purchases a product 5 requiring authentication that has been distributed through complex distribution routes or sold over the internet can easily obtain a highly reliable authentication certification.
- various businesses etc. sequentially write the product information and transaction information of the product 5 requiring authentication to the blockchain data 8b of the dedicated platform 8. This allows the product information and transaction information to be recorded accurately, and also completely prevents the product information and transaction information from being tampered with. This further increases the reliability of the authentication certification.
- n small recording media including a small recording medium (a 2 ) recording information including a private key ⁇ 2 to a small recording medium (a n ) recording information including a private key ⁇ n can be attached or incorporated into the product 5 to be authenticated together with the small recording medium (a 1 ).
- This makes it possible to adopt multi-sig authentication in which authentication certification is established when not only the private keys ⁇ 1 and ⁇ 1 but also at least two of all the private keys ⁇ 2 to ⁇ n (for example, the private key ⁇ 1 and at least one of the private keys ⁇ 1 and ⁇ 2 to ⁇ n ) are present, thereby making it possible to make the accuracy of the authentication more reliable.
- n small recording media (a 1 ) to (a n ) to each part of the product 5 to be authenticated, even if some of the parts are replaced with counterfeits, this can be detected.
- the product to be authenticated 5 is an automobile
- small recording media can be attached to or incorporated into the body of the vehicle and each tire, thereby making it possible to authenticate all parts.
- At least one of the small recording media (a 1 ) to (a n ) and the small recording media (b) can preferably be provided with a GPS function, so that even if each part of the product to be appraised 5 or the guarantee card 24 is lost or stolen, its location can be easily detected.
- the private key ⁇ 1 assigned to the product 5 to be inspected and the private key ⁇ 1 assigned to the guarantee card 24 are used to read out the product information and transaction information of the product 5 to be inspected, which are recorded in the block chain 8a of the dedicated platform 8.
- the transaction hash or the two-dimensional code is used to access the application installed on the terminal 72, and authentication proof is performed.
- this hybrid authentication certification makes it possible to provide a more reliable authentication certification system 1 by interweaving digital property authentication certification in addition to analog property authentication certification.
- FIG. 7(a) the present invention has been described taking as an example a case in which three items, a product to be authenticated 5 and a guarantee card 24, as well as a transaction hash or a two-dimensional code, are prepared, but the present invention is not limited to this.
- a hybrid authentication proof can be similarly performed by preparing a combination of only two items, a product to be authenticated 5 or a guarantee card 24, as well as a transaction hash or a two-dimensional code.
- the private key ⁇ 1 assigned to the product 5 to be authenticated or the private key ⁇ 1 assigned to the guarantee card 24 is used to read out the product information and transaction information of the product 5 to be authenticated, which are recorded in the block chain 8a of the dedicated platform 8.
- the transaction hash or the two-dimensional code can be used to determine consistency via an application installed on the terminal 72. Only when all of these determination results are determined to be correct can the product 5 to be authenticated be determined to be genuine.
- ownership proof may be performed through a blockchain wallet for storing tokens such as Ethereum, which will be described below.
- the ownership proof using a blockchain wallet described below is one example, and may be, for example, a DID (Decentralized Identity, or Decentralized Identifier), an SSI (Self-Sovereign Identity), or another "DIW (Digital Identity Wallet).”
- DID Decentralized Identity, or Decentralized Identifier
- SSI Self-Sovereign Identity
- DIW Digital Identity Wallet
- microchip IC chip
- two-dimensional code IC watermark, etc.
- electronic watermark etc.
- Figure 8 shows a flowchart of ownership proof through a blockchain wallet.
- the owner 41 first requests a one-time token from the backend 42.
- the owner 41 here is, for example, the owner of a blockchain wallet that can be used as an extension to a web browser or a smartphone app, and is shown as an example of the user mentioned above.
- the owner 41 sends and receives information through the frontend, which is an element that directly exchanges data with the owner 41, and in web production, it refers to the web browser side (client side).
- the backend 42 refers to server-side processing, and generally refers to mechanisms, functions, and parts such as servers, databases, functions, and programs and modules that handle processing that are not visible to the owner 41.
- step S32 the backend 42 returns a one-time token to the owner 41.
- the expiration time of this one-time token may be, for example, a few seconds to a few minutes.
- step S33 the owner 41 issues a signature creation request to the blockchain wallet 43.
- This blockchain wallet 43 is, for example, a program that handles crypto assets. With this blockchain wallet 43, the address and its private key are not stored on an external server, and remittance processing and the like may all be performed on the browser.
- step S34 where the signature is returned from the blockchain wallet 43 to the owner 41.
- step S35 the owner 41 sends the message, one-time token, signature data, and blockchain wallet address to the backend 42. That is, before signing, the owner 41 requests a one-time token for owner authentication from the backend 42, which is used for signing. When sending the signature data to the backend 42, the owner 41 also sends the one-time token mentioned above. The backend 42 verifies the signature data and the one-time token.
- the backend 42 converts the signed message into hash data according to the standard. Then, the hash message and the signature data are sent to the smart contract 44 (step S36).
- the smart contract 44 here is a mechanism for automatically executing a contract on the blockchain 8a, and runs on the server of the blockchain 8a.
- step S37 the smart contract 44 returns the verification address to the backend 42.
- the backend 42 checks the verification address. In this case, the backend 42 checks the consistency between the blockchain wallet address and the verification blockchain wallet address.
- step S38 the backend 42 sends the blockchain wallet owner certificate to the owner 41.
- the owner 41 wishes to perform ownership certification for the product 5 requiring authentication, this can be achieved by reading out the owner certification data (blockchain wallet owner certificate) recorded in the smart contract (blockchain 8a) in this manner.
- a blockchain wallet owner proof when such a blockchain wallet owner proof is used, it may be further combined with an analog property authentication proof as shown in Fig. 9(b).
- the private key ⁇ 1 given to the product to be authenticated 5 in the analog property authentication proof and the private key ⁇ 1 given to the guarantee card 24 may be used, or the private key ⁇ 1 or the private key ⁇ 1 may be used. It becomes possible to perform hybrid authentication proof based on the private key ⁇ 1 and/or the private key ⁇ 1 in addition to the owner proof data (blockchain wallet owner proof), the transaction hash, or the two-dimensional code.
- authentication proof via NFT is not essential, and authentication proof may be performed via an identifier, as shown in FIG. 10. Since the identifier itself is unique, authentication proof can be performed via this.
- the consumer or manufacturer/producer/author, etc. obtains the identifier from the dedicated platform 8. At this time, if a two-dimensional code corresponding to the identifier has been generated in step S23 in addition to the identifier, the consumer or manufacturer/producer/author, etc., may obtain the two-dimensional code.
- a private key ⁇ 1 assigned to the product to be authenticated 5 as shown in FIG. 10(a), or a private key ⁇ 1 and a private key ⁇ 1 assigned to the guarantee card 24 as shown in FIG. 10(b) are prepared.
- the product information and transaction information of the product to be inspected 5 recorded in the blockchain 8a via the dedicated platform 8 is read.
- the identifier or a two-dimensional code corresponding to the identifier is used to access the dedicated platform 8 or the distributed file server 3, and the identifier of the product to be inspected 5 recorded therein is read. Only when it is determined that all of the product information, transaction information, and identifier of the product to be inspected 5 that have been read are correct, can the product to be inspected 5 be determined to be genuine.
- the criterion for determining that the product is genuine may be, for example, at least one of the product information, transaction information, and identifier of the product to be inspected 5 that are correct, and can be set arbitrarily according to the application.
- a hybrid authentication proof may be performed by further combining owner proof data (blockchain wallet owner proof).
- hybrid authentication proof may be performed using the acquired identifier or a two-dimensional code corresponding to the identifier, as well as the private key ⁇ 1 attached to the guarantee card 24, as shown in Fig. 11. Since the product 5 to be authenticated is not embodied as an item and the small recording medium a itself cannot be attached, hybrid authentication proof is performed by omitting the private key ⁇ 1 and using only the private key ⁇ 1 . In the example of Fig. 11, hybrid authentication proof may be performed by further combining owner certification data (blockchain wallet owner certification).
- the present invention is not limited to the above-described embodiment, and may be implemented by incorporating authentication by counting up.
- the time of the authentication proof is recorded on the blockchain 8a sequentially each time the authentication proof described above is performed. For example, if the authentication proof is performed at 10:15 on August 19th, the time of 10:15 on August 19th is recorded on the blockchain 8a, if the authentication proof is then performed at 21:54 on September 23rd, the time of 21:54 on September 23rd is recorded on the blockchain 8a, and if the authentication proof is then performed at 13:34 on November 4th, the time of 13:34 on November 4th is recorded on the blockchain 8a. As a result, the time points at which authentication proof is recorded are sequentially accumulated on the blockchain 8a.
- the authentication certification by counting up is based on the time when it was recorded in the blockchain 8a. For example, if multiple authentication certifications are recorded in the blockchain 8a at the same time, it is clear that one of the products 5 to be authenticated is genuine and the others are fake. In such a case, a notification to that effect may be sent.
- the time difference between the authentication certificates is several tens of seconds, several minutes to several tens of minutes, or even several hours, this may be suspicious since it is rare for the same item to be authenticated frequently. In such cases, a notification to that effect may also be provided.
- a threshold may be set for the interval between the times recorded in the blockchain 8a, and authentication certification may be performed based on whether or not the interval is below this threshold.
- location information regarding the location where the authentication certification was performed may be linked and recorded in the blockchain 8a. For example, if the location of the authentication certification was "Marunouchi, Tokyo" in addition to the time of August 19th 10:15, the time of August 19th 10:15 and the location information "Marunouchi, Tokyo” are recorded in the blockchain 8a. If the next time the authentication certification was performed was December 21st 14:09 and the location of the authentication certification was "Address XX in Paris," the time of December 21st 14:09 and the location information "Address XX in Paris” are recorded in the blockchain 8a. As a result, the time when the authentication certification was recorded and its location information are sequentially accumulated on the blockchain 8a.
- the authenticity of the authentication certificate is judged based on the time and location information recorded sequentially in the blockchain 8a.
- the threshold may be set in relation to the location information.
- this determination of authenticity may also be based on whether or not a specified number of authentications were performed in one day, or whether the total number of authentications exceeded a specified number, regardless of location information.
- the authenticity is determined based on the number of authentications performed in a specified period of time.
- the authenticity is determined based on whether or not the number of authentications performed in a specified period of time exceeds a threshold. If the number of authentications performed in a specified period of time exceeds the threshold, it is unnatural for so many authentications to be performed in such a short period of time, so the authenticity may be determined to be suspicious and an alert may be issued.
- the product to be authenticated 5 is a cosmetic product or the like, and has an IC chip-containing tamper detection seal affixed to it, the IC chip-containing tamper detection seal will be destroyed upon use. For this reason, it becomes impossible for authentication certification to be performed multiple times, and if authentication certification were performed multiple times, it would clearly prove that counterfeit products are in circulation. In such cases, it can be said that there is an advantage to determining the authenticity of the product based on the number of authentication certifications performed within a specified period of time.
- Table 1 shows an example of the time and location information of authentication certifications recorded sequentially in the blockchain 8a.
- the number of times the authentication result has been displayed indicates the number of times authentication certifications have been performed.
- the time is displayed via date and time.
- Location information is displayed at the country, prefecture, city, town, or village level, but is not limited to this.
- the acquisition of location information is implemented, for example, in terminal 2 and/or terminal 72 that are attempting to perform the appraisal certification.
- Current location information may be obtained via an application, or the information may be obtained by tracing the accessed IP address.
- FIG. 12 shows the flow of an authentication certification method using traceability.
- the authentication certification method multiple users related to the product 5 requiring authentication hold first verification information.
- the first verification information includes at least one of the above-mentioned blockchain wallet address, the public key used when generating the blockchain wallet address, the private key used when generating the blockchain wallet address, the DID, the SSI, the DIW, or the VC (e.g., G Biz ID or My Number).
- the information to be used can be set for each user. This makes it possible to prevent the use of unnecessary information.
- GBiz ID or My Number can be positioned as information with higher reliability than DID. Therefore, by using GBiz ID, My Number, or DIW as the first verification information, it is possible to improve the reliability of the appraisal certification method.
- the first verification information held by the user as the authentication certifier is regarded as first signature information and is used to determine consistency with the first verification information recorded in the blockchain 8a or the like.
- the determination of consistency can be realized by carrying out the processes of "signature” and "signature verification” in electronic signature technology, for example.
- each user such as the manufacturer, creator, logistics company, consumer, etc.
- This blockchain wallet address may be assigned by the operator of this system.
- the private key and public key linked to this blockchain wallet address may be distributed to users such as the manufacturer, creator, logistics company, consumer, etc. who hold the blockchain wallet address, or may be recorded in a configuration used in the authentication certification system 1 such as the above-mentioned dedicated platform 8, or may be included in a small recording medium (e.g., a two-dimensional code) or as part of the NFT information, and may be set arbitrarily depending on the purpose.
- each entity such as the manufacturer, creator, logistics company, and consumer, may independently obtain a blockchain wallet address.
- step S41 digital property data is acquired for the product 5 requiring authentication.
- This digital property data is acquired for the subject of authentication certification.
- this digital property data may be configured as digital property data obtained by the manufacturer, creator, author, etc. by capturing an image via such a terminal 2, or may be data that is originally assigned to the product 5 requiring authentication or that is linked and recorded on a storage medium.
- This digital property data is any digital content that requires authentication certification, such as digital images, digital audio, digital music, digital video, etc., and is assigned an extension such as jpg, png, gif, mp3, mov, etc.
- the above-mentioned supplementary information and any product information related to the product 5 requiring authentication may also be acquired together with this digital property data.
- a file in CSV format containing such digital property data, registration number, supplementary information, product information, etc. may be acquired.
- step S42 where such digital goods data, ancillary information, product information, etc. are registered on the dedicated platform 8, and similarly to the above, NFT information is obtained and a transaction hash corresponding to the NFT information is automatically generated.
- This transaction hash may be embodied as data such as an ID (also called a TxID), or may be embodied as a blockchain address.
- a new first hash is generated by further hashing this transaction hash. Note that instead of generating the first hash based on the transaction hash, the transaction hash itself may be used as the first hash.
- the issued NFT information is of course linked to the transaction hash, but this NFT information is also linked to the first hash generated from this transaction hash. This NFT information is recorded on the blockchain 8a.
- step S43 similarly to the above-mentioned analog property authentication certificate, information including the private key ⁇ 1 , product information, and transaction information recorded on the small recording medium (a 1 ) 51a of the product 5 to be authenticated, and/or information including the private key ⁇ 1 , product information, and transaction information recorded on the small recording medium (b) 52a of the guarantee card 24 is read. Then, a second hash generated when recording the read information in the blockchain 8a is obtained.
- the guarantee card 24 also includes a logical guarantee card that is not embodied as an object but is instead digital information.
- step S44 a new third hash is generated based on the obtained first hash and second hash.
- This third hash may be generated by calculating the product or sum of the first hash and the second hash and using this as the third hash, or by any other well-known method.
- the calculated third hash is recorded on the blockchain 8a.
- this third hash may be recorded by linking it to the above-mentioned NFT information or a transaction hash corresponding to the NFT information and a two-dimensional code.
- step S41 to S44 may be performed in advance by the operating company, or may be performed by other related parties (manufacturers, manufacturers, authors, logistics companies, consumers, etc.).
- the process of distribution of the product 5 to be appraised from the manufacturers, manufacturers, and authors to the logistics companies and consumers begins after step S45, which is described below.
- the blockchain wallet address may be assigned by Web 2.0, which can be said to be a so-called centralized system, but is not limited to this.
- Web 3.0 in which all of an individual's digital assets are stored in a blockchain wallet without the need to enter personal information (gender, nationality, race, age, etc.), and no one can erase it.
- Web 3.0 may be applied in a so-called decentralized manner that does not rely on centralization.
- step S45 the product 5 to be authenticated, which was created by the manufacturer/producer/author, is first transferred to the distribution company. That is, in step S45, the owner of the product 5 to be authenticated is transferred from the manufacturer/producer/author to the distribution company. At this time, the small recording medium (a 1 ) and small recording medium (b) accompanying the product 5 to be authenticated are also transferred in the same manner. The owner of the NFT information of the product 5 to be authenticated is also transferred in the same manner.
- the blockchain wallet address of the transferee's owner is recorded in association with the NFT information.
- the blockchain wallet addresses of the manufacturer, producer, and author are recorded in association with the NFT information, but when the transfer occurs, the blockchain wallet address of the logistics company is recorded in association with the NFT information.
- various businesses, etc. may use application [A] or the like to record the blockchain wallet address at the time of transfer in the blockchain 8a of the dedicated platform 8.
- step S45 for example, using application [A] 9 as a recording means, the first verification information (here, blockchain wallet address) held by each of multiple users related to the product to be authenticated 5 can be linked to the NFT information and recorded in the order in which the multiple users are involved.
- the terminal 2, 72 held by the user or the dedicated platform 8 may be used as the recording means instead of application [A] 9.
- the destination where the recording means records various information such as the first verification information may be, in addition to the blockchain 8a, for example, the distributed file server 3 or other databases.
- step S45 the logistics company receives this transaction hash or two-dimensional code from various businesses or the dedicated platform 8 (e.g., a marketplace) along with the product 5 requiring authentication.
- the logistics company that receives the transaction hash or two-dimensional code can use the transaction hash or two-dimensional code to access the blockchain 8a of the dedicated platform 8 and read the NFT information of the product 5 requiring authentication that is recorded there.
- step S46 the product to be authenticated 5 is transferred from the logistics company to the consumer.
- the small recording media (a 1 ) and small recording media (b) accompanying the product to be authenticated 5 are also transferred in the same manner.
- the owner of the NFT information of the product to be authenticated 5 is also transferred in the same manner.
- the blockchain wallet address of the new owner is linked to the NFT information and recorded, so the new owner's blockchain wallet address is linked to the NFT information and recorded.
- step S46 the consumer also sends the transaction hash or the two-dimensional code together with the product 5 to be authenticated to various businesses or a dedicated platform 8.
- the consumer who receives the transaction hash or the two-dimensional code can use the transaction hash or the two-dimensional code to access the blockchain 8a of the dedicated platform 8 and read the NFT information of the product 5 to be authenticated that is recorded therein.
- Step S47 will be explained below as an example of the operation during authentication, and a user such as a consumer who attempts this authentication will be referred to as an authentication certifier.
- step S47 the authentication certifier first accesses the dedicated platform 8, and thus the blockchain 8a, to write to the log.
- This writing to the log can be realized from the user interface of the application, and for example, the authentication certifier's personal information such as the name and date of birth, and any other information, is entered by following the prompts on the user interface. Even if there is no prompting on the user interface, any information entered by the authentication certifier, or any character string that has no meaning as information, can be considered as writing to the log.
- the authentication certifier may access the log via this private key.
- the authentication certifier may generate a blockchain address himself and use it.
- the blockchain wallet address can be automatically obtained on the blockchain 8a.
- this private key may be entered on a user interface, and the dedicated platform 8 may verify whether or not a blockchain wallet address has been assigned to that private key.
- a signature is made on the dedicated platform 8. If this signature is made, the log writing is deemed successful, otherwise the log writing is deemed unsuccessful. This signature may be automatically executed by a program.
- the blockchain wallet address can be automatically obtained on the blockchain 8a. Therefore, the blockchain wallet address can be obtained by prompting the appraisal certifier to write a log on the user interface. For example, it may be possible to identify a public key via a private key, and to obtain the blockchain wallet address via this public key.
- the dedicated platform 8 can determine that it is the owner of the blockchain wallet address. On the other hand, if the log writing fails, it can determine that it is not the owner of the blockchain wallet address. If it determines that it is the owner of the blockchain wallet address, it reads out the determined blockchain wallet address (hereinafter referred to as the second blockchain wallet address or the first signature information).
- the method of acquiring the second blockchain wallet address is not limited to the above-mentioned method, and any other method may be used.
- it may be acquired by having the authentication certifier input it directly.
- step S47 a blockchain wallet address linked to the NFT information corresponding to the transaction hash obtained from the authentication certifier or the corresponding two-dimensional code is read from the blockchain 8a.
- the blockchain wallet address read from the blockchain 8a is referred to as the first blockchain wallet address (or first verification information).
- the consistency between the first blockchain wallet address and the second blockchain wallet address is determined. If the first blockchain wallet address and the second blockchain wallet address are identical, the matching is completed. Once the matching is completed, it can be determined that the product 5 to be authenticated is genuine and not a counterfeit. On the other hand, if the first blockchain wallet address and the second blockchain wallet address are not identical, it can be determined that the authentication certifier is not the owner of the product 5 to be authenticated.
- the first blockchain wallet address that is linked to it and recorded serves as evidence that the product is genuine.
- the second blockchain wallet address which is the same as this first blockchain wallet address, currently holds the authentic product 5.
- the first verification information such as the first blockchain address read in step S47 has consistency with the first signature information held by the most recent user of the multiple users who is involved with the product 5 to be authenticated.
- step S47 only the most recent user can perform authentication certification as the authentication certifier. This makes it easy to identify the user who currently owns or manages the product 5 to be authenticated.
- the first verification information such as the first blockchain address read in step S47 is consistent with the first signature information held by a user (i.e., a past user) who was involved with the product 5 before the most recent user among multiple users.
- the past user can perform the authentication certification as an authentication certifier. This makes it possible to identify users who have been involved with the product 5.
- step S47 may perform a process of granting a user who satisfies the authentication requirements of the product 5 to have the authority to view at least a portion of the information related to the product 5 to be authenticated (e.g., product information and transaction information used when recording in the blockchain 8a).
- the information related to the product 5 to be authenticated e.g., product information and transaction information used when recording in the blockchain 8a.
- step S47 the judgment may be made by combining, for example, the authentication certificate described below.
- a fourth hash is generated based on the transaction hash obtained from the authentication certifier or the transaction hash associated with the NFT information corresponding to the corresponding two-dimensional code.
- the method of generating this fourth hash is the same as the method of generating the first hash described above.
- step S47 the information including the private key ⁇ 1 , product information, and transaction information recorded on the small recording medium (a 1 ) 51a of the product 5 to be authenticated, and/or the information including the private key ⁇ 1 , product information, and transaction information recorded on the small recording medium (b) 52a of the guarantee card 24 is read. Then, a fifth hash generated when recording the read information in the blockchain 8a is obtained.
- a sixth hash is generated based on the obtained fourth hash and fifth hash.
- the method for generating this sixth hash is the same as the method for generating the third hash described above.
- the fifth hash generated when recording the information read from the small recording medium (a 1 ) 51a and the small recording medium (b) 52a in the blockchain 8a will be the same as the second hash. Also, if the authentication certifier holds a genuine product, the fourth hash generated based on the transaction hash received from the dedicated platform 8 (e.g., a marketplace) or the transaction hash linked to the two-dimensional code will be the same as the first hash.
- the dedicated platform 8 e.g., a marketplace
- the authentication of the product 5 to be authenticated may be certified by determining both the consistency between the first and second blockchain wallet addresses, and the consistency between the third hash and the sixth hash. That is, if the first and second blockchain wallet addresses are identical and the third hash and the sixth hash are identical, the matching is completed. Upon completion of the matching, it is determined that the product 5 to be authenticated is genuine. On the other hand, if either or both of the first and second blockchain wallet addresses, or the third hash and the sixth hash are not identical, it can be determined that the authentication certifier is not the owner of the product 5 to be authenticated.
- authentication can be performed based on completely different methods, namely, the consistency between the first blockchain wallet address and the second blockchain wallet address, and the consistency between the third hash and the sixth hash. Therefore, even if a product 5 requiring authentication is determined to be genuine by successfully circumventing one of the authentication methods, if it is determined to be a counterfeit by the other authentication method, the product 5 will not be determined to be genuine. In this way, it is possible to achieve a higher level of authentication accuracy for products requiring authentication 5 that require stronger authentication.
- steps S43 to S47 may be performed using application [A] 9 and application [B] 11, or, for example, at least a part of them may be performed using a dedicated platform 8.
- the authentication certification method may perform authentication certification without generating the third hash and the sixth hash.
- the second to fourth verification information and the second to fourth signature information are used for the authentication certification.
- Each piece of verification information and each piece of signature information may include, for example, information in hash format, or may include information obtained by encrypting or digitally signing information in hash format (hereinafter referred to as encryption, etc.).
- encryption etc.
- each piece of verification information and each piece of signature information may include at least one of a private key and a public key used for encryption, etc.
- step S43a which is a modified example of step S43
- second verification information based on information including at least one of the private key ⁇ 1 , product information, and transaction information recorded in the small recording medium (a 1 ) 51a of the product 5 to be inspected is recorded in the blockchain 8a.
- the second verification information may indicate information including at least one of the private key ⁇ 1 , product information, and transaction information, or may indicate information obtained by performing processing such as encryption on information including at least one of the product information and transaction information using the private key ⁇ 1.
- the second verification information may indicate information in a hash format obtained when recording at least one of the private key ⁇ 1 , product information, and transaction information in the blockchain 8a, or information obtained by performing processing such as encryption on the hash.
- step S43a third verification information based on information including at least one of the private key ⁇ 1 , product information, and transaction information recorded in the small recording medium (b) 52a of the guarantee card 24 is recorded in the blockchain 8a.
- the third verification information may indicate information including at least one of the private key ⁇ 1 , product information, and transaction information, or may indicate information obtained by encrypting or otherwise processing the product information and at least one of the transaction information using the private key ⁇ 1 .
- the third verification information may indicate information in a hash format obtained when recording at least one of the private key ⁇ 1 , product information, and transaction information in the blockchain 8a, or information obtained by encrypting or otherwise processing the hash.
- step S43a fourth verification information generated, for example, based on the transaction hash is recorded in the blockchain.
- the fourth verification information may indicate the transaction hash, or may indicate, for example, information obtained by encrypting the transaction hash. Note that the fourth verification information may be generated, for example, based on a two-dimensional code corresponding to the transaction hash.
- step S43a can be performed using application [A] 9, or, for example, can be performed using a dedicated platform 8 for at least a portion of the processing.
- step S47a which is a modified example of step S47, second signature information is obtained based on information including at least one of the private key ⁇ 1 , product information, and transaction information recorded in the small recording medium (a 1 ) 51a of the product 5 to be authenticated obtained from the authentication certifier, for example.
- the second signature information may indicate information including at least one of the product information and transaction information, or may indicate information in a hash format generated when reading at least one of the product information and transaction information and recording the read information in the blockchain 8a.
- the second signature information may be obtained by performing a generation method similar to that of the fifth hash described above, for example.
- step S47a third signature information is obtained based on information including at least one of the private key ⁇ 1 , product information, and transaction information recorded in the small recording medium (b) 52a of the guarantee card 24 obtained from the appraisal certifier.
- the third signature information may indicate information including at least one of the product information and transaction information, or may indicate information in a hash format generated when reading at least one of the product information and transaction information and recording the read information in the blockchain 8a.
- the third signature information may be obtained by implementing a generation method similar to that of the fifth hash described above.
- step S47a fourth signature information is obtained, for example, based on the transaction hash obtained from the authentication certifier or a two-dimensional code corresponding thereto.
- the fourth signature information may be obtained, for example, by implementing a generation method similar to that of the fourth hash described above.
- step S47a at least one of the consistency between the second verification information and the second signature information, the consistency between the third verification information and the third signature information, and the consistency between the fourth verification information and the fourth signature information is determined.
- the consistency between each piece of verification information and the signature information may be determined, for example, for information of the same format (e.g., information in hash format), or may be determined for one piece of information in hash format and the other piece of information that has been encrypted or otherwise processed. In either case, the determination may be made using known technology.
- a search may be performed to determine whether the same verification information is stored on the blockchain 8a, and then whether they are identical.
- the product to be authenticated 5 may be deemed to be a genuine product.
- authentication of the product to be authenticated 5 can be achieved using other information, making it possible to expand the possibilities for use.
- step S47a can be performed using application [B] 11, or, for example, can be performed using a dedicated platform 8 for at least a portion of the processing.
- the authentication certification system 1 in the above-described embodiment highly reliable authentication certification can be performed even when authentication certification is performed for digital goods.
- the authentication certification method in the above-described embodiment can be implemented, for example, using each component of the authentication certification system 1, and highly reliable authentication certification can be performed even when authentication certification is performed for digital goods.
- the electronic devices such as the terminals 2, 72, distributed file server 3, dedicated platform 8, application [A] 9, and application [B] 11 described above each have a processor such as a CPU (Central Processing Unit), a RAM (Random Access Memory), and a ROM (Read Only Memory), and execute the various processes described above.
- the electronic devices also have a data storage device such as a HDD (Hard Disk Drive), and store various types of information.
Abstract
The present invention is provided with: a distributed file server that generates, on the basis of digital property data of an authentication-requiring product, a hashed identifier that is individually allocated to the authentication-requiring product; a dedicated platform that records, on a blockchain, NFT information on the authentication-requiring product associated with the identifier and outputs a generated transaction hash or a two-dimensional code corresponding thereto; and a recording means that associates first verification information held for each of a plurality of users related to the authentication-requiring product with the NFT information and records the first verification information in accordance with the order in which the users are related. At the time of authentication certification, the first verification information associated with NFT information corresponding to a transaction hash acquired from an authentication certifier or a two-dimensional code corresponding thereto is read from the recording means, and the consistency between the read first verification information and first signature information held by the authentication certifier is determined, whereby the authentication certification of the authentication-requiring product is performed.
Description
本発明は、鑑定証明システム、及び鑑定証明方法に関する。
The present invention relates to an appraisal certification system and an appraisal certification method.
バッグ、カバン、衣類、時計、美術工芸品、自動車等の要鑑定製品は、通常、製造メーカー・製造者・著作者等によって製造された後、物流業者、卸売り業者、小売業者等の流通業者を通じて消費者に販売されるといった複雑な流通経路を辿る。このような要鑑定製品は、製造や流通の過程で、鑑定証明、すなわち物品が模造品でなく真正品であることの証明が消費者に求められている。また近年では、インターネットを通じて要鑑定製品が消費者に販売されることが非常に多く、また、上記要鑑定製品の中古品(二次流通、三次流通、その他n次流通(nは4以上の整数)を含む)も同様にインターネットを通じて消費者へ販売されている。さらに、消費者間同士で売買されることも多くなってきたため、これら要鑑定製品のより多角的な鑑定証明の必要性が増大している。
Products that require authentication, such as bags, luggage, clothing, watches, arts and crafts, and automobiles, usually follow a complex distribution route, being manufactured by a manufacturer, producer, or copyright holder, before being sold to consumers through distributors such as logistics companies, wholesalers, and retailers. During the manufacturing and distribution process, consumers require authentication certificates, i.e., proof that the item is genuine and not a counterfeit. In recent years, products that require authentication are often sold to consumers over the Internet, and second-hand products of the above-mentioned products that require authentication (including secondary distribution, tertiary distribution, and other n-th distribution (n is an integer of 4 or more)) are also sold to consumers over the Internet. Furthermore, as products are often sold between consumers, there is an increasing need for more multifaceted authentication certificates for these products that require authentication.
要鑑定製品には、通常、真正品であることを証明、保証するための証明書(以下、「ギャランティカード」ともいう。)が発行される。ギャランティカードには、物品の商品名、品番、製造メーカ・製造者(著作者)、製造場所、製造年月日等の物品に関する情報(以下、「製品情報」ともいう。)が記載される。しかしながら、近年は、インターネット等を通じてギャランティカードのみを入手することも可能となってきている。このため、ギャランティカードによる鑑定証明は十分信頼性のあるものとはいえなくなってきている。
Products requiring authentication are usually issued with a certificate (hereafter referred to as a "guarantee card") to certify and guarantee that they are genuine. The guarantee card contains information about the product, such as the product name, product number, manufacturer/producer (author), place of manufacture, and date of manufacture (hereafter referred to as "product information"). However, in recent years, it has become possible to obtain just the guarantee card via the Internet, etc. For this reason, authentication proof based on a guarantee card is no longer fully reliable.
従来において、プラスチック製カード等の媒体に情報を格納したICチップを取り付けたものを証明書として用い、証明書の表面に印刷された情報とICチップのメモリから読み出した情報とを照合することによって証明書の正当性判定を行う手法が開示されている(例えば、特許文献1参照。)。しかしながら、特許文献1に開示されている方法を、要鑑定製品に適用した場合、偽造が難しくなることからギャランティカード自体の正当性は確認できるとしても、このギャランティカードと物品とを紐付けるものは、物品に刻印された品番のみとなる。このため、十分な鑑定証明を行うことが難しい。
Conventionally, a method has been disclosed in which a medium such as a plastic card with an IC chip storing information is used as a certificate, and the authenticity of the certificate is determined by comparing the information printed on the surface of the certificate with information read from the memory of the IC chip (see, for example, Patent Document 1). However, when the method disclosed in Patent Document 1 is applied to products requiring authentication, counterfeiting becomes difficult, and although the authenticity of the guarantee card itself can be confirmed, the only thing that links this guarantee card to the item is the product number engraved on the item. This makes it difficult to provide sufficient authentication proof.
また要鑑定製品にICチップを取り付け、ICチップに記録した製品情報を、スマートフォン、携帯電話等により読み出し可能にする技術も開示されている(例えば、特許文献2参照。)。しかしながら、特許文献2の開示技術を要鑑定製品に適用すると、上述した製品情報の読み出しに際し、パスワードを設定しない場合には、流通業者、消費者以外の第三者も製品情報を傍受することが可能となる。その結果、要鑑定製品が真正品であるか否か、製造年月日が新しいか否か等の消費者が知られたくない製品情報を第三者が傍受可能となる。一方、パスワードを設定した場合には、要鑑定製品が複雑な流通経路を辿るうちにパスワード自体が不明となり、必要な場合に鑑定証明が行えなくなる虞もある。また、パスワード自体はハッキングされる虞もある。
Also disclosed is a technology that attaches an IC chip to a product requiring authentication, making it possible to read the product information recorded on the IC chip using a smartphone, mobile phone, etc. (see, for example, Patent Document 2). However, when the technology disclosed in Patent Document 2 is applied to a product requiring authentication, if a password is not set when reading the above-mentioned product information, third parties other than distributors and consumers can also intercept the product information. As a result, third parties can intercept product information that consumers do not want to be known, such as whether the product requiring authentication is genuine or not, or whether the date of manufacture is recent or not. On the other hand, if a password is set, the password itself may become unknown as the product requiring authentication travels through a complex distribution route, and authentication certification may not be possible when necessary. There is also a risk that the password itself may be hacked.
また製品にシリアルコードを付与し、これをシリアルコードリーダーで読み取り、製品データベースに照会することにより、製品の鑑定証明を行う技術も開示されている(例えば、特許文献3参照。)。しかし、この特許文献3の開示技術を要鑑定製品に適用した場合も、特許文献2の開示技術と同様の問題が生じる。
There is also a technology disclosed in which a serial code is assigned to a product, read by a serial code reader, and checked against a product database to authenticate the product (see, for example, Patent Document 3). However, when the technology disclosed in Patent Document 3 is applied to a product requiring authentication, the same problems as those of the technology disclosed in Patent Document 2 arise.
このため、小型記録媒体が貼着または組み込まれた要鑑定製品と、同じく小型記録媒体が貼着または組み込まれたギャランティカード(形状、構造、大きさ等に応じて、マイクロチップ(ICチップ)、二次元コード、電子透かし等を適宜用いることができる)との2つ以上のマルチシグ認証を利用して物品の鑑定証明を行う方法が近年において新たに提案されている(例えば、特許文献4参照。)。
For this reason, a new method has been proposed in recent years to authenticate and certify an item by using multi-sig authentication of two or more items: a product to be authenticated, to which a small recording medium is affixed or incorporated, and a guarantee card to which a small recording medium is also affixed or incorporated (a microchip (IC chip), two-dimensional code, electronic watermark, etc. can be used as appropriate depending on the shape, structure, size, etc.) (see, for example, Patent Document 4).
この特許文献4の開示技術によれば、秘密鍵と、要鑑定製品に関する製品情報を記録した小型記録媒体とを、要鑑定製品とギャランティカード(形状、構造、大きさ等に応じて、マイクロチップ(ICチップ)、二次元コード、電子透かし等)とのそれぞれに貼着、又は組み込んでおく。そして、その製品情報及び上記要鑑定製品が消費者へ渡るまでの各流通段階における取引情報を、ブロックチェーン上に記録しておく。消費者は、要鑑定製品とギャランティカードにそれぞれ付与された秘密鍵を使用し、製品情報及び取引情報を、ブロックチェーンから読み出す。これにより、上記消費者のみが信頼性の高い鑑定証明を簡単に行うことができる。また、製造メーカー・製造者・著作者等は、製品情報を、物流業者、卸売り業者、小売業者等は取引情報を、それぞれブロックチェーン上に順次書き込んでいくことにより、製品情報及び取引情報を相互補完しながら正確に記録することができ、さらに、製品情報及び取引情報が改竄されることを強固に防止することができる。
According to the technology disclosed in Patent Document 4, a private key and a small recording medium on which product information on the product to be authenticated is recorded are attached to or embedded in the product to be authenticated and the guarantee card (a microchip (IC chip), two-dimensional code, electronic watermark, etc., depending on the shape, structure, size, etc.). Then, the product information and transaction information at each distribution stage until the product to be authenticated is delivered to the consumer are recorded on the blockchain. The consumer uses the private key attached to the product to be authenticated and the guarantee card, respectively, to read the product information and transaction information from the blockchain. This allows only the consumer to easily provide a highly reliable authentication certificate. In addition, by sequentially writing product information on the blockchain by manufacturers, manufacturers, authors, etc., and by sequentially writing transaction information by distributors, wholesalers, retailers, etc., the product information and transaction information can be accurately recorded while complementing each other, and further, the product information and transaction information can be firmly prevented from being tampered with.
しかしながら、要鑑定製品は当然アナログ的(物理的・フィジカル的)な財(以下、アナログ財ともいう。)の他にデジタル的な財(以下、デジタル財ともいう。)も内含されている。デジタル財とは、例えば、デジタル画像、デジタル音声、デジタル楽曲、デジタル映像等のことである。上記デジタル財における更なる強固でしかも信頼性が高く多角的な鑑定証明に関する社会的ニーズは、インターネットの普及と共に近年において特に顕在化している。例えば2016年1月に開設され2018年4月に閉鎖された海賊版漫画サイト「漫画村事件」では約3,000億円以上もの著作権侵害被害が出たと言われている(出典:“「漫画村」運営者逮捕 フィリピンから送還 著作権侵害容疑 被害3200億円か”朝日新聞デジタル 2019年9月25日)。なお、漫画の他に、雑誌、小説、写真集、映画、ドラマ、その他動画コンテンツ等の海賊版がインターネット上で無料掲載できる状況にあったという(出典:『漫画村事件(著作権侵害部分に限って)』慶応義塾大学大学院法務研究科 教授 奥邨 弘司 2021年6月2日)。
However, products requiring authentication naturally include not only analog (physical) goods (hereinafter also referred to as analog goods) but also digital goods (hereinafter also referred to as digital goods). Digital goods include, for example, digital images, digital sounds, digital music, digital videos, etc. The social need for stronger, more reliable and multifaceted authentication certification of the above digital goods has become particularly evident in recent years with the spread of the Internet. For example, the Mangamura Incident, a pirated manga website that was established in January 2016 and closed in April 2018, is said to have caused copyright infringement damages of over 300 billion yen (Source: “Mangamura Operator Arrested, Extradited from Philippines, Suspected of Copyright Infringement, Damages Possibly of 320 Billion Yen”, Asahi Shimbun Digital, September 25, 2019). In addition to manga, pirated versions of magazines, novels, photo books, movies, dramas, and other video content were also available to post for free on the Internet (Source: “Mangamura Incident (Only the Copyright Infringement Portion)”, Professor Okumura Koji, Keio University Law School, June 2, 2021).
上述した特許文献4では、上記アナログ財にフォーカスされた技術が開示されている。このため、特許文献4の開示技術では、上記デジタル財における鑑定証明システム及び方法についての言及が不足している。このような事情により、デジタル財を対象とした鑑定証明を行う場合においても、信頼性の高い鑑定証明を行えることが望まれている。
The above-mentioned Patent Document 4 discloses technology that focuses on the above-mentioned analog goods. For this reason, the technology disclosed in Patent Document 4 is lacking in reference to authentication certification systems and methods for the above-mentioned digital goods. For these reasons, it is desirable to be able to perform highly reliable authentication certification even when authenticating digital goods.
そこで、本発明は、上述した問題点に鑑みて案出されたものであり、その目的とするところは、デジタル財を対象とした鑑定証明を行う場合においても、信頼性の高い鑑定証明を行うことが可能な鑑定証明システム、及び鑑定証明方法を提供することにある。
The present invention was devised in consideration of the above-mentioned problems, and its purpose is to provide an authentication and certification system and authentication and certification method that can perform highly reliable authentication and certification, even when authenticating digital property.
第1発明に係る鑑定証明システムは、要鑑定製品のデジタル財データに基づいて上記要鑑定製品に個別に割り当てられるハッシュ化された識別子を生成する分散型ファイルサーバと、上記識別子に紐付けた上記要鑑定製品のNFT(Non fungible token)情報をブロックチェーン上に記録すると共に生成されるトランザクションハッシュ又はこれに応じた二次元コードを出力する専用プラットフォームと、上記要鑑定製品に関わる複数のユーザ毎に保有する第1検証情報を、上記NFT情報と紐付けて、複数の上記ユーザが関わる順番に沿って記録する記録手段と、を備え、鑑定証明時において、鑑定証明者から取得したトランザクションハッシュ又はこれに応じた二次元コードに対応するNFT情報に紐付けられた上記第1検証情報を読み出し、読み出した上記第1検証情報と、上記鑑定証明者が保有する第1署名情報との整合性を判定することにより、上記要鑑定製品の鑑定証明を行うことを特徴とする。
The authentication certification system according to the first invention comprises a distributed file server that generates a hashed identifier that is individually assigned to the product to be authenticated based on the digital property data of the product to be authenticated, a dedicated platform that records the NFT (Non-fungible token) information of the product to be authenticated linked to the identifier on a blockchain and outputs the generated transaction hash or a two-dimensional code corresponding thereto, and a recording means that links first verification information held by each of multiple users related to the product to be authenticated to the NFT information and records it in the order in which the multiple users are involved, and is characterized in that, at the time of authentication certification, the first verification information linked to the NFT information corresponding to the transaction hash obtained from the authentication certifier or the two-dimensional code corresponding thereto is read out, and the authentication certification of the product to be authenticated is performed by determining the consistency between the read out first verification information and the first signature information held by the authentication certifier.
第2発明に係る鑑定証明システムは、第1発明において、上記鑑定証明時において読み出された上記第1検証情報は、複数の上記ユーザのうち、上記要鑑定製品に関わる最新のユーザよりも前に関わったユーザが保有する第1署名情報に対して整合性を有することを特徴とする。
The authentication certification system according to the second invention is the first invention, characterized in that the first verification information read out during the authentication certification is consistent with the first signature information held by a user, among the multiple users, who was involved in the product requiring authentication before the most recent user.
第3発明に係る鑑定証明システムは、第1発明において、上記鑑定証明時において読み出された上記第1検証情報は、複数の上記ユーザのうち、上記要鑑定製品に関わる最新のユーザが保有する第1検証情報に対して整合性を有することを特徴とする。
The authentication certification system according to the third invention is characterized in that in the first invention, the first verification information read out during the authentication certification is consistent with the first verification information held by the latest user, among the multiple users, who is involved in the product requiring authentication.
第4発明に係る鑑定証明システムは、第1発明において、上記第1検証情報は、上記ユーザが保有するブロックチェーンウォレットアドレス、上記ブロックチェーンウォレットアドレスを生成する際に用いる公開鍵、及び上記ブロックチェーンウォレットアドレスを生成する際に用いる秘密鍵の少なくとも何れかを示すことを特徴とする。
The authentication certification system according to the fourth invention is the first invention, characterized in that the first verification information indicates at least one of the blockchain wallet address held by the user, the public key used to generate the blockchain wallet address, and the private key used to generate the blockchain wallet address.
第5発明に係る鑑定証明システムは、第1発明~第4発明の何れかにおいて、複数の上記ユーザは、消費者、製造メーカー・製造者・著作者及び各種業者の少なくとも何れかを含み、秘密鍵α1、及び上記要鑑定製品に関する製品情報を記録した小型記録媒体(a1)が貼着又は組み込まれた上記要鑑定製品と、上記専用プラットフォームより出力されて生成される上記トランザクションハッシュ又は上記二次元コードとを用いて更なる鑑定証明が行われ、上記製品情報、及び上記要鑑定製品が上記消費者へ渡るまでの各流通段階における取引情報を、上記製造メーカー・製造者・著作者及び各種業者の少なくとも何れかが、上記ブロックチェーンに記録するために使用されるアプリケーション[A]と、上記鑑定証明者が、上記製品情報及び上記取引情報を、上記ブロックチェーンから読み出すために使用されるアプリケーション[B]と、を更に備え、上記専用プラットフォームは、上記製造メーカー・製造者・著作者及び各種業者の少なくとも何れかが、上記アプリケーション[A]を用いて、上記製品情報及び/又は上記取引情報に基づき取得した第2検証情報を上記ブロックチェーン上に記録し、上記鑑定証明時において、上記鑑定証明者が、上記要鑑定製品に付与された上記秘密鍵α1を使用し、上記アプリケーション[B]を用いて、上記製品情報及び上記取引情報に基づいて上記ブロックチェーンから読み出された第2署名情報と、上記第2検証情報との整合性を判定することにより、上記要鑑定製品の鑑定証明を行うことを特徴とする。
The authentication certification system according to the fifth aspect of the present invention is any one of the first to fourth aspects of the present invention, wherein the plurality of users include at least one of consumers, manufacturers, manufacturers, authors, and various traders, and further includes a small recording medium (a 1 and a transaction hash or two-dimensional code output from and generated by the dedicated platform, and the authentication certification is performed using the product to be authenticated, to which a signature ID of the product to be authenticated is attached or embedded, and the transaction hash or the two-dimensional code output from and generated by the dedicated platform, and the authentication certification is further performed using an application [A] used by at least one of the manufacturer, manufacturer, author, and various traders to record in the blockchain the product information and transaction information at each distribution stage until the product to be authenticated is delivered to the consumer, and an application [B] used by the authentication certifier to read out the product information and the transaction information from the blockchain, wherein the dedicated platform records second verification information obtained based on the product information and/or the transaction information on the blockchain using the application [A] by at least one of the manufacturer, manufacturer, author, and various traders, and at the time of authentication certification, the authentication certifier uses the private key α 1 assigned to the product to be authenticated, and uses the application [B] to determine consistency between second signature information read out from the blockchain based on the product information and the transaction information and the second verification information, thereby authenticating the product to be authenticated.
第6発明に係る鑑定証明システムは、第5発明において、秘密鍵β1、及び上記製品情報を記録した小型記録媒体(b)が貼着又は組み込まれたギャランティカードと、上記専用プラットフォームより出力されて生成される上記トランザクションハッシュ又は上記二次元コードとを用いて更なる鑑定証明が行われ、上記専用プラットフォームは、上記製造メーカー・製造者・著作者及び各種業者の少なくとも何れかが、上記アプリケーション[A]を用いて、上記製品情報及び/又は上記取引情報に基づき取得した第3検証情報を上記ブロックチェーン上に記録し、上記鑑定証明時において、上記鑑定証明者が、上記ギャランティカードに付与された上記秘密鍵β1を使用し、上記アプリケーション[B]を用いて、上記製品情報及び上記取引情報に基づいて上記ブロックチェーンから読み出された第3署名情報と、上記第3検証情報との整合性を判定することにより、上記要鑑定製品の鑑定証明を行うことを特徴とする。
The authentication certification system of the sixth invention is the fifth invention, wherein further authentication certification is performed using a private key β1 and a guarantee card to which a small recording medium (b) recording the product information is attached or embedded, and the transaction hash or the two-dimensional code output and generated from the dedicated platform, and the dedicated platform records third verification information obtained based on the product information and/or the transaction information on the blockchain using the application [A] by at least one of the manufacturer, manufacturer, author, and various traders, and at the time of authentication certification, the authentication certifier uses the private key β1 attached to the guarantee card and the application [B] to determine the consistency between the third signature information read from the blockchain based on the product information and the transaction information and the third verification information, thereby authenticating the product to be authenticated.
第7発明に係る鑑定証明システムは、第6発明において、上記専用プラットフォームは、上記トランザクションハッシュ又はこれに応じた二次元コードに基づき取得された第4検証情報を、上記ブロックチェーンに記録し、上記鑑定証明時において、上記鑑定証明者から取得したトランザクションハッシュ又はこれに応じた二次元コードに基づき取得された第4署名情報と、上記第4検証情報と、の整合性を判定することにより、上記要鑑定製品の鑑定証明を行うことを特徴とする。
The authentication certification system according to the seventh invention is the sixth invention, characterized in that the dedicated platform records fourth verification information obtained based on the transaction hash or a two-dimensional code corresponding thereto in the blockchain, and at the time of authentication certification, performs authentication certification of the product requiring authentication by determining the consistency between the fourth signature information obtained based on the transaction hash obtained from the authentication certifier or a two-dimensional code corresponding thereto and the fourth verification information.
第8発明に係る鑑定証明システムは、第7発明において、上記鑑定証明時において、上記第1検証情報と上記第1署名情報との比較結果、上記第3検証情報と上記第3署名情報との比較結果、及び上記第4検証情報と上記第4署名情報との比較結果のうち、少なくとも何れかが整合性を有し、且つ、上記第2検証情報と上記第2署名情報との比較結果が整合性を有することで、上記要鑑定製品の認証を満たすことを特徴とする。
The authentication certification system according to the eighth invention is the seventh invention, characterized in that, at the time of the authentication certification, at least one of the results of the comparison between the first verification information and the first signature information, the results of the comparison between the third verification information and the third signature information, and the results of the comparison between the fourth verification information and the fourth signature information are consistent, and the results of the comparison between the second verification information and the second signature information are consistent, thereby satisfying the authentication of the product requiring authentication.
第9発明に係る鑑定証明システムは、第8発明において、上記専用プラットフォームは、上記トランザクションハッシュをそのまま上記第4検証情報とし、鑑定証明時において、上記鑑定証明者から取得したトランザクションハッシュをそのまま上記第4署名情報とすることを特徴とする。
The authentication and certification system of the ninth invention is the eighth invention, characterized in that the dedicated platform uses the transaction hash as is as the fourth verification information, and at the time of authentication and certification, uses the transaction hash obtained from the authentication certifier as is as the fourth signature information.
第10発明に係る鑑定証明方法は、分散型ファイルサーバを用いて、要鑑定製品のデジタル財データに基づいて上記要鑑定製品に個別に割り当てられるハッシュ化された識別子を生成し、専用プラットフォームを用いて、上記識別子に紐づけた上記要鑑定製品のNFT(Non fungible token)情報をブロックチェーン上に記録すると共に生成されるトランザクションハッシュ又はこれに応じた二次元コードを出力し、記録手段を用いて、上記要鑑定製品に関わる複数のユーザ毎に保有する第1検証情報を、上記NFT情報と紐づけて、複数の上記ユーザが関わる順番に沿って記録し、鑑定証明時において、鑑定証明者から取得したトランザクションハッシュ又はこれに応じた二次元コードに対応するNFT情報に紐づけられた上記第1検証情報を読み出し、読み出した上記第1検証情報と、上記鑑定証明者が保有する第1署名情報との整合性を判定することにより、上記要鑑定製品の鑑定証明を行うことを特徴とする。
The authentication method according to the tenth invention is characterized in that it uses a distributed file server to generate a hashed identifier that is individually assigned to the product to be authenticated based on the digital property data of the product to be authenticated, uses a dedicated platform to record NFT (Non-fungible token) information of the product to be authenticated linked to the identifier on a blockchain and outputs the generated transaction hash or a two-dimensional code corresponding thereto, uses a recording means to link first verification information held by each of multiple users related to the product to be authenticated to the NFT information and record it in the order in which the multiple users are involved, and at the time of authentication certification, reads out the first verification information linked to the NFT information corresponding to the transaction hash obtained from the authentication certifier or the two-dimensional code corresponding thereto, and determines the consistency between the read first verification information and the first signature information held by the authentication certifier, thereby authenticating the product to be authenticated.
上述した構成からなる本発明によれば、製造メーカー・製造者・著作者等の複数のユーザによる真正品の製品のみについて唯一無二の識別子に紐づけたNFT情報をブロックチェーンデータに記録する。これにより、NFT情報を正確に記録でき、また、NFT情報自体が改竄されることを防止することができる。このため、デジタル財を対象とした鑑定証明を行う場合においても、信頼性の高い鑑定証明を行うことが可能となる。また、例えばデジタル財でいうところの模倣品・偽造品にあたる海賊版が現出した場合、当該海賊版が「5W1H」の情報と共に捕捉できる機能を鑑定証明システムに組み込むことにより海賊版流出の抑止力となることを実現可能とする。
According to the present invention having the above-mentioned configuration, NFT information linked to a unique identifier is recorded in the blockchain data only for genuine products made by multiple users such as manufacturers, producers, and copyright holders. This allows NFT information to be recorded accurately and also prevents the NFT information itself from being tampered with. This makes it possible to perform highly reliable authentication even when authenticating digital goods. Furthermore, for example, if a pirated version of a digital good, which is a counterfeit or fake, appears, it is possible to incorporate a function into the authentication system that can capture the pirated version along with the "5W1H" information, thereby preventing the leakage of pirated versions.
以下、本発明を適用した鑑定証明システム、及び鑑定証明方法の一例について、図面を参照しながら詳細に説明する。
Below, an example of an appraisal certification system and appraisal certification method to which the present invention is applied will be described in detail with reference to the drawings.
図1は、本発明を適用した鑑定証明システム1のシステム構成を示している。鑑定証明システム1は、ユーザ(製造メーカー・製造者・著作者等及び物流業者、卸売り業者、小売業者等(以下、これらを総称して各種業者等という。)、所有者、及び消費者等の要鑑定製品5に関わる人物を含む)が利用する。鑑定証明システム1は、ユーザ(例えば各種業者等)が操作するための端末2及び端末72と、管理者等が操作するための分散型ファイルサーバ3とがインターネット網を始めとする公衆通信網10を介して接続され、この公衆通信網10を介した専用プラットフォーム8を構成している。なお、端末2、端末72を操作するユーザは、用途に応じて任意に設定できるが、以下では必要に応じて端末2を各種業者等が操作し、端末72を消費者が操作する場合を一例として説明する。
FIG. 1 shows the system configuration of an authentication certification system 1 to which the present invention is applied. The authentication certification system 1 is used by users (including people involved with the product 5 to be authenticated, such as manufacturers, producers, authors, etc., distributors, wholesalers, retailers, etc. (hereinafter collectively referred to as various businesses, etc.), owners, consumers, etc.). In the authentication certification system 1, terminals 2 and 72 operated by users (e.g., various businesses, etc.) and a distributed file server 3 operated by an administrator, etc. are connected via a public communication network 10 such as the Internet, forming a dedicated platform 8 via this public communication network 10. The users who operate terminals 2 and 72 can be set arbitrarily depending on the purpose, but the following description will be given as an example of a case where terminal 2 is operated by various businesses, etc., and terminal 72 is operated by a consumer as necessary.
端末2は、例えば、パーソナルコンピュータ(PC)等を始めとした電子機器で構成されているが、PC以外に、携帯電話、スマートフォン、タブレット型端末、ウェアラブル端末等、他のあらゆる電子機器で具現化されるものであってもよい。各種業者等は、この端末2を操作し、要鑑定製品5から識別子を生成するための各種作業を行う。なお、鑑定証明対象の要鑑定製品5は、大きく分類してアナログ財とデジタル財に分類することができる。例えば、アナログ財は、バッグ、カバン、衣類、時計、美術工芸品、自動車等、鑑定証明が必要とされるあらゆる製品が含まれる。デジタル財は、デジタル画像、デジタル音声、デジタル楽曲、デジタル映像等の鑑定証明が必要とされるあらゆるデジタルコンテンツが含まれる。なお、デジタル財は、例えばアナログ財に関する情報をデジタル化した情報(例えば製品画像、製造番号、鑑定証明等)も含む。要鑑定製品5は、新品のみならず、中古品(二次流通、三次流通、その他n次流通(nは4以上の整数))も含むものである。
The terminal 2 is composed of electronic devices such as a personal computer (PC), but may be embodied in any other electronic devices such as a mobile phone, smartphone, tablet device, wearable device, etc., other than a PC. Various businesses operate the terminal 2 to perform various tasks to generate an identifier from the product 5 requiring authentication. The product 5 requiring authentication that is the subject of authentication certification can be broadly classified into analog goods and digital goods. For example, analog goods include any product that requires authentication certification, such as bags, satchels, clothing, watches, art and crafts, and automobiles. Digital goods include any digital content that requires authentication certification, such as digital images, digital audio, digital music, and digital videos. Digital goods also include, for example, information that has been digitized from information about analog goods (for example, product images, serial numbers, authentication certificates, etc.). The product 5 requiring authentication includes not only new products, but also second-hand products (secondary distribution, tertiary distribution, and other n-th distribution (n is an integer of 4 or more)).
端末72も同様に、PC等を始めとした電子機器で構成されているが、PC以外に、携帯電話、スマートフォン、タブレット型端末、ウェアラブル端末等、他のあらゆる電子機器で具現化されるものであってもよい。消費者は、この端末72を操作し、要鑑定製品5に対して鑑定証明を試みる。
The terminal 72 is also configured as an electronic device such as a PC, but may also be embodied as any other electronic device such as a mobile phone, smartphone, tablet device, or wearable device. The consumer operates the terminal 72 to attempt to obtain authentication proof for the product 5 requiring authentication.
分散型ファイルサーバ3は、端末2を同じファイルシステムにつなぐことを目的とした分散型ファイルシステムであり、いわゆるIPFS(Inter Planetary File System)等で構成されるが、これに限定されるものではない。分散型ファイルサーバ3は、公衆通信網10に対して端末2を介してアクセスする各種業者等がデータの提供を行い、消費者は当該データの要求をP2P(Peer to Peer)形式で行うことができる。分散型ファイルサーバ3は、要鑑定製品5のデジタル画像、デジタル音声、デジタル楽曲、デジタル映像等の鑑定証明が必要とされるあらゆるデジタルコンテンツを保管する場所であり、当該保管と同時に後述の通り識別子と呼ばれる複数桁の文字列が生成される。要鑑定製品5の識別子を特定する際、新品の場合は、全く同一画像となるが、当該デジタルコンテンツと共に商品管理番号等の唯一無二の付帯情報が付加されるため、上記識別子は唯一無二の文字列が生成される。
The distributed file server 3 is a distributed file system intended to connect the terminals 2 to the same file system, and may be configured as a so-called IPFS (Inter Planetary File System), but is not limited to this. The distributed file server 3 is provided with data by various businesses that access the public communication network 10 via the terminals 2, and consumers can request the data in a P2P (Peer to Peer) format. The distributed file server 3 is a place to store all digital content that requires authentication proof, such as digital images, digital audio, digital music, and digital videos of the product 5 requiring authentication, and at the same time as the storage, a multi-digit character string called an identifier is generated, as described below. When identifying the identifier of the product 5 requiring authentication, if it is new, the image will be exactly the same, but unique additional information such as a product management number is added along with the digital content, so the identifier generates a unique character string.
また、中古品の場合には、個々の傷や擦り傷、その他型崩れ等により、個々に特徴付けられたデジタル財となるため、上記識別子は唯一無二の文字列が生成される。なお、このような中古品ならではの、特徴付けられたデジタル財が、リセール業界における鑑定証明を行う上で非常に重要な意味をなす。例えば、中古品の時計を購入した者が、購入店に偽物とすり替えた時計を持ち込み、返品要求した場合、デジタル財に応じたNFT(Non fungible token)や後述する識別子に基づく情報がブロックチェーン上に保存されていれば、顧客へ販売した時計、顧客が持ち込んだ時計との差分をチェックする際の証拠とすることができる。
In the case of second-hand goods, each digital good is individually characterized by its own scratches, scuffs, deformation, etc., so the above identifier generates a unique string. Such characterized digital goods, which are unique to second-hand goods, are extremely important in providing authentication proof in the resale industry. For example, if someone who purchases a second-hand watch brings the replaced watch to the store where they bought it and requests a return, if the NFT (Non-fungible token) corresponding to the digital good and information based on the identifier described below are stored on the blockchain, they can be used as evidence when checking the difference between the watch sold to the customer and the watch brought in by the customer.
専用プラットフォーム8は、ブロックチェーン8aを参照している。ブロックチェーン8aとしては、分散型台帳等のP2Pネットワークを有するブロックチェーンを利用できる。このブロックチェーン8a上では、要鑑定製品5の製品情報、要鑑定製品5が消費者に渡るまでの各流通段階における取引情報に加え、要鑑定製品5のデジタル財データに基づいてハッシュ化されて生成される識別子等が記録される。
The dedicated platform 8 references a blockchain 8a. A blockchain having a P2P network such as a distributed ledger can be used as the blockchain 8a. In addition to product information of the product 5 requiring authentication and transaction information at each distribution stage until the product 5 requiring authentication is delivered to the consumer, identifiers generated by hashing based on the digital property data of the product 5 requiring authentication are recorded on this blockchain 8a.
なお、ここでいうブロックチェーン8aとしては、分散型台帳等のP2Pネットワークを有するブロックチェーン以外に、パブリック型ブロックチェーン、プライベート型ブロックチェーン、コンソーシアム型ブロックチェーン等、いかなる種類のブロックチェーンを適用するようにしてもよい。
Note that the blockchain 8a referred to here may be any type of blockchain, including a blockchain with a P2P network such as a distributed ledger, a public blockchain, a private blockchain, a consortium blockchain, etc.
また、ブロックチェーン8a上への記録は、特定のデータを証明するためのハッシュ値が繋がった状態を記録する概念も含まれる。また、ブロックチェーン8a上の記録は、例えばハッシュ値等の各種情報を暗号化又は電子署名化した情報を記録する概念も含まれ、例えばブロックチェーン8aに記録される情報は、暗号化技術や電子署名技術等の用途に応じた形式により記録されてもよい。
In addition, recording on the blockchain 8a also includes the concept of recording a state in which hash values for proving specific data are linked together. Recording on the blockchain 8a also includes the concept of recording information in which various information, such as hash values, is encrypted or digitally signed, and for example, information recorded on the blockchain 8a may be recorded in a format appropriate to the application, such as encryption technology or digital signature technology.
本発明を適用した鑑定証明システム1では、以下に説明するように、大きく分類してデジタル財鑑定証明と、ハイブリッド鑑定証明の2種類にわたる鑑定証明を実現することができる。
The authentication certification system 1 to which the present invention is applied can realize two types of authentication certification, broadly classified as digital property authentication certification and hybrid authentication certification, as described below.
デジタル財鑑定証明
先ずデジタル財鑑定証明の処理動作について説明をする。デジタル財の鑑定証明は、図2(a)に示すように要鑑定製品5についてデジタル財データを取得する。このデジタル財データの取得は、鑑定証明対象に対して行う。このデジタル財データは、要鑑定製品5について端末2やデジタルカメラ等を利用して撮像したデジタル財データからなるデジタル画像データである。このデジタル財データは、製造メーカー・製造者・著作者等がこのような端末2を介して撮像することにより得られたデジタル財データとして構成される以外に、元々この要鑑定製品5に対して付与され、或いは紐付けられて記憶媒体に記録されているものを使用するようにしてもよい。このデジタル財データは、デジタル画像、デジタル音声、デジタル楽曲、デジタル映像等の鑑定証明が必要とされるあらゆるデジタルコンテンツであり、各拡張子として、例えばjpg、png、gif、mp3、mov等が付与される。 Digital Goods Authentication Certification First, the processing operation of digital goods authentication certification will be described. Authentication certification of digital goods involves acquiring digital goods data for theproduct 5 requiring authentication as shown in FIG. 2(a). This digital goods data is acquired for the subject of authentication certification. This digital goods data is digital image data consisting of digital goods data captured using a terminal 2 or a digital camera for the product 5 requiring authentication. This digital goods data may be configured as digital goods data obtained by a manufacturer, manufacturer, author, etc. capturing images via such a terminal 2, or may be data originally assigned to the product 5 requiring authentication or recorded on a storage medium in association with the product 5. This digital goods data is any digital content requiring authentication certification, such as digital images, digital audio, digital music, digital video, etc., and may be assigned an extension such as jpg, png, gif, mp3, mov, etc.
先ずデジタル財鑑定証明の処理動作について説明をする。デジタル財の鑑定証明は、図2(a)に示すように要鑑定製品5についてデジタル財データを取得する。このデジタル財データの取得は、鑑定証明対象に対して行う。このデジタル財データは、要鑑定製品5について端末2やデジタルカメラ等を利用して撮像したデジタル財データからなるデジタル画像データである。このデジタル財データは、製造メーカー・製造者・著作者等がこのような端末2を介して撮像することにより得られたデジタル財データとして構成される以外に、元々この要鑑定製品5に対して付与され、或いは紐付けられて記憶媒体に記録されているものを使用するようにしてもよい。このデジタル財データは、デジタル画像、デジタル音声、デジタル楽曲、デジタル映像等の鑑定証明が必要とされるあらゆるデジタルコンテンツであり、各拡張子として、例えばjpg、png、gif、mp3、mov等が付与される。 Digital Goods Authentication Certification First, the processing operation of digital goods authentication certification will be described. Authentication certification of digital goods involves acquiring digital goods data for the
製造メーカー・製造者・著作者等は、このようにして得られた要鑑定製品5のデジタル財データを専用プラットフォーム8に登録する。その結果、この専用プラットフォーム8が参照するブロックチェーン8aを介して発行されたNFTに基づくNFT情報を取得すると共に、そのNFT情報に応じたトランザクションハッシュと二次元コードとを自動生成する。このようにして発行、生成されたNFT情報のトランザクションハッシュや二次元コードを介して、要鑑定製品5が模造品か、或いは真正品かを判別することが可能となる。なお、NFT情報とは、公知のNFTそのものを示すほか、NFTを暗号化又は電子署名化等のような公知技術に基づく処理を施した情報を示してもよい。また、NFT情報は、NFTと紐づく識別子を含んでもよい。
The manufacturer, creator, author, etc. registers the digital property data of the product 5 to be authenticated thus obtained in the dedicated platform 8. As a result, the dedicated platform 8 acquires NFT information based on the NFT issued via the blockchain 8a referenced by the dedicated platform 8, and automatically generates a transaction hash and a two-dimensional code corresponding to the NFT information. It becomes possible to determine whether the product 5 to be authenticated is a counterfeit or genuine through the transaction hash and two-dimensional code of the NFT information issued and generated in this manner. Note that the NFT information may refer to the publicly known NFT itself, or may refer to information obtained by processing the NFT based on publicly known technology such as encryption or digital signature. The NFT information may also include an identifier linked to the NFT.
また図2(b)に示すように、分散型ファイルサーバにデジタル財データを記録し、識別子を発行するが、これから唯一無二の二次元コードAを現出することができる。また、ブロックチェーンを介して得られるトランザクションハッシュからも唯一無二の二次元コードBを現出できる。この二次元コードAと二次元コードBは互い異なるものとなるが、鑑定証明システム1の認証要素の一つにすることができる。二次元コードBは周知のものであるが、二次元コードAが新たに加わることで、マルチシグ認証のセキュリティ性を高めることができる。なお、上記二次元コードAのみを認証要素としてもよいし、上記二次元コードBのみを認証要素としてもよい。さらには、マルチシグ認証の強度を高めるため上記二次元コードAおよびB合わせて認証要素としてもよい。
As shown in FIG. 2(b), digital property data is recorded in a distributed file server and an identifier is issued, from which a unique two-dimensional code A can be generated. A unique two-dimensional code B can also be generated from a transaction hash obtained via the blockchain. Although two-dimensional code A and two-dimensional code B are different from each other, they can be used as one of the authentication elements of the appraisal certification system 1. Two-dimensional code B is well known, but the addition of two-dimensional code A can increase the security of multisig authentication. Only the two-dimensional code A or only the two-dimensional code B can be used as an authentication element. Furthermore, the two-dimensional codes A and B can be used together as authentication elements to increase the strength of multisig authentication.
図3は、このようなデジタル財データからNFT情報のトランザクションハッシュや二次元コードを発行するまでのプロセスを示すフローチャートである。なお、図3では、NFT情報としてNFTが用いられた例を示す。
Figure 3 is a flowchart showing the process of issuing a transaction hash or two-dimensional code of NFT information from such digital goods data. Note that Figure 3 shows an example in which an NFT is used as the NFT information.
先ずステップS11において、製造メーカー・製造者・著作者等は、要鑑定製品5についてのデジタル財データを取得し、専用プラットフォーム8へこれを登録する。このデジタル財データの登録するための処理動作は、製造メーカー・製造者・著作者等が端末2を介して専用プラットフォーム8へアクセスすることで行う。かかる場合において、製造メーカー・製造者・著作者等は、端末2内において専用プラットフォーム8へアクセスし、各種手続きを行う上で必要なアプリケーションを事前にインストールすることで実行するようにしてもよい。
First, in step S11, the manufacturer, creator, etc. obtains digital property data for the product 5 requiring authentication and registers it on the dedicated platform 8. The processing operation for registering this digital property data is performed by the manufacturer, creator, etc. by accessing the dedicated platform 8 via the terminal 2. In such a case, the manufacturer, creator, etc. may access the dedicated platform 8 from within the terminal 2 and execute the various procedures by installing the applications required for the procedures in advance.
次にステップS12に移行し、専用プラットフォーム8側においてデジタル財データの登録を受け付ける。専用プラットフォーム8は、いわゆるNFTマーケットプレイス等で構成されるものであってもよい。専用プラットフォーム8は、デジタル財データの登録を受け付けた場合、そのデジタル財データに対して、例えばNFTマーケットプレイスの登録番号を都度発行する。この登録番号は、デジタル財データの登録を受け付ける毎に都度発行されるものであることから、唯一無二のものとなる。
Then, the process proceeds to step S12, where the dedicated platform 8 accepts registration of digital goods data. The dedicated platform 8 may be configured as a so-called NFT marketplace or the like. When the dedicated platform 8 accepts registration of digital goods data, it issues, for example, an NFT marketplace registration number to that digital goods data each time. This registration number is issued each time registration of digital goods data is accepted, and is therefore unique.
次に、ステップS13へ移行し、ステップS12において登録を受け付けたデジタル財データ、発行された登録番号に加え、製造メーカー・製造者・著作者等の情報を一つのフォルダ等にまとめ、分散型ファイルサーバ3へ登録する処理を行う。製造メーカー・製造者・著作者等の情報の詳細は、氏名、法人情報、ペンネーム、雅号等であり、作品情報としては、作品名称、制作年、発表年等の情報、作品スペック(サイズ、フォーマット、使用技術)、作品の版権、作品に含まれる肖像権・意匠権等の権利情報等である。この登録時に、デジタル財データ、登録番号、製造メーカー・製造者・著作者等の情報を一つのフォルダにまとめて登録する方法は一例であり、デジタル財データ、登録番号そして製造メーカー・製造者・著作者等の情報(以下、これらを総称して、付帯情報という。)、これら3つの情報が互いに紐付いた状態で登録されるのであればいかなる方法に代替されるものであってもよい。
Next, the process proceeds to step S13, where the digital property data accepted for registration in step S12, the issued registration number, and information on the manufacturer, creator, etc. are collected into a single folder or the like, and registered in the distributed file server 3. Details of the manufacturer, creator, etc. information include names, corporate information, pen names, pen names, etc., and work information includes information on the work name, production year, release year, work specifications (size, format, technology used), copyright of the work, and rights information such as portrait rights and design rights included in the work. The method of collecting and registering the digital property data, registration number, and information on the manufacturer, creator, etc. into a single folder at the time of registration is one example, and any method may be used instead as long as the digital property data, registration number, and information on the manufacturer, creator, etc. (hereinafter collectively referred to as supplementary information), these three pieces of information, are registered in a linked state.
次にステップS14へ移行し、分散型ファイルサーバ3において、登録した付帯情報についてそれぞれ固有のIDを発行する。デジタル財データについて発行したIDは第1ID、登録番号について発行したIDは第2IDa、製造メーカー・製造者・著作者等の情報について発行したIDは、第2IDbという。
Next, proceed to step S14, and the distributed file server 3 issues a unique ID for each piece of registered additional information. The ID issued for the digital property data is called the first ID, the ID issued for the registration number is called the second IDa, and the ID issued for information on the manufacturer, producer, author, etc. is called the second IDb.
デジタル財データについては、全く同一のデジタル財データが他に存在していた場合、又は、デジタル財データが他者によって複製されたものである場合には、同一の第1IDが発行される場合がある。一方、登録番号は、唯一無二のものであるから、第2IDaは唯一無二のものとなる。製造メーカー・製造者・著作者等の情報は、例えば会社名や生年月日、著作権者の氏名や著作物のタイトル等、内容によっては、唯一無二のものにならない場合があるものの、個別に唯一無二のIDを振る設定が可能であるから、第2IDbも唯一無二とすることができる。例えば、分散型ファイルサーバ3に登録された日時、秒等の時間情報も付帯することができることにより、唯一無二の確度を高めることもできる。なお、このステップS14において少なくともデジタル財データについては、この分散型ファイルサーバ3へ記録しておく。しかもこの分散型ファイルサーバ3は、分散型の形態を採用することで、デジタル財データが紛失することを何重にも亘り防ぐための構成が施されている。また、そのような構成設定が可能となっている。
When the digital property data is identical to other digital property data, or when the digital property data has been copied by another person, the same first ID may be issued. On the other hand, since the registration number is unique, the second IDa is unique. Although the information on the manufacturer, manufacturer, author, etc., such as the company name, date of birth, name of the copyright holder, title of the work, etc., may not be unique depending on the content, it is possible to set up a unique ID for each, so the second IDb can also be unique. For example, time information such as the date and time and seconds registered in the distributed file server 3 can be added, which can increase the accuracy of uniqueness. At least the digital property data is recorded in the distributed file server 3 in step S14. Moreover, the distributed file server 3 is configured to prevent the digital property data from being lost in multiple ways by adopting a distributed form. Such a configuration setting is also possible.
次にステップS15に移行し、互いに紐付けられた付帯情報に基づいて、唯一無二の識別子を生成する。この生成された識別子は付帯情報に紐づけられることで、当該付帯情報が保有する識別子となりえる。この識別子は、上述した第1ID、第2IDa、第2IDbに基づいて生成されるものである。この第2IDaは唯一無二であり、第2IDbも唯一無二となるため、仮に同じデジタル財データ(第1ID)が同一もしくは複製されたものであっても、新たに生成される識別子は、必ず唯一無二のものとなる。このハッシュ化されて生成されるものを識別子と呼ぶ。
Next, the process proceeds to step S15, where a unique identifier is generated based on the associated information linked to each other. This generated identifier is linked to the associated information and can become an identifier held by the associated information. This identifier is generated based on the first ID, second IDa, and second IDb described above. Since the second IDa is unique and the second IDb is also unique, even if the same digital property data (first ID) is the same or a duplicate, the newly generated identifier will always be unique. This hashed and generated identifier is called an identifier.
なお、この識別子の生成については、フォルダ内に入れた付帯情報に基づいて分散型ファイルサーバ3において規定されたルールに基づいて生成されるものであってもよい。
In addition, this identifier may be generated based on rules defined in the distributed file server 3, based on the additional information placed in the folder.
また、生成された識別子に基づいて二次元コードを生成してもよい(ステップS23)。
A two-dimensional code may also be generated based on the generated identifier (step S23).
ステップS16に移行し、専用プラットフォーム8は、分散型ファイルサーバ3から識別子を受け取る。ステップS23において二次元コードを生成した場合は、専用プラットフォーム8は、分散型ファイルサーバ3から二次元コードを受け取る。
The process proceeds to step S16, where the dedicated platform 8 receives an identifier from the distributed file server 3. If a two-dimensional code was generated in step S23, the dedicated platform 8 receives the two-dimensional code from the distributed file server 3.
次にステップS17に移行し、専用プラットフォーム8は、付帯情報に基づいた識別子をブロックチェーン8aへ送信する。
Then, the process proceeds to step S17, where the dedicated platform 8 transmits an identifier based on the additional information to the blockchain 8a.
ブロックチェーン8aは、ステップS18において、専用プラットフォーム8から送信されてきた識別子に基づいて発行したNFT情報をブロックチェーン8a上に記録する。このようなブロックチェーン8aに、識別子に紐付けられたNFT情報を記録(例えばブロックチェーンデータ8bに書き込む)ことにより、例えば当該NFT情報が改竄されることを完全に防止することができる。すなわち、ブロックチェーン8a内の各ブロックには、タイムスタンプと前のブロックへのリンク(ハッシュ値)が含まれており、ブロック内のデータを遡及的に変更することはできない。
In step S18, the blockchain 8a records the NFT information issued based on the identifier transmitted from the dedicated platform 8 on the blockchain 8a. By recording the NFT information linked to the identifier on such a blockchain 8a (e.g., writing it to the blockchain data 8b), it is possible to completely prevent, for example, the NFT information from being tampered with. In other words, each block in the blockchain 8a contains a timestamp and a link (hash value) to the previous block, and the data in the block cannot be changed retroactively.
次にステップS19に移行し、NFT情報に応じたトランザクションハッシュ及び/又は二次元コードを生成する。このトランザクションハッシュ及び/又は二次元コードの生成は、ブロックチェーン8aへの記録と同時に行うようにしてもよい。ここでいうトランザクションハッシュは、NFT情報を特定するための例えばイーサリアム等の場合には、64桁程度の文字列で示される。このトランザクションハッシュの代替として、コントラクトアドレスとトークンIDの組み合わせで代替してもよい。ここでいうコントラクトアドレスとは、ブロックチェーン(イーサリアムなど)上にコントラクトが展開されている唯一無二の固有アドレスをいう。またトークンIDとは、コントラクトアドレスが特定するNFT情報をいう。また二次元コードは、トランザクションハッシュを特定するためのコードである。発行したトランザクションハッシュ、二次元コードは、専用プラットフォーム8(例えばマーケットプレイスでも良い)に送られ、これらを受け取る(ステップS20)。
Next, proceed to step S19, where a transaction hash and/or a two-dimensional code corresponding to the NFT information is generated. The generation of this transaction hash and/or two-dimensional code may be performed simultaneously with recording to the blockchain 8a. The transaction hash here is indicated by a character string of about 64 digits in the case of Ethereum, for example, for identifying the NFT information. As an alternative to this transaction hash, a combination of a contract address and a token ID may be used. The contract address here refers to a unique address where a contract is deployed on the blockchain (Ethereum, etc.). The token ID refers to the NFT information identified by the contract address. The two-dimensional code is a code for identifying the transaction hash. The issued transaction hash and two-dimensional code are sent to the dedicated platform 8 (which may be, for example, a marketplace), and are received (step S20).
またブロックチェーン8aは必要に応じてこのNFT情報を各種業者等に送信する(ステップS21)。この送信するNFT情報は、発行したトランザクションハッシュ又は二次元コードに代替されるものであってもよい。各種業者等はこのNFT情報を受け取る(ステップS22)。各種業者等は、端末2を介して、このようなトランザクションハッシュ又は二次元コードを受信することができる。
The blockchain 8a also transmits this NFT information to various businesses, etc. as necessary (step S21). This transmitted NFT information may be substituted for the issued transaction hash or two-dimensional code. The various businesses, etc. receive this NFT information (step S22). The various businesses, etc. can receive such transaction hash or two-dimensional code via the terminal 2.
なお、デジタル財データを取得し、専用プラットフォーム8上において登録する権限は、各種業者等に限定して与えられる。例えば、要鑑定製品5は、バッグ、カバン、衣類、時計、美術工芸品、自動車等の場合には、各種業者等もしくは当該製品の販売代行の許諾を受けた者のみにこの専用プラットフォーム8上においてデジタル財データを登録する権限を与えるものであってもよい。
The authority to obtain digital property data and register it on the dedicated platform 8 is given only to various businesses, etc. For example, if the product 5 requiring authentication is a bag, suitcase, clothing, watch, art or craft item, automobile, etc., only various businesses, etc. or those authorized to act as sales agents for the product may be given the authority to register the digital property data on this dedicated platform 8.
各種業者等、又は真正品としての要鑑定製品5の新製品または中古品を購入した消費者は、要鑑定製品5とともに、このトランザクションハッシュ又は二次元コードを各種業者等又は専用プラットフォーム8(例えばマーケットプレイス)から受け取る。トランザクションハッシュ又は二次元コードを受け取った各種業者等又は消費者は、トランザクションハッシュ又は二次元コードを用いて、専用プラットフォーム8のブロックチェーン8aにアクセスし、そこに記録されている要鑑定製品5のNFT情報を読み出すことができる。これにより、トランザクションハッシュ又は二次元コードを所有する真の各種業者等又は真の消費者だけが、信頼性の高い鑑定証明を簡単に行うことができる。このため、これらのトランザクションハッシュ又は二次元コードを保有していない第三者は、このような鑑定証明自体を行うことができない。
Various businesses, etc., or consumers who purchase a new or used product 5 that is to be authenticated as a genuine product, receive this transaction hash or two-dimensional code from the various businesses, etc., or the dedicated platform 8 (e.g., a marketplace) along with the product 5 to be authenticated. The various businesses, etc., or consumers who receive the transaction hash or two-dimensional code can use the transaction hash or two-dimensional code to access the blockchain 8a of the dedicated platform 8 and read the NFT information of the product 5 to be authenticated that is recorded there. This allows only the true various businesses, etc., or true consumers who possess the transaction hash or two-dimensional code to easily perform a highly reliable authentication certification. For this reason, third parties who do not possess this transaction hash or two-dimensional code cannot perform such authentication certification itself.
このように、デジタル財鑑定証明においては、各種業者等による真正品の要鑑定製品5のみについて唯一無二の識別子から派生する唯一無二のNFT情報を専用プラットフォーム8のブロックチェーンデータ8bに順次書き込んでいく。これにより、NFT情報自体を正確に記録でき、また、NFT情報自体が改竄されることを完全に防止することができる。このため、要鑑定製品5についての各種業者等か、又は複雑な流通経路を辿って流通したり、インターネットを通じて販売されたりする要鑑定製品5を購入した消費者が、信頼性の高い鑑定証明を簡単に行うことができる。
In this way, in digital property authentication certification, the unique NFT information derived from the unique identifier for only genuine products 5 to be authenticated by various businesses, etc. is written sequentially into the blockchain data 8b of the dedicated platform 8. This allows the NFT information itself to be recorded accurately, and also makes it possible to completely prevent the NFT information itself from being tampered with. Therefore, various businesses, etc. of products to be authenticated 5, or consumers who have purchased products to be authenticated 5 that have been distributed through complex distribution routes or sold over the internet, can easily perform highly reliable authentication certification.
なお、デジタル財鑑定証明は、上述した実施の形態に限定されるものではない。例えばステップS13において、デジタル財データに加え、付帯情報をまとめて登録して識別子を生成する場合について説明をしたが、これに限定されるものではなく、デジタル財データに対して少なくとも何らかの情報を紐付けて登録するものであればいかなるものであってもよい。ここでいう情報は、上述した登録番号、製造メーカー・製造者・著作者等の情報のような、デジタル財データに関係があるか、或いはデジタル財データに付随して生成されるいかなる情報やデータで構成されるものである。付帯情報は、登録番号、製造メーカー・製造者・著作者等の情報の何れか一方のみで構成されるものであってもよい。また付帯情報は、登録番号、製造メーカー・製造者・著作者等の情報の何れも含まれない代わりに、デジタル財データに関係があるか、或いはデジタル財データに付随して生成されるいかなる情報やデータで構成されるものであってもよい。
Note that the digital property appraisal certificate is not limited to the above-mentioned embodiment. For example, in step S13, the case where additional information is registered together with the digital property data to generate an identifier has been described, but the present invention is not limited to this, and any information may be registered as long as it is linked to at least some information with respect to the digital property data. The information referred to here is any information or data related to the digital property data or generated in association with the digital property data, such as the above-mentioned registration number, information on the manufacturer, manufacturer, author, etc. The additional information may be composed of only one of the registration number and information on the manufacturer, manufacturer, author, etc. Furthermore, the additional information may not include any of the registration number and information on the manufacturer, manufacturer, author, etc., but may be composed of any information or data related to the digital property data or generated in association with the digital property data.
ハイブリッド鑑定証明
次にハイブリッド鑑定証明の処理動作について説明をする。ハイブリッド鑑定証明では、上述したデジタル財鑑定証明に加えて、更にアナログ財鑑定証明を組み合わせることで、より高精度な要鑑定製品5の鑑定を行う。 Hybrid Authentication Certification Next, the processing operation of hybrid authentication certification will be described. In hybrid authentication certification, in addition to the above-mentioned digital property authentication certification, analog property authentication certification is further combined to perform authentication of theproduct 5 requiring authentication with higher accuracy.
次にハイブリッド鑑定証明の処理動作について説明をする。ハイブリッド鑑定証明では、上述したデジタル財鑑定証明に加えて、更にアナログ財鑑定証明を組み合わせることで、より高精度な要鑑定製品5の鑑定を行う。 Hybrid Authentication Certification Next, the processing operation of hybrid authentication certification will be described. In hybrid authentication certification, in addition to the above-mentioned digital property authentication certification, analog property authentication certification is further combined to perform authentication of the
図4は、アナログ財鑑定証明では、要鑑定製品5、及びこれと共に販売され、流通するギャランティカード24を示す模式図である。要鑑定製品5には、秘密鍵α1、製品情報(商品名、品番、製造メーカー・製造者(著作者)、製造場所、製造年月日等)を含む情報を記録した小型記録媒体(a1)51aが貼着または組み込まれており、また、ギャランティカード24には、秘密鍵β1、製品情報を含む情報を記録した小型記録媒体(b)52aが貼着または組み込まれている。小型記録媒体(a1)51a、小型記録媒体(b)52aとしては、要鑑定製品5及びギャランティカード24の形状、構造、大きさ等に応じて、ICチップ、二次元コード、電子透かし等の小型記録媒体等を適宜用いることができる。
4 is a schematic diagram showing a product 5 to be authenticated and a guarantee card 24 sold and distributed together with the product 5 in the analog property authentication certificate. A small recording medium (a 1 ) 51a is attached or incorporated into the product 5 to be authenticated, and information including a private key α 1 and product information (product name, product number, manufacturer/manufacturer (author), manufacturing location, manufacturing date, etc.) is recorded therein, and a small recording medium (b) 52a is attached or incorporated into the guarantee card 24, and information including a private key β 1 and product information is recorded therein. As the small recording medium (a 1 ) 51a and the small recording medium (b) 52a, small recording media such as IC chips, two-dimensional codes, and electronic watermarks can be appropriately used depending on the shape, structure, size, etc. of the product 5 to be authenticated and the guarantee card 24.
ここで、「秘密鍵」とは、要鑑定製品5の鑑定証明を実現するための情報を示し、例えば鑑定証明時において「秘密鍵」自体の整合性が判定されてもよい。「秘密鍵」は、特定のユーザ以外が知り得ない情報を示し、例えば上述した「小型記録媒体」に記録されるほか、例えば端末72や、専用プラットフォーム8等のような鑑定証明システム1に用いられる構成内に記録されてもよい。
Here, the "private key" refers to information for realizing authentication certification of the product 5 requiring authentication, and for example, the integrity of the "private key" itself may be judged at the time of authentication certification. The "private key" refers to information that cannot be known by anyone other than a specific user, and may be recorded, for example, on the above-mentioned "small recording medium," or may be recorded within a configuration used in the authentication certification system 1, such as the terminal 72 or the dedicated platform 8.
また、例えば「秘密鍵」の対として「公開鍵」が生成されてもよい。この場合、「秘密鍵」及び「公開鍵」を用いて、公知の暗号化技術や電子署名技術を実施することができる。また、鑑定証明時において、「秘密鍵」の対として生成された「公開鍵」か否か、という点を整合性と見做して判定してもよい。なお、「公開鍵」は、例えば上述した「小型記録媒体」に記録されるほか、例えば専用プラットフォーム8等のような鑑定証明システム1に用いられる構成内に、用途に応じて任意に記録することができる。また、「秘密鍵」及び「公開鍵」は、公知の技術を用いて生成することができ、例えば専用プラットフォーム8や分散型ファイルサーバ3等のような鑑定証明システム1に用いられる構成を用いて、用途に応じて任意に生成することができる。
Also, for example, a "public key" may be generated as a pair with the "private key". In this case, the "private key" and "public key" can be used to implement known encryption techniques or electronic signature techniques. Furthermore, during authentication and certification, consistency may be determined based on whether the "public key" was generated as a pair with the "private key". The "public key" may be recorded, for example, on the above-mentioned "small recording medium", or may be recorded arbitrarily depending on the application within a configuration used in the authentication and certification system 1, such as the dedicated platform 8. Furthermore, the "private key" and "public key" may be generated using known techniques, and may be generated arbitrarily depending on the application, using a configuration used in the authentication and certification system 1, such as the dedicated platform 8 or the distributed file server 3.
要鑑定製品5の小型記録媒体(a1)51a、及びギャランティカード24の小型記録媒体(b)52aの製品情報は、要鑑定製品5の出荷時に、各種業者等により入力される。
The product information in the small recording medium (a 1 ) 51a of the product to be authenticated 5 and the small recording medium (b) 52a of the guarantee card 24 is input by various businesses etc. when the product to be authenticated 5 is shipped.
図5は、アナログ財鑑定証明の一実施形態を示す概略図である。アナログ財鑑定証明を行う上では、上述したデジタル財鑑定証明に必要な各構成要素に加え、要鑑定製品5の製品情報、要鑑定製品5が消費者に渡るまでの各流通段階における取引情報の各情報を、ブロックチェーン8aのブロックチェーンデータ8bとして記録する専用プラットフォーム8と、専用プラットフォーム8に公衆通信網10を介して、アプリケーション[A]9により接続される端末2a、及び専用プラットフォーム8に、公衆通信網10を介して、アプリケーション[B]11により接続される端末2bにより構成されている。
FIG. 5 is a schematic diagram showing one embodiment of analog property authentication certification. In order to perform analog property authentication certification, in addition to the components necessary for digital property authentication certification described above, a dedicated platform 8 that records product information of the product 5 requiring authentication and transaction information at each distribution stage until the product 5 requiring authentication is delivered to the consumer as blockchain data 8b of a blockchain 8a, a terminal 2a connected to the dedicated platform 8 via a public communication network 10 by an application [A] 9, and a terminal 2b connected to the dedicated platform 8 via a public communication network 10 by an application [B] 11.
各種業者等は、製品情報及び取引情報を、アプリケーション[A]9を用いて、専用プラットフォーム8のブロックチェーンデータ8bに書き込む。
Various businesses use application [A] 9 to write product information and transaction information into the blockchain data 8b of the dedicated platform 8.
消費者は、アプリケーション[B]11を用いて、要鑑定製品5に付与された秘密鍵α1、及びギャランティカード24に付与された秘密鍵β1を使用して、専用プラットフォーム8のブロックチェーンデータ8bに書き込まれた、要鑑定製品5の製品情報及び取引情報を読み出すことができ、これにより消費者は信頼性の高い鑑定証明を簡単に行うことができる。
Using application [B] 11, the consumer can use the private key α 1 assigned to the product 5 to be authenticated and the private key β 1 assigned to the guarantee card 24 to read the product information and transaction information of the product 5 to be authenticated that have been written to the blockchain data 8b of the dedicated platform 8, thereby enabling the consumer to easily obtain a highly reliable authentication certificate.
アプリケーション[A]9は、端末2aにダウンロードされ作動するものであって、これを用いて、各種業者等は、製品情報及び取引情報を、専用プラットフォーム8のブロックチェーンデータ8bに書き込むことができる。また、アプリケーション[B]11は端末2bにダウンロードされ作動するものであり、消費者は、専用プラットフォーム8のブロックチェーンデータ8bに書き込まれた、要鑑定製品5の製品情報及び取引情報を読み出すことができる。なお、例えばアプリケーション[A]9は、アプリケーション[B]11と同様の機能を備えてもよく、アプリケーション[B]11は、アプリケーション[A]9と同様の機能を備えてもよい。
Application [A] 9 is downloaded to terminal 2a and operated, and various businesses can use it to write product information and transaction information to the blockchain data 8b of the dedicated platform 8. Application [B] 11 is downloaded to terminal 2b and operated, and consumers can read the product information and transaction information of the product 5 requiring appraisal that has been written to the blockchain data 8b of the dedicated platform 8. For example, application [A] 9 may have the same functions as application [B] 11, and application [B] 11 may have the same functions as application [A] 9.
要鑑定製品5の小型記録媒体(a1)51aに記録された秘密鍵α1、製品情報を含む情報、及び、ギャランティカード24の小型記録媒体(b)52aに記録された秘密鍵β1、製品情報を含む情報の読み取りは、端末2aに接続されたリーダー25や、スマートフォンとして構成された端末2bを近接させることにより無線通信を介して実現できる。かかる場合において、NFC(NearField Communication)、RFID(Radio Frequency IDenticifier)等の近距離無線通信により非接触で行うこともできる。
The private key α 1 and information including product information recorded on the small recording medium (a 1 ) 51a of the product to be authenticated 5, and the private key β 1 and information including product information recorded on the small recording medium (b) 52a of the guarantee card 24 can be read via wireless communication by bringing a reader 25 connected to the terminal 2a or a terminal 2b configured as a smartphone into close proximity. In this case, the reading can also be performed contactlessly by short-distance wireless communication such as NFC (Near Field Communication) or RFID (Radio Frequency IDenticifier).
図6は、アナログ財鑑定証明を行う上で、要鑑定製品5について、各種業者等が専用プラットフォーム8に、製品情報、取引情報の各情報を記録したブロックチェーンデータ8bの例を示している。
Figure 6 shows an example of blockchain data 8b in which various businesses record product information and transaction information on a dedicated platform 8 for a product 5 requiring authentication when conducting analog property authentication certification.
要鑑定製品5は製造メーカー・製造者・著作者等によって製造された後、ギャランティカード24をセットにして出荷されるが、出荷の際には、まず、製造メーカー・製造者・著作者等の担当者は、アプリケーション[A]9を用いて、次のような製品情報、5W1H情報(誰が、いつ、どこで、何を、なぜ、どのように)を含む情報として、例えば、商品名、品番、製造メーカー、製造場所、製造年月日等を、専用プラットフォーム8のブロックチェーンデータ8bに書き込む。
After the product 5 requiring authentication is manufactured by a manufacturer, creator, author, etc., it is shipped together with a guarantee card 24. At the time of shipment, the person in charge at the manufacturer, creator, author, etc. first uses application [A] 9 to write information including the following product information and 5W1H information (who, when, where, what, why, how), such as the product name, product number, manufacturer, manufacturing location, and manufacturing date, into the blockchain data 8b of the dedicated platform 8.
次に、製造メーカー・製造者・著作者等の責任者は、アプリケーション[A]9を用いて、製造メーカー・製造者・著作者等の担当者が記録した製品情報の検品結果、5W1H情報を含む情報を、専用プラットフォーム8のブロックチェーンデータ8bに書き込む。
Next, the responsible person of the manufacturer, creator, author, etc. uses application [A] 9 to write the product information recorded by the person in charge of the manufacturer, creator, author, etc., including the inspection results and 5W1H information, into the blockchain data 8b of the dedicated platform 8.
次に、要鑑定製品5が製造メーカー・製造者・著作者等から出荷された後、物流業者は、アプリケーション[A]9を用いて製造メーカー・製造者・著作者等から製品を受け取った日時、卸売り業者に納品した日時、5W1H情報を含む情報を、専用プラットフォーム8のブロックチェーンデータ8bに書き込む。
Next, after the product 5 requiring authentication is shipped from the manufacturer, producer, author, etc., the logistics company uses application [A] 9 to write information including the date and time when the product was received from the manufacturer, producer, author, etc., the date and time when it was delivered to the wholesaler, and the 5W1H information, into the blockchain data 8b of the dedicated platform 8.
要鑑定製品5が物流業者から入荷された後、卸売り業者は、アプリケーション[A]9を用いて、例えばその物流業者から製品を納品された日時、物流業者に小売業者へ搬送させた日時、5W1H情報を含む情報を、専用プラットフォーム8のブロックチェーンデータ8bに書き込む。
After the product 5 requiring appraisal is received from the logistics company, the wholesaler uses application [A] 9 to write information including, for example, the date and time the product was delivered by the logistics company, the date and time the logistics company transported it to the retailer, and 5W1H information, into the blockchain data 8b of the dedicated platform 8.
このようにして、各種業者等の製品情報及び取引情報が、専用プラットフォーム8のブロックチェーンデータ8bに順次書き込まれていく。
In this way, product information and transaction information from various vendors etc. is written sequentially into the blockchain data 8b of the dedicated platform 8.
なお、ブロックチェーンデータ8bに製品情報及び取引情報を書き込む権限は、これらの情報に関わる各種業者等それぞれに限定して与えられる。例えば、各種業者等には製品情報を書き込む権限しか与えられないものであってもよい。
The authority to write product information and transaction information to the blockchain data 8b is given only to each of the various businesses involved in this information. For example, each of the various businesses may only be given the authority to write product information.
このように、各種業者等が、要鑑定製品5の製品情報及び取引情報を順次書き込んでいくことから、要鑑定製品5が複雑な流通経路を辿って流通したり、インターネットを通じて販売されたりしても、要鑑定製品5の製品情報及び取引情報が正確に記録できる。
In this way, various businesses etc. sequentially write down the product information and transaction information of the product 5 requiring appraisal, so that the product information and transaction information of the product 5 requiring appraisal can be accurately recorded even if the product 5 requiring appraisal is distributed through complex distribution routes or sold over the Internet.
さらに、製品情報及び取引情報を、専用プラットフォーム8のブロックチェーンデータ8bに書き込むことにより、製品情報及び取引情報が改竄されることを完全に防止することができる。すなわち、ブロックチェーンデータ8b内の各ブロックには、タイムスタンプと前のブロックへのリンク(ハッシュ値)が含まれており、ブロック内のデータを遡及的に変更することはできない。
Furthermore, by writing the product information and transaction information to the blockchain data 8b of the dedicated platform 8, it is possible to completely prevent the product information and transaction information from being tampered with. That is, each block in the blockchain data 8b contains a timestamp and a link (hash value) to the previous block, and the data in a block cannot be changed retroactively.
要鑑定製品5の新製品または中古品を購入した消費者は、端末2bを用いて、要鑑定製品5に付与された秘密鍵α1、及びギャランティカード24に付与された秘密鍵β1を使用し、アプリケーション[B]11を用いて、専用プラットフォーム8のブロックチェーンデータ8bに書き込まれた、要鑑定製品5の製品情報及び取引情報を読み出すことができる。これにより、要鑑定製品5及びギャランティカード24を所有する真の消費者だけが、信頼性の高い鑑定証明を簡単に行うことができる。
A consumer who purchases a new or used product 5 to be authenticated can use the private key α 1 attached to the product 5 to be authenticated and the private key β 1 attached to the guarantee card 24 with the terminal 2b to read the product information and transaction information of the product 5 to be authenticated that have been written in the blockchain data 8b of the dedicated platform 8 with the application [B] 11. This allows only the genuine consumer who owns the product 5 to be authenticated and the guarantee card 24 to easily provide a highly reliable authentication certificate.
このようなアナログ財鑑定証明においても同様に、複雑な流通経路を辿って流通したり、インターネットを通じて販売されたりする要鑑定製品5を購入した消費者が、信頼性の高い鑑定証明を簡単に行うことができる。このアナログ財鑑定証明においては、各種業者等が、要鑑定製品5の製品情報及び取引情報を、専用プラットフォーム8のブロックチェーンデータ8bに順次書き込んでいく。これにより、製品情報及び取引情報を正確に記録でき、また、製品情報及び取引情報が改竄されることを完全に防止することができる。このため、鑑定証明の信頼性をより高めることができる。
Similarly, with this type of analog goods authentication certification, a consumer who purchases a product 5 requiring authentication that has been distributed through complex distribution routes or sold over the internet can easily obtain a highly reliable authentication certification. In this analog goods authentication certification, various businesses etc. sequentially write the product information and transaction information of the product 5 requiring authentication to the blockchain data 8b of the dedicated platform 8. This allows the product information and transaction information to be recorded accurately, and also completely prevents the product information and transaction information from being tampered with. This further increases the reliability of the authentication certification.
またアナログ財鑑定証明においては、要鑑定製品5に付与された秘密鍵α1、及びギャランティカード24に付与された秘密鍵β1を使用して、専用プラットフォーム8のブロックチェーンデータ8bに書き込まれた、要鑑定製品5の製品情報及び取引情報を読み出すことにより、要鑑定製品5及びギャランティカード24を所有する真の消費者だけが、鑑定証明を行うことができる。このため、これらの要鑑定製品5又はギャランティカード24を保有していない第三者は、このような鑑定証明自体を行うことができない。
In analog goods authentication certification, only the true consumer who owns the product to be authenticated 5 and the guarantee card 24 can perform authentication certification by reading the product information and transaction information of the product to be authenticated 5 written in the blockchain data 8b of the dedicated platform 8 using the private key α 1 assigned to the product to be authenticated 5 and the private key β 1 assigned to the guarantee card 24. For this reason, a third party who does not possess the product to be authenticated 5 or the guarantee card 24 cannot perform such authentication certification itself.
なお、アナログ財鑑定証明を行う上で、要鑑定製品5に、小型記録媒体(a1)と共に、秘密鍵α2を含む情報を記録した小型記録媒体(a2)~秘密鍵αnを含む情報を記録した小型記録媒体(an)のn個(nは2以上の整数)の小型記録媒体を貼着または組み込むことができる。これにより、秘密鍵α1、秘密鍵β1だけでなく、例えば秘密鍵α2~αnの全ての秘密鍵のうち少なくとも2つ(例えば秘密鍵α1、及び秘密鍵β1、α2~αnのうち少なくとも1つ)が揃って鑑定証明が成立するマルチシグ認証が採用でき、鑑定精度をより確実なものとすることができる。さらに、n個の小型記録媒体(a1)~(an)を要鑑定製品5の各パーツに貼着または組み込むことにより、パーツの一部が模造品と交換されている場合でもこれを検知することができる。例えば、要鑑定製品5が自動車の場合、車体及び各タイヤそれぞれに小型記録媒体を貼着または組み込むことにより、全てのパーツに対して鑑定証明を実施することができる。
In performing the analog property authentication certification, n small recording media (n is an integer of 2 or more) including a small recording medium (a 2 ) recording information including a private key α 2 to a small recording medium (a n ) recording information including a private key α n can be attached or incorporated into the product 5 to be authenticated together with the small recording medium (a 1 ). This makes it possible to adopt multi-sig authentication in which authentication certification is established when not only the private keys α 1 and β 1 but also at least two of all the private keys α 2 to α n (for example, the private key α 1 and at least one of the private keys β 1 and α 2 to α n ) are present, thereby making it possible to make the accuracy of the authentication more reliable. Furthermore, by attaching or incorporating the n small recording media (a 1 ) to (a n ) to each part of the product 5 to be authenticated, even if some of the parts are replaced with counterfeits, this can be detected. For example, if the product to be authenticated 5 is an automobile, small recording media can be attached to or incorporated into the body of the vehicle and each tire, thereby making it possible to authenticate all parts.
また、鑑定証明システム1では、好適には、小型記録媒体(a1)~(an)及び上記小型記録媒体(b)の少なくとも1つに、GPS機能を備えることができる。これにより、要鑑定製品5の各パーツや、ギャランティカード24を紛失したり、これらが盗難にあったりした場合でも、容易にその所在を検知することができる。
In addition, in the appraisal certification system 1, at least one of the small recording media (a 1 ) to (a n ) and the small recording media (b) can preferably be provided with a GPS function, so that even if each part of the product to be appraised 5 or the guarantee card 24 is lost or stolen, its location can be easily detected.
このようなアナログ財鑑定証明に、上述したデジタル財鑑定証明を組み合わせたハイブリッド鑑定証明を行う場合には、図7(a)に示すように、アナログ財鑑定証明において求められる要鑑定製品5及びギャランティカード24に加え、デジタル財鑑定証明において求められるトランザクションハッシュ又は二次元コードの3つを準備する。
When performing hybrid authentication certification by combining such analog property authentication certification with the digital property authentication certification described above, three items are prepared as shown in FIG. 7(a): the product to be authenticated 5 and the guarantee card 24 required for analog property authentication certification, as well as the transaction hash or two-dimensional code required for digital property authentication certification.
そして、端末72を用いて、要鑑定製品5に付与された秘密鍵α1、及びギャランティカード24に付与された秘密鍵β1を使用し、専用プラットフォーム8のブロックチェーン8aに記録された、要鑑定製品5の製品情報及び取引情報を読み出す。これと共に、トランザクションハッシュ又は二次元コードを用いて、端末72にインストールされたアプリケーションにアクセスし、鑑定証明を行う。アプリケーション側においてトランザクションハッシュ又は二次元コードの整合性を判定することができることに加え、読み出された要鑑定製品5の製品情報及び取引情報が何れも正しいかを判定することができる。これらの判定結果が何れも正しいものと判定された場合に初めてその要鑑定製品5が真正品であるものと判断することができる。
Then, using the terminal 72, the private key α 1 assigned to the product 5 to be inspected and the private key β 1 assigned to the guarantee card 24 are used to read out the product information and transaction information of the product 5 to be inspected, which are recorded in the block chain 8a of the dedicated platform 8. At the same time, the transaction hash or the two-dimensional code is used to access the application installed on the terminal 72, and authentication proof is performed. In addition to being able to determine the consistency of the transaction hash or the two-dimensional code on the application side, it is also possible to determine whether the read product information and transaction information of the product 5 to be inspected are both correct. Only when it is determined that both of these determination results are correct can it be determined that the product 5 to be inspected is genuine.
仮にアナログ財鑑定証明に用いられる要鑑定製品5に付与された秘密鍵α1、及びギャランティカード24に付与された秘密鍵β1が偽造されたり、違法に複製されたりするものであったとしても、このデジタル財鑑定証明に用いられるトランザクションハッシュ又は二次元コードを通じた鑑定証明がなされない限り、このハイブリッド鑑定証明を看過することはできないものとなる。即ち、このハイブリッド鑑定証明は、アナログ財鑑定証明に加え、デジタル財鑑定証明を織り交ぜることにより、より信頼性の高い鑑定証明システム1を提供することが可能となる。
Even if the private key α 1 assigned to the product to be authenticated 5 used for analog property authentication certification and the private key β 1 assigned to the guarantee card 24 are counterfeited or illegally copied, this hybrid authentication certification cannot be overlooked unless authentication certification is performed through the transaction hash or two-dimensional code used for this digital property authentication certification. In other words, this hybrid authentication certification makes it possible to provide a more reliable authentication certification system 1 by interweaving digital property authentication certification in addition to analog property authentication certification.
なお本発明は、図7(a)に示すように、要鑑定製品5及びギャランティカード24に加え、トランザクションハッシュ又は二次元コードの3つを準備する場合を例にとり説明をしたが、これに限定されるものではない。例えば図7(b)に示すように、要鑑定製品5又はギャランティカード24に加え、トランザクションハッシュ又は二次元コードの2つのみの組み合わせを準備することで同様にハイブリッド鑑定証明を行うことができる。
Note that, as shown in FIG. 7(a), the present invention has been described taking as an example a case in which three items, a product to be authenticated 5 and a guarantee card 24, as well as a transaction hash or a two-dimensional code, are prepared, but the present invention is not limited to this. For example, as shown in FIG. 7(b), a hybrid authentication proof can be similarly performed by preparing a combination of only two items, a product to be authenticated 5 or a guarantee card 24, as well as a transaction hash or a two-dimensional code.
つまり、アナログ財鑑定証明においては、要鑑定製品5に付与された秘密鍵α1、又はギャランティカード24に付与された秘密鍵β1を使用し、専用プラットフォーム8のブロックチェーン8aに記録された、要鑑定製品5の製品情報及び取引情報を読み出す。これに加えて、トランザクションハッシュ又は二次元コードを用いて、端末72にインストールされたアプリケーションを介して整合性を判定することができる。これらの判定結果が何れも正しいものと判定された場合に初めてその要鑑定製品5が真正品であるものと判断することができる。
That is, in analog property authentication certification, the private key α 1 assigned to the product 5 to be authenticated or the private key β 1 assigned to the guarantee card 24 is used to read out the product information and transaction information of the product 5 to be authenticated, which are recorded in the block chain 8a of the dedicated platform 8. In addition, the transaction hash or the two-dimensional code can be used to determine consistency via an application installed on the terminal 72. Only when all of these determination results are determined to be correct can the product 5 to be authenticated be determined to be genuine.
また、上述したアナログ財鑑定証明の代替として、以下に説明するイーサリアム等のトークンを保管するためのブロックチェーンウォレットを通じて所有者証明を行うようにしてもよい。以下に説明するブロックチェーンウォレットの所有者証明は一例であり、例えばDID(分散型アイデンティティ:Decentralized Identity、又はDecentralized Identifier)、「SSI(自己主権型アイデンティティ:Self-Sovereign Identity)」、その他「DIW(Digital Identity Wallet)」であっても良い。また、各国政府や公的機関が「検証可能な資格情報 (VC:Verifiable Credentials)」として認証した例えば日本でいうところの「GビズID(gBizID)」又は「マイナンバー(個人番号)」等 を代替として用いることができ、これらに限定されることなく他のいかなる所有者証明手段に代替可能であることは勿論である。
Furthermore, as an alternative to the analog property authentication proof described above, ownership proof may be performed through a blockchain wallet for storing tokens such as Ethereum, which will be described below. The ownership proof using a blockchain wallet described below is one example, and may be, for example, a DID (Decentralized Identity, or Decentralized Identifier), an SSI (Self-Sovereign Identity), or another "DIW (Digital Identity Wallet)." In addition, for example, "gBizID" or "My Number (Personal Number)" certified by governments and public institutions as "Verifiable Credentials (VC)" in Japan may be used as an alternative, and it goes without saying that any other means of ownership proof may be used without being limited to these.
なお、上述したギャランティカード24の代替として、形状、構造、大きさ等に応じて、マイクロチップ(ICチップ)、二次元コード、電子透かし等を適宜用いることができる。
In addition, as an alternative to the above-mentioned guarantee card 24, a microchip (IC chip), two-dimensional code, electronic watermark, etc. can be used as appropriate depending on the shape, structure, size, etc.
図8は、ブロックチェーンウォレットを通じた所有者証明のフローチャートを示している。
Figure 8 shows a flowchart of ownership proof through a blockchain wallet.
ステップS31において先ず所有者41はバックエンド42に対してワンタイムトークンを要求する。ここでいう所有者41は、例えばウェブブラウザの拡張機能やスマホアプリとして利用できるブロックチェーンウォレットの所有者であり、上述したユーザの一例として示す。所有者41は、フロントエンド(front-end)を通じて情報の送受信を行い、このフロントエンドとは、所有者41と直接データのやり取りを行う要素のことで、ウェブ制作ではウェブブラウザ側(クライアント側)を示す。バックエンド42とは、サーバーサイドの処理を指し、一般的に所有者41の目に見えることのないサーバやデータベース、機能、処理を担うプログラムやモジュールなど、仕組みや機能、部品を示す。
In step S31, the owner 41 first requests a one-time token from the backend 42. The owner 41 here is, for example, the owner of a blockchain wallet that can be used as an extension to a web browser or a smartphone app, and is shown as an example of the user mentioned above. The owner 41 sends and receives information through the frontend, which is an element that directly exchanges data with the owner 41, and in web production, it refers to the web browser side (client side). The backend 42 refers to server-side processing, and generally refers to mechanisms, functions, and parts such as servers, databases, functions, and programs and modules that handle processing that are not visible to the owner 41.
次にステップS32に移行し、バックエンド42は所有者41に対して、ワンタイムトークンを返却する。このワンタイムトークンの有効期限は、例えば数秒~数分間のものであってもよい。
Then, the process moves to step S32, where the backend 42 returns a one-time token to the owner 41. The expiration time of this one-time token may be, for example, a few seconds to a few minutes.
次にステップS33に移行し、所有者41からブロックチェーンウォレット43に署名作成依頼を出す。このブロックチェーンウォレット43は、例えば暗号資産を扱うプログラムである。このブロックチェーンウォレット43では、アドレスやその秘密鍵は外部サーバに保存されるわけではなく、送金処理なども全てブラウザ上で動作してもよい。
Next, the process moves to step S33, where the owner 41 issues a signature creation request to the blockchain wallet 43. This blockchain wallet 43 is, for example, a program that handles crypto assets. With this blockchain wallet 43, the address and its private key are not stored on an external server, and remittance processing and the like may all be performed on the browser.
次にステップS34に移行し、ブロックチェーンウォレット43から署名を所有者41に対して返却する。
Then, the process proceeds to step S34, where the signature is returned from the blockchain wallet 43 to the owner 41.
次にステップS35へ移行し、所有者41は、メッセージ、ワンタイムトークン、署名データ、ブロックチェーンウォレットアドレスをバックエンド42へ送信する。即ち、署名前において、バックエンド42に所有者認証用のワンタイムトークンを要求し、それを署名に利用するものである。署名データをバックエンド42に送信する際に上述したワンタイムトークンも一緒に送信する。バックエンド42では署名データとワンタイムトークンを検証する。
Next, the process moves to step S35, where the owner 41 sends the message, one-time token, signature data, and blockchain wallet address to the backend 42. That is, before signing, the owner 41 requests a one-time token for owner authentication from the backend 42, which is used for signing. When sending the signature data to the backend 42, the owner 41 also sends the one-time token mentioned above. The backend 42 verifies the signature data and the one-time token.
バックエンド42では、署名付きのメッセージを規格にしたがってハッシュデータに変換する。そして、スマートコントラクト44に対して、そのハッシュメッセージと署名データを送信する(ステップS36)。ここでいうスマートコントラクト44は、ブロックチェーン8a上で契約を自動的に実行する仕組みであり、ブロックチェーン8aのサーバ上で動作する。
The backend 42 converts the signed message into hash data according to the standard. Then, the hash message and the signature data are sent to the smart contract 44 (step S36). The smart contract 44 here is a mechanism for automatically executing a contract on the blockchain 8a, and runs on the server of the blockchain 8a.
次にステップS37に移行し、スマートコントラクト44からバックエンド42に向けて検証アドレスを返却する。バックエンド42は、検証アドレスの照合を行う。かかる場合においてバックエンド42は、ブロックチェーンウォレットアドレスと検証用ブロックチェーンウォレットアドレスとの整合性を確認する。
Next, the process proceeds to step S37, where the smart contract 44 returns the verification address to the backend 42. The backend 42 checks the verification address. In this case, the backend 42 checks the consistency between the blockchain wallet address and the verification blockchain wallet address.
次にステップS38に移行し、バックエンド42は、ブロックチェーンウォレット所有者証明を所有者41へ送信する。要鑑定製品5について所有者41が所有者証明をしたい場合、このようにしてスマートコントラクト(ブロックチェーン8a)に記録されている所有者証明データ(ブロックチェーンウォレット所有者証明)を読み出すことで実現することができる。
Then, the process proceeds to step S38, where the backend 42 sends the blockchain wallet owner certificate to the owner 41. When the owner 41 wishes to perform ownership certification for the product 5 requiring authentication, this can be achieved by reading out the owner certification data (blockchain wallet owner certificate) recorded in the smart contract (blockchain 8a) in this manner.
このため、上述したアナログ財鑑定証明の代替として、このようにブロックチェーン8aに記録されている所有者証明データ(ブロックチェーンウォレット所有者証明)を読み出すと共に、図9(a)に示すように、専用プラットフォーム8から発行されるトランザクションハッシュ又は二次元コードに基づいて、ハイブリッドな鑑定証明を行うことができる。
Therefore, as an alternative to the analog property authentication proof described above, it is possible to read out the owner certification data (blockchain wallet owner certification) recorded in the blockchain 8a in this way, and perform a hybrid authentication proof based on the transaction hash or two-dimensional code issued from the dedicated platform 8, as shown in Figure 9(a).
これに加えて、このようなブロックチェーンウォレット所有者証明を利用する場合には、図9(b)に示すように、更にアナログ財鑑定証明を組み合わせるようにしてもよい。かかる場合には、アナログ財鑑定証明における要鑑定製品5に付与された秘密鍵α1及びギャランティカード24に付与された秘密鍵β1を使用してもよいし、秘密鍵α1又は秘密鍵β1を使用してもよい。所有者証明データ(ブロックチェーンウォレット所有者証明)、トランザクションハッシュ又は二次元コードに加え、秘密鍵α1及び/又は秘密鍵β1に基づいて、ハイブリッドな鑑定証明を行うことが可能となる。
In addition, when such a blockchain wallet owner proof is used, it may be further combined with an analog property authentication proof as shown in Fig. 9(b). In such a case, the private key α1 given to the product to be authenticated 5 in the analog property authentication proof and the private key β1 given to the guarantee card 24 may be used, or the private key α1 or the private key β1 may be used. It becomes possible to perform hybrid authentication proof based on the private key α1 and/or the private key β1 in addition to the owner proof data (blockchain wallet owner proof), the transaction hash, or the two-dimensional code.
また本発明によれば、NFTを介した鑑定証明は必須ではなく、図10に示すように、識別子を介した鑑定証明を行うようにしてもよい。識別子自体が唯一無二のものであるから、これを介して鑑定証明を行うことが可能となる。
Furthermore, according to the present invention, authentication proof via NFT is not essential, and authentication proof may be performed via an identifier, as shown in FIG. 10. Since the identifier itself is unique, authentication proof can be performed via this.
消費者又は製造メーカー・製造者・著作者等は、専用プラットフォーム8から識別子を取得する。このとき、識別子に加え、ステップS23において識別子に応じた二次元コードを生成している場合には、消費者又は製造メーカー・製造者・著作者等は、その二次元コードを取得してもよい。
The consumer or manufacturer/producer/author, etc., obtains the identifier from the dedicated platform 8. At this time, if a two-dimensional code corresponding to the identifier has been generated in step S23 in addition to the identifier, the consumer or manufacturer/producer/author, etc., may obtain the two-dimensional code.
鑑定証明時には、この取得した識別子、又はその識別子に応じた二次元コードに加え、図10(a)に示すように要鑑定製品5に付与された秘密鍵α1、或いは、図10(b)に示すように秘密鍵α1及びギャランティカード24に付与された秘密鍵β1を準備する。
At the time of authentication certification, in addition to this acquired identifier or a two-dimensional code corresponding to that identifier, a private key α 1 assigned to the product to be authenticated 5 as shown in FIG. 10(a), or a private key α 1 and a private key β 1 assigned to the guarantee card 24 as shown in FIG. 10(b) are prepared.
そして、端末2を用いて、秘密鍵α1、或いは秘密鍵α1及び秘密鍵β1を使用し、専用プラットフォーム8を介してブロックチェーン8aに記録された、要鑑定製品5の製品情報及び取引情報を読み出す。これと共に、識別子、又はその識別子に応じた二次元コードを用いて、専用プラットフォーム8又は分散型ファイルサーバ3にアクセスし、そこに記録されている要鑑定製品5の識別子を読み出す。この読み出された要鑑定製品5の製品情報及び取引情報、識別子の何れもが正しいものと判定された場合に初めてその要鑑定製品5が真正品であるものと判断することができる。なお、真正品であるものと判断する基準として、例えば要鑑定製品5の製品情報及び取引情報、及び識別子の少なくとも何れかが正しい場合でもよく、用途に応じて任意に設定することができる。
Then, using the terminal 2, the private key α 1 or the private key α 1 and the private key β 1 , the product information and transaction information of the product to be inspected 5 recorded in the blockchain 8a via the dedicated platform 8 is read. At the same time, the identifier or a two-dimensional code corresponding to the identifier is used to access the dedicated platform 8 or the distributed file server 3, and the identifier of the product to be inspected 5 recorded therein is read. Only when it is determined that all of the product information, transaction information, and identifier of the product to be inspected 5 that have been read are correct, can the product to be inspected 5 be determined to be genuine. Note that the criterion for determining that the product is genuine may be, for example, at least one of the product information, transaction information, and identifier of the product to be inspected 5 that are correct, and can be set arbitrarily according to the application.
この図10の例において、更に所有者証明データ(ブロックチェーンウォレット所有者証明)を組み合わせたハイブリッドな鑑定証明を行うようにしてもよい。
In the example of Figure 10, a hybrid authentication proof may be performed by further combining owner proof data (blockchain wallet owner proof).
また、例えばデジタル財においては、図11に示すように、取得した識別子、又はその識別子に応じた二次元コードに加え、ギャランティカード24に付与された秘密鍵β1を用いたハイブリッド鑑定証明を行うようにしてもよい。デジタル財は、要鑑定製品5が物品として具現化されるものではなく、小型記録媒体a自体を付すことができないため、秘密鍵α1を省略し、秘密鍵β1のみを使用して、ハイブリッド鑑定証明を行う。この図11の例において、更に所有者証明データ(ブロックチェーンウォレット所有者証明)を組み合わせたハイブリッドな鑑定証明を行うようにしてもよい。
For example, in the case of digital goods, hybrid authentication proof may be performed using the acquired identifier or a two-dimensional code corresponding to the identifier, as well as the private key β1 attached to the guarantee card 24, as shown in Fig. 11. Since the product 5 to be authenticated is not embodied as an item and the small recording medium a itself cannot be attached, hybrid authentication proof is performed by omitting the private key α1 and using only the private key β1 . In the example of Fig. 11, hybrid authentication proof may be performed by further combining owner certification data (blockchain wallet owner certification).
カウントアップによる鑑定証明
なお本発明は、上述した実施の形態に限定されるものではなく、更にカウントアップによる鑑定証明を織り交ぜて実施するものであってもよい。 Authentication by Counting Up The present invention is not limited to the above-described embodiment, and may be implemented by incorporating authentication by counting up.
なお本発明は、上述した実施の形態に限定されるものではなく、更にカウントアップによる鑑定証明を織り交ぜて実施するものであってもよい。 Authentication by Counting Up The present invention is not limited to the above-described embodiment, and may be implemented by incorporating authentication by counting up.
このカウントアップによる鑑定証明は、上述した鑑定証明が行われる都度、その鑑定証明の時点をブロックチェーン8a上に順次記録する。例えば、鑑定証明が8月19日の10時15分に行われた場合には、8月19日10時15分という時点がブロックチェーン8a上に記録され、次に9月23日21時54分に鑑定証明が行われた場合には、9月23日21時54分という時点がブロックチェーン8a上に記録され、次に11月4日13時34分に鑑定証明が行われた場合には、11月4日13時34分という時点がブロックチェーン8a上に記録される。その結果、ブロックチェーン8a上には、鑑定証明が記録された各時点が順次蓄積されることとなる。
In this count-up authentication proof, the time of the authentication proof is recorded on the blockchain 8a sequentially each time the authentication proof described above is performed. For example, if the authentication proof is performed at 10:15 on August 19th, the time of 10:15 on August 19th is recorded on the blockchain 8a, if the authentication proof is then performed at 21:54 on September 23rd, the time of 21:54 on September 23rd is recorded on the blockchain 8a, and if the authentication proof is then performed at 13:34 on November 4th, the time of 13:34 on November 4th is recorded on the blockchain 8a. As a result, the time points at which authentication proof is recorded are sequentially accumulated on the blockchain 8a.
カウントアップによる鑑定証明は、このブロックチェーン8aに記録された時点に基づいて鑑定証明を行う。例えば、同時点において複数の鑑定証明がブロックチェーン8aにおいて記録されている場合、何れか一方の要鑑定製品5が真正品で、他方が偽物であることが明らかである。かかる場合には、その旨を通知するようにしてもよい。
The authentication certification by counting up is based on the time when it was recorded in the blockchain 8a. For example, if multiple authentication certifications are recorded in the blockchain 8a at the same time, it is clear that one of the products 5 to be authenticated is genuine and the others are fake. In such a case, a notification to that effect may be sent.
また、鑑定証明の時点の時間差が数十秒、数分~数十分、数時間の場合も、同一の物品を頻繁に鑑定すること自体が稀であることから疑わしい場合がある。かかる場合も同様にその旨を通知するようにしてもよい。
In addition, if the time difference between the authentication certificates is several tens of seconds, several minutes to several tens of minutes, or even several hours, this may be suspicious since it is rare for the same item to be authenticated frequently. In such cases, a notification to that effect may also be provided.
このように、ブロックチェーン8aに順次記録された鑑定証明の時点に基づいて、その信憑性を判定する。このとき、ブロックチェーン8aに記録された時点の間隔において閾値を設け、その閾値未満であるか否かに基づいて鑑定証明を行うようにしてもよい。
In this way, the authenticity is judged based on the time of the authentication certification recorded sequentially in the blockchain 8a. At this time, a threshold may be set for the interval between the times recorded in the blockchain 8a, and authentication certification may be performed based on whether or not the interval is below this threshold.
また、鑑定証明の時点に加え、更にその鑑定証明を行った位置に関する位置情報を紐付けてブロックチェーン8aに記録するようにしてもよい。例えば、8月19日10時15分という時点に加え、その鑑定証明を行った位置が「東京都丸の内」であれば、8月19日10時15分という時点と、その位置情報としての「東京都丸の内」がブロックチェーン8aに記録される。次に鑑定証明が行われた時点が、12月21日14時9分という時点に加え、その鑑定証明を行った位置が「パリの住所〇×」であれば、12月21日14時9分という時点と、その位置情報としての「パリの住所〇×」がブロックチェーン8aに記録される。その結果、ブロックチェーン8a上には、鑑定証明が記録された各時点と、その位置情報が順次蓄積されることとなる。
Furthermore, in addition to the time of the authentication certification, location information regarding the location where the authentication certification was performed may be linked and recorded in the blockchain 8a. For example, if the location of the authentication certification was "Marunouchi, Tokyo" in addition to the time of August 19th 10:15, the time of August 19th 10:15 and the location information "Marunouchi, Tokyo" are recorded in the blockchain 8a. If the next time the authentication certification was performed was December 21st 14:09 and the location of the authentication certification was "Address XX in Paris," the time of December 21st 14:09 and the location information "Address XX in Paris" are recorded in the blockchain 8a. As a result, the time when the authentication certification was recorded and its location information are sequentially accumulated on the blockchain 8a.
このとき、ブロックチェーン8aにおいて、最初の鑑定証明の時点における位置情報が東京であり、その後の鑑定証明の時点における位置情報がパリが記録されている場合であって、その時点間の間隔が僅か2時間である場合、東京からパリまで飛行機でも2時間で行くことは不可能であることから、何れか一方の要鑑定製品5が真正品で、他方が偽物であることが明らかである。かかる場合には、その旨を通知するようにしてもよい。具体的には、登録メールアドレスに不正検知をした旨の通知を行うようにしてもよいし、端末2に実装されたアプリケーションを介してアラートポップアップを表示したり、或いは注意喚起を示す赤字表示を画面上に表示したりする方法等を行うようにしてもよい。
In this case, if the location information recorded in the blockchain 8a at the time of the first authentication certification is Tokyo, and the location information recorded at the time of the subsequent authentication certification is Paris, and the time interval between these times is only two hours, it is clear that one of the products to be authenticated 5 is genuine and the other is a fake, since it is impossible to fly from Tokyo to Paris in two hours. In such a case, a notification to that effect may be sent to the registered email address, or an alert pop-up may be displayed via an application implemented in the terminal 2, or a red message may be displayed on the screen to warn of the possibility of fraud.
このように、ブロックチェーン8aに順次記録された鑑定証明の時点及び位置情報に基づいて、その信憑性を判定する。このとき、ブロックチェーン8aに記録された時点の間隔において閾値を設けて判断する場合、その位置情報との関係において当該閾値を設定するようにしてもよい。
In this way, the authenticity of the authentication certificate is judged based on the time and location information recorded sequentially in the blockchain 8a. At this time, if a threshold is set for the interval between the times recorded in the blockchain 8a and a judgment is made, the threshold may be set in relation to the location information.
なお、この信憑性の判定は、所定時間内に移動が不可能な距離において鑑定証明が行われたか否かに基づく以外に、位置情報の如何を問わず、1日に所定回数以上の鑑定証明が実施されたか否か、或いは総鑑定証明回数が所定回を超えたか否かに基づいて行うようにしてもよい。即ち、所定期間における鑑定証明回数に基づいて、その信憑性を判定することとなる。所定期間における鑑定証明回数が閾値を超えたか否かに基づいてその信憑性を判別する。所定期間における鑑定証明回数が閾値を超えた場合、それほどの短期間において多くの鑑定証明が行われることは不自然であるため、信憑性が疑わしいものと判定し、アラートを通知するようにしてもよい。
In addition to being based on whether or not authentication was performed over a distance that cannot be traveled within a specified time, this determination of authenticity may also be based on whether or not a specified number of authentications were performed in one day, or whether the total number of authentications exceeded a specified number, regardless of location information. In other words, the authenticity is determined based on the number of authentications performed in a specified period of time. The authenticity is determined based on whether or not the number of authentications performed in a specified period of time exceeds a threshold. If the number of authentications performed in a specified period of time exceeds the threshold, it is unnatural for so many authentications to be performed in such a short period of time, so the authenticity may be determined to be suspicious and an alert may be issued.
また、要鑑定製品5が化粧品等である場合、ICチップ入り開封検知シールが貼付されている場合、使用と同時に当該ICチップ入り開封検知シールが破損される。このため、複数回の鑑定証明自体が行われることがありえなくなり、仮に複数回の鑑定証明が行われた場合、明らかに偽物が出回っていることが裏付けられる。このようなケースにおいて、所定期間における鑑定証明回数に基づいて、その信憑性を判別するメリットがでてくるといえる。
Furthermore, if the product to be authenticated 5 is a cosmetic product or the like, and has an IC chip-containing tamper detection seal affixed to it, the IC chip-containing tamper detection seal will be destroyed upon use. For this reason, it becomes impossible for authentication certification to be performed multiple times, and if authentication certification were performed multiple times, it would clearly prove that counterfeit products are in circulation. In such cases, it can be said that there is an advantage to determining the authenticity of the product based on the number of authentication certifications performed within a specified period of time.
表1に、ブロックチェーン8aに順次記録された鑑定証明の時点及び位置情報の例を示す。鑑定結果表示回数は、鑑定証明の回数を示している。時点は、年月日と時間を介して表示される。位置情報は、国名、都道府県、市区町村レベルで表示されるが、これに限定されるものではない。
Table 1 shows an example of the time and location information of authentication certifications recorded sequentially in the blockchain 8a. The number of times the authentication result has been displayed indicates the number of times authentication certifications have been performed. The time is displayed via date and time. Location information is displayed at the country, prefecture, city, town, or village level, but is not limited to this.
ちなみに位置情報の取得は、例えば鑑定証明を行おうとする端末2及び/又は端末72に実装される。
Incidentally, the acquisition of location information is implemented, for example, in terminal 2 and/or terminal 72 that are attempting to perform the appraisal certification.
アプリケーションを介して現在位置情報を取得したり、アクセスしたIPアドレスを逆探知する形式により当該情報を取得したりするものであってもよい。
Current location information may be obtained via an application, or the information may be obtained by tracing the accessed IP address.
トレーサビリティを利用した鑑定証明
以下、トレーサビリティを利用した鑑定証明方法について説明をする。 Authentication using traceability The authentication method using traceability is explained below.
以下、トレーサビリティを利用した鑑定証明方法について説明をする。 Authentication using traceability The authentication method using traceability is explained below.
図12は、トレーサビリティを利用した鑑定証明方法のフローを示している。鑑定証明方法において、要鑑定製品5に関わる複数のユーザは、第1検証情報を保有する。第1検証情報は、上述したブロックチェーンウォレットアドレス、ブロックチェーンウォレットアドレスを生成する際に用いる公開鍵、ブロックチェーンウォレットアドレスを生成する際に用いる秘密鍵、DID、SSI、DIW、又はVC(例えばGビズID又はマイナンバー)の少なくとも何れかを含む。
FIG. 12 shows the flow of an authentication certification method using traceability. In the authentication certification method, multiple users related to the product 5 requiring authentication hold first verification information. The first verification information includes at least one of the above-mentioned blockchain wallet address, the public key used when generating the blockchain wallet address, the private key used when generating the blockchain wallet address, the DID, the SSI, the DIW, or the VC (e.g., G Biz ID or My Number).
例えば、第1検証情報としてDIDを用いた場合、ユーザ毎に利用する情報を設定することができる。このため、不要な情報の利用を抑制することが可能となる。上記のほか、例えばGビズID又はマイナンバーは、DIDに比べて信頼性の高い情報として位置付けることができる。このため、第1検証情報としてGビズID、マイナンバー、又はDIWを用いることで、鑑定証明方法の信頼性向上を図ることが可能となる。
For example, when a DID is used as the first verification information, the information to be used can be set for each user. This makes it possible to prevent the use of unnecessary information. In addition to the above, for example, GBiz ID or My Number can be positioned as information with higher reliability than DID. Therefore, by using GBiz ID, My Number, or DIW as the first verification information, it is possible to improve the reliability of the appraisal certification method.
また、鑑定証明時において、鑑定証明者としてのユーザが保有する第1検証情報は、第1署名情報として見做し、ブロックチェーン8a等に記録された第1検証情報との整合性を判定するために用いられる。なお、鑑定証明方法では、例えば電子署名技術における「署名」、及び「署名の検証」の処理を実施することで、整合性の判定を実現することができる。
Furthermore, at the time of authentication and certification, the first verification information held by the user as the authentication certifier is regarded as first signature information and is used to determine consistency with the first verification information recorded in the blockchain 8a or the like. Note that in the authentication and certification method, the determination of consistency can be realized by carrying out the processes of "signature" and "signature verification" in electronic signature technology, for example.
以下、第1検証情報及び第1署名情報として、ブロックチェーンウォレットアドレスが用いられる場合について説明をする。なお、第1検証情報及び第1署名情報として、DID、SSI、DIW、又はVC(例えばGビズID又はマイナンバー)の少なくともいずれかが用いられた場合も同様のため、説明を省略する。
Below, we will explain the case where a blockchain wallet address is used as the first verification information and the first signature information. Note that the same applies when at least one of the DID, SSI, DIW, and VC (e.g., G Biz ID or My Number) is used as the first verification information and the first signature information, so we will omit the explanation.
本フローを開始する前提として、製造メーカー・製造者・著作者、物流企業、消費者等の各ユーザに対して、それぞれ上述したブロックチェーンウォレットアドレスが予め付与されていることが前提となる。このブロックチェーンウォレットアドレスが、本システムの運営業者側で割り振るようにしてもよい。このブロックチェーンウォレットアドレスに紐付けられた秘密鍵、及び公開鍵は、例えばブロックチェーンウォレットアドレスを保有する製造メーカー・製造者・著作者、物流企業、消費者等のユーザに配布されるほか、上述した専用プラットフォーム8等のような鑑定証明システム1に用いられる構成内に記録されてもよく、例えば小型記録媒体(例えば二次元コード)や、NFT情報の一部に含まれてもよく、用途に応じて任意に設定することができる。また、製造メーカー、製造者、著作者、物流企業、消費者の各主体が独自にブロックチェーンウォレットアドレスを取得してもよい。
The premise for starting this flow is that each user, such as the manufacturer, creator, logistics company, consumer, etc., has been assigned the above-mentioned blockchain wallet address in advance. This blockchain wallet address may be assigned by the operator of this system. The private key and public key linked to this blockchain wallet address may be distributed to users such as the manufacturer, creator, logistics company, consumer, etc. who hold the blockchain wallet address, or may be recorded in a configuration used in the authentication certification system 1 such as the above-mentioned dedicated platform 8, or may be included in a small recording medium (e.g., a two-dimensional code) or as part of the NFT information, and may be set arbitrarily depending on the purpose. In addition, each entity, such as the manufacturer, creator, logistics company, and consumer, may independently obtain a blockchain wallet address.
先ずステップS41において、要鑑定製品5についてデジタル財データを取得する。このデジタル財データ取得は、鑑定証明対象に対して行う。このデジタル財データは、製造メーカー・製造者・著作者等がこのような端末2を介して撮像することにより得られたデジタル財データとして構成される以外に、元々この要鑑定製品5に対して付与され、或いは紐付けられて記憶媒体に記録されているものを使用するようにしてもよいことは上述と同様である。このデジタル財データは、デジタル画像、デジタル音声、デジタル楽曲、デジタル映像等の鑑定証明が必要とされるあらゆるデジタルコンテンツであり、各拡張子として、例えばjpg、png、gif、mp3、mov等が付与される。このとき、このデジタル財データとともに、上述した付帯情報や、要鑑定製品5に関するあらゆる商品情報も一緒に取得するようにしてもよい。かかる場合には、このようなデジタル財データや登録番号、付帯情報、商品情報等をcsv形式のファイルに書き込んだものを取得するようにしてもよい。
First, in step S41, digital property data is acquired for the product 5 requiring authentication. This digital property data is acquired for the subject of authentication certification. As described above, this digital property data may be configured as digital property data obtained by the manufacturer, creator, author, etc. by capturing an image via such a terminal 2, or may be data that is originally assigned to the product 5 requiring authentication or that is linked and recorded on a storage medium. This digital property data is any digital content that requires authentication certification, such as digital images, digital audio, digital music, digital video, etc., and is assigned an extension such as jpg, png, gif, mp3, mov, etc. At this time, the above-mentioned supplementary information and any product information related to the product 5 requiring authentication may also be acquired together with this digital property data. In such a case, a file in CSV format containing such digital property data, registration number, supplementary information, product information, etc. may be acquired.
次にステップS42へ移行し、このようなデジタル財データや付帯情報、商品情報等を専用プラットフォーム8に登録することにより、上述と同様に、NFT情報を取得すると共に、そのNFT情報に応じたトランザクションハッシュを自動生成する。このトランザクションハッシュは、IDのようなデータで具現化されるものであってもよく(TxIDともいう。)、ブロックチェーンアドレスとして具現化されるものであってもよい。
Then, proceed to step S42, where such digital goods data, ancillary information, product information, etc. are registered on the dedicated platform 8, and similarly to the above, NFT information is obtained and a transaction hash corresponding to the NFT information is automatically generated. This transaction hash may be embodied as data such as an ID (also called a TxID), or may be embodied as a blockchain address.
そして、このトランザクションハッシュに基づいて更にハッシュ化した第1ハッシュを新たに生成する。なお、第1ハッシュをトランザクションハッシュに基づいて生成する以外に、トランザクションハッシュそのものをそのまま第1ハッシュとしてもよい。
Then, a new first hash is generated by further hashing this transaction hash. Note that instead of generating the first hash based on the transaction hash, the transaction hash itself may be used as the first hash.
なお、発行したNFT情報は、トランザクションハッシュに紐づいていることは勿論であるが、このトランザクションハッシュから生成される第1ハッシュに対してもこのNFT情報が紐づいている。このNFT情報はブロックチェーン8a上で記録される。
The issued NFT information is of course linked to the transaction hash, but this NFT information is also linked to the first hash generated from this transaction hash. This NFT information is recorded on the blockchain 8a.
次にステップS43に移行し、上述したアナログ財鑑定証明と同様に、要鑑定製品5の小型記録媒体(a1)51aに記録された秘密鍵α1、製品情報、取引情報を含む情報、及び/又は、ギャランティカード24の小型記録媒体(b)52aに記録された秘密鍵β1、製品情報、取引情報を含む情報を読み取る。そして読み取った情報をブロックチェーン8aに記録する上で生成される第2ハッシュを得る。
Next, the process proceeds to step S43, where, similarly to the above-mentioned analog property authentication certificate, information including the private key α 1 , product information, and transaction information recorded on the small recording medium (a 1 ) 51a of the product 5 to be authenticated, and/or information including the private key β 1 , product information, and transaction information recorded on the small recording medium (b) 52a of the guarantee card 24 is read. Then, a second hash generated when recording the read information in the blockchain 8a is obtained.
なお、ギャランティカード24は、実際にカード状の物品として具現化される物理的ギャランティカード以外に、物品として具現化されることなくデジタル情報としての論理的ギャランティカードも含まれる。
In addition to the physical guarantee card that is actually embodied as a card-like object, the guarantee card 24 also includes a logical guarantee card that is not embodied as an object but is instead digital information.
次に、ステップS44へ移行し、得られた第1ハッシュと第2ハッシュとに基づいて、新たに第3ハッシュを生成する。この第3ハッシュの生成方法としては、第1ハッシュと第2ハッシュとの積又は和を求め、これを第3ハッシュとしてもよいし、その他いかなる周知の方法で求めるようにしてもよい。求めた第3ハッシュは、ブロックチェーン8a上に記録する。このとき、上述したNFT情報やそのNFT情報に応じたトランザクションハッシュと二次元コード紐付けてこの第3ハッシュを記録するようにしてもよい。
Next, the process proceeds to step S44, where a new third hash is generated based on the obtained first hash and second hash. This third hash may be generated by calculating the product or sum of the first hash and the second hash and using this as the third hash, or by any other well-known method. The calculated third hash is recorded on the blockchain 8a. At this time, this third hash may be recorded by linking it to the above-mentioned NFT information or a transaction hash corresponding to the NFT information and a two-dimensional code.
以上のステップS41~ステップS44の前処理を事前に運営会社側で行っておいてもよいし、その他関係主体(製造メーカー・製造者・著作者・物流企業・消費者等)が自ら行っておいてもよい。その後の製造メーカー・製造者・著作者から、物流企業、消費者へと要鑑定製品5が流通する過程のプロセスは、以下に説明するステップS45以後となる。
The above pre-processing steps S41 to S44 may be performed in advance by the operating company, or may be performed by other related parties (manufacturers, manufacturers, authors, logistics companies, consumers, etc.). The process of distribution of the product 5 to be appraised from the manufacturers, manufacturers, and authors to the logistics companies and consumers begins after step S45, which is described below.
なお、本発明においては、ブロックチェーンウォレットアドレスについて、いわゆる中央集権型といえるWeb2.0で割り当てるようにしてもよいが、これに限定されるものではない。例えば、個人情報(性別、国籍、人種、年齢等)を入力することなく、個人のデジタル資産を全てブロックチェーンウォレット内に保存し、何人もこれを消去することが不可能なWeb3.0により具現化してもよい。即ち、Web3.0は、中央集権に依存しない、いわゆる非中央集権型を適用するようにしてもよい。
In addition, in the present invention, the blockchain wallet address may be assigned by Web 2.0, which can be said to be a so-called centralized system, but is not limited to this. For example, it may be embodied by Web 3.0, in which all of an individual's digital assets are stored in a blockchain wallet without the need to enter personal information (gender, nationality, race, age, etc.), and no one can erase it. In other words, Web 3.0 may be applied in a so-called decentralized manner that does not rely on centralization.
ステップS45では、先ず製造メーカー・製造者・著作者によって生成された要鑑定製品5が、物流企業へと移転する。即ち、このステップS45では、要鑑定製品5の所有者が製造メーカー・製造者・著作者から物流企業へと移転することとなる。このとき要鑑定製品5に付随する小型記録媒体(a1)、小型記録媒体(b)も同様に移転する。また、要鑑定製品5のNFT情報の所有者も同様に移転する。
In step S45, the product 5 to be authenticated, which was created by the manufacturer/producer/author, is first transferred to the distribution company. That is, in step S45, the owner of the product 5 to be authenticated is transferred from the manufacturer/producer/author to the distribution company. At this time, the small recording medium (a 1 ) and small recording medium (b) accompanying the product 5 to be authenticated are also transferred in the same manner. The owner of the NFT information of the product 5 to be authenticated is also transferred in the same manner.
移転する都度、その移転先の所有者のブロックチェーンウォレットアドレスを当該NFT情報と紐付けて記録する。移転する前は、NFT情報に紐付けられて製造メーカー・製造者・著作者のブロックチェーンウォレットアドレスが記録されていたが、移転する際に、新たに物流企業のブロックチェーンウォレットアドレスがNFT情報に紐付けられて記録される。かかる場合、各種業者等は、この移転する際のブロックチェーンウォレットアドレスをアプリケーション[A]等を用いて、専用プラットフォーム8のブロックチェーン8aに記録するようにしてもよい。
Each time a transfer occurs, the blockchain wallet address of the transferee's owner is recorded in association with the NFT information. Before the transfer, the blockchain wallet addresses of the manufacturer, producer, and author are recorded in association with the NFT information, but when the transfer occurs, the blockchain wallet address of the logistics company is recorded in association with the NFT information. In such cases, various businesses, etc. may use application [A] or the like to record the blockchain wallet address at the time of transfer in the blockchain 8a of the dedicated platform 8.
即ち、ステップS45では、例えば記録手段としてアプリケーション[A]9を用いて、要鑑定製品5に関わる複数のユーザ毎に保有する第1検証情報(ここではブロックチェーンウォレットアドレス)を、NFT情報と紐づけて、複数のユーザが関わる順番に沿って記録することができる。なお、ステップS45では、例えばアプリケーション[A]9の代わりに、ユーザの保有する端末2、72や、専用プラットフォーム8等が記録手段として用いられてもよい。また、記録手段が第1検証情報等の各種情報を記録する先は、ブロックチェーン8aのほか、例えば分散型ファイルサーバ3や、その他のデータベース等でもよい。
In other words, in step S45, for example, using application [A] 9 as a recording means, the first verification information (here, blockchain wallet address) held by each of multiple users related to the product to be authenticated 5 can be linked to the NFT information and recorded in the order in which the multiple users are involved. Note that in step S45, for example, the terminal 2, 72 held by the user or the dedicated platform 8 may be used as the recording means instead of application [A] 9. Furthermore, the destination where the recording means records various information such as the first verification information may be, in addition to the blockchain 8a, for example, the distributed file server 3 or other databases.
また、このステップS45において、物流企業は、要鑑定製品5とともに、このトランザクションハッシュ又は二次元コードを各種業者等又は専用プラットフォーム8(例えばマーケットプレイス)から受け取る。トランザクションハッシュ又は二次元コードを受け取った物流企業は、トランザクションハッシュ又は二次元コードを用いて、専用プラットフォーム8のブロックチェーン8aにアクセスし、そこに記録されている要鑑定製品5のNFT情報を読み出すことができる。
Also, in step S45, the logistics company receives this transaction hash or two-dimensional code from various businesses or the dedicated platform 8 (e.g., a marketplace) along with the product 5 requiring authentication. The logistics company that receives the transaction hash or two-dimensional code can use the transaction hash or two-dimensional code to access the blockchain 8a of the dedicated platform 8 and read the NFT information of the product 5 requiring authentication that is recorded there.
ステップS46に移行し、物流企業から消費者へと要鑑定製品5が移転する。このとき要鑑定製品5に付随する小型記録媒体(a1)、小型記録媒体(b)も同様に移転する。また、要鑑定製品5のNFT情報の所有者も同様に移転する。
The process proceeds to step S46, where the product to be authenticated 5 is transferred from the logistics company to the consumer. At this time, the small recording media (a 1 ) and small recording media (b) accompanying the product to be authenticated 5 are also transferred in the same manner. The owner of the NFT information of the product to be authenticated 5 is also transferred in the same manner.
移転する都度、その移転先の所有者のブロックチェーンウォレットアドレスを当該NFT情報と紐付けて記録されるため、新たに所有者のブロックチェーンウォレットアドレスがNFT情報に紐付けられて記録される。
Each time a transfer occurs, the blockchain wallet address of the new owner is linked to the NFT information and recorded, so the new owner's blockchain wallet address is linked to the NFT information and recorded.
また、このステップS46において、消費者は、要鑑定製品5とともに、このトランザクションハッシュ又は二次元コードを各種業者等又は専用プラットフォーム8
(例えばマーケットプレイス)から受け取る。トランザクションハッシュ又は二次元コードを受け取った消費者は、トランザクションハッシュ又は二次元コードを用いて、専用プラットフォーム8のブロックチェーン8aにアクセスし、そこに記録されている要鑑定製品5のNFT情報を読み出すことができる。 In step S46, the consumer also sends the transaction hash or the two-dimensional code together with theproduct 5 to be authenticated to various businesses or a dedicated platform 8.
The consumer who receives the transaction hash or the two-dimensional code can use the transaction hash or the two-dimensional code to access theblockchain 8a of the dedicated platform 8 and read the NFT information of the product 5 to be authenticated that is recorded therein.
(例えばマーケットプレイス)から受け取る。トランザクションハッシュ又は二次元コードを受け取った消費者は、トランザクションハッシュ又は二次元コードを用いて、専用プラットフォーム8のブロックチェーン8aにアクセスし、そこに記録されている要鑑定製品5のNFT情報を読み出すことができる。 In step S46, the consumer also sends the transaction hash or the two-dimensional code together with the
The consumer who receives the transaction hash or the two-dimensional code can use the transaction hash or the two-dimensional code to access the
このような消費者は、専用プラットフォーム8を介して要鑑定製品5の鑑定証明を試みることができる。以下、鑑定証明時の動作の一例としてステップS47を説明し、この鑑定証明を試みる消費者等のユーザを鑑定証明者という。
Such consumers can attempt to certify the authentication of the product 5 requiring authentication via the dedicated platform 8. Step S47 will be explained below as an example of the operation during authentication, and a user such as a consumer who attempts this authentication will be referred to as an authentication certifier.
ステップS47において、鑑定証明者は、先ず専用プラットフォーム8、ひいてはブロックチェーン8aへアクセスすることにより、ログへの書き込み作業を行う。このログへの書き込み作業は、アプリケーションのユーザインターフェース上から実現することができ、例えば鑑定証明者の氏名や生年月日等を始めとする個人情報やその他いかなる情報を、ユーザインターフェース上の誘導に沿って記入する。ユーザインターフェースの誘導が無くても、鑑定証明者から入力されるいかなる情報、或いは情報として意味を持たないいかなる文字列であっても、このログへの書き込み作業とみなしてよい。
In step S47, the authentication certifier first accesses the dedicated platform 8, and thus the blockchain 8a, to write to the log. This writing to the log can be realized from the user interface of the application, and for example, the authentication certifier's personal information such as the name and date of birth, and any other information, is entered by following the prompts on the user interface. Even if there is no prompting on the user interface, any information entered by the authentication certifier, or any character string that has no meaning as information, can be considered as writing to the log.
かかる場合において、鑑定証明者は、ブロックチェーンウォレットアドレスの割り当て時において、自らに対して秘密鍵が割り当てられている場合、この秘密鍵を介してログにアクセスするようにしてもよい。鑑定証明者が自らブロックチェーンアドレスを生成し、それを利用してもよいことは勿論である。秘密鍵を通じて署名した段階で、自動的にブロックチェーン8a上にてブロックチェーンウォレットアドレスを取得することができる。或いはこの秘密鍵をユーザインターフェース上において入力し、専用プラットフォーム8側において、その秘密鍵に対して割り当てられているブロックチェーンウォレットアドレスの有無を検証するようにしてもよい。その結果、秘密鍵に対してブロックチェーンウォレットアドレスが割り当てられていた場合、これに対して専用プラットフォーム8側において署名を行う。この署名がなされた場合を、ログの書き込み成功とし、それ以外はログの書き込み失敗とする。この署名はプログラムにより自動的に実行されるものであってもよい。
In such a case, if a private key is assigned to the authentication certifier when the blockchain wallet address is assigned, the authentication certifier may access the log via this private key. Of course, the authentication certifier may generate a blockchain address himself and use it. At the stage of signing using the private key, the blockchain wallet address can be automatically obtained on the blockchain 8a. Alternatively, this private key may be entered on a user interface, and the dedicated platform 8 may verify whether or not a blockchain wallet address has been assigned to that private key. As a result, if a blockchain wallet address has been assigned to the private key, a signature is made on the dedicated platform 8. If this signature is made, the log writing is deemed successful, otherwise the log writing is deemed unsuccessful. This signature may be automatically executed by a program.
ログの書き込みをするためには、例えば秘密鍵を通じて署名が必要になるように設定してもよい。署名をすると自動的にブロックチェーン8a上にてブロックチェーンウォレットアドレスを取得することができる。このため、ユーザインターフェース上で鑑定証明者に対してログの書き込みを促すことで、ブロックチェーンウォレットアドレスを得ることができる。例えば、秘密鍵を通じて公開鍵を特定することができ、この公開鍵を通じてブロックチェーンウォレットアドレスを取得できるようにしてもよい。
In order to write a log, it may be set so that a signature is required via a private key, for example. Once the signature is entered, the blockchain wallet address can be automatically obtained on the blockchain 8a. Therefore, the blockchain wallet address can be obtained by prompting the appraisal certifier to write a log on the user interface. For example, it may be possible to identify a public key via a private key, and to obtain the blockchain wallet address via this public key.
専用プラットフォーム8は、ブロックチェーンウォレットアドレスの所有者である旨を判断することができる。一方でログの書き込みに失敗した場合には、ブロックチェーンウォレットアドレスの所有者でない旨を判断することができる。ブロックチェーンウォレットアドレスの所有者である旨を判別した場合、その判別したブロックチェーンウォレットアドレス(以下、第2ブロックチェーンウォレットアドレス、又は第1署名情報という。)を読み出す。
The dedicated platform 8 can determine that it is the owner of the blockchain wallet address. On the other hand, if the log writing fails, it can determine that it is not the owner of the blockchain wallet address. If it determines that it is the owner of the blockchain wallet address, it reads out the determined blockchain wallet address (hereinafter referred to as the second blockchain wallet address or the first signature information).
なお、第2ブロックチェーンウォレットアドレスの取得方法は、上述した方法に限定されるものではなく、他のいかなる方法で取得するものであってもよい。この第2ブロックチェーンウォレットアドレスを取得する際には、この鑑定証明者から直接入力してもらうことで取得するようにしてもよい。
The method of acquiring the second blockchain wallet address is not limited to the above-mentioned method, and any other method may be used. When acquiring the second blockchain wallet address, it may be acquired by having the authentication certifier input it directly.
また、このステップS47において、鑑定証明者から取得したトランザクションハッシュ又はこれに応じた二次元コードに対応するNFT情報に紐付けられたブロックチェーンウォレットアドレスをブロックチェーン8aから読み出す。このブロックチェーン8aから読み出したブロックチェーンウォレットアドレスを、以下第1ブロックチェーンウォレットアドレス(又は第1検証情報)という。
In addition, in step S47, a blockchain wallet address linked to the NFT information corresponding to the transaction hash obtained from the authentication certifier or the corresponding two-dimensional code is read from the blockchain 8a. Hereinafter, the blockchain wallet address read from the blockchain 8a is referred to as the first blockchain wallet address (or first verification information).
次にこの第1ブロックチェーンウォレットアドレスと第2ブロックチェーンウォレットアドレスとの整合性を判別する。第1ブロックチェーンウォレットアドレスと第2ブロックチェーンウォレットアドレスとが同一であれば照合が終了する。照合の終了を通じて、要鑑定製品5が模造品でなく真正品であることを判別することができる。一方、第1ブロックチェーンウォレットアドレスと第2ブロックチェーンウォレットアドレスとが非同一であれば、鑑定証明者が要鑑定製品5の所有者ではないことを判別することができる。
Next, the consistency between the first blockchain wallet address and the second blockchain wallet address is determined. If the first blockchain wallet address and the second blockchain wallet address are identical, the matching is completed. Once the matching is completed, it can be determined that the product 5 to be authenticated is genuine and not a counterfeit. On the other hand, if the first blockchain wallet address and the second blockchain wallet address are not identical, it can be determined that the authentication certifier is not the owner of the product 5 to be authenticated.
その理由として、NFT情報の所有者が移転する都度、これに紐付けられて記録される第1ブロックチェーンウォレットアドレスが、真正品である旨の証拠となる。この第1ブロックチェーンウォレットアドレスと同一の第2ブロックチェーンウォレットアドレスの保有者が、現時点においてその真正品としての要鑑定製品5を保有している旨の証拠となる。このため、この第1ブロックチェーンウォレットアドレスと第2ブロックチェーンウォレットアドレスとの整合性を判別することで、要鑑定製品5の鑑定証明を行うことができる。
The reason for this is that each time the ownership of NFT information is transferred, the first blockchain wallet address that is linked to it and recorded serves as evidence that the product is genuine. This serves as evidence that the holder of the second blockchain wallet address, which is the same as this first blockchain wallet address, currently holds the authentic product 5. For this reason, by determining the consistency between this first blockchain wallet address and the second blockchain wallet address, it is possible to provide authentication proof for the product 5 to be authenticated.
例えば、ステップS47において読み出された第1ブロックチェーンアドレス等の第1検証情報は、複数のユーザのうち、要鑑定製品5に関わる最新のユーザが保有する第1署名情報に対して整合性を有する。この場合、ステップS47では、最新のユーザのみが鑑定証明者として鑑定証明を行うことができる。このため、現時点で要鑑定製品5を所有又は管理しているユーザの特定を容易に実現することが可能となる。
For example, the first verification information such as the first blockchain address read in step S47 has consistency with the first signature information held by the most recent user of the multiple users who is involved with the product 5 to be authenticated. In this case, in step S47, only the most recent user can perform authentication certification as the authentication certifier. This makes it easy to identify the user who currently owns or manages the product 5 to be authenticated.
なお、ステップS47において読み出された第1ブロックチェーンアドレス等の第1検証情報は、例えば複数のユーザのうち、要鑑定製品5に関わる最新のユーザよりも前に関わったユーザ(即ち過去のユーザ)が保有する第1署名情報に対して整合性を有する。この場合、ステップS47では、過去のユーザが鑑定証明者として鑑定証明を行うことができる。このため、要鑑定製品5に関わったことのあるユーザの特定を実現することが可能となる。
The first verification information such as the first blockchain address read in step S47 is consistent with the first signature information held by a user (i.e., a past user) who was involved with the product 5 before the most recent user among multiple users. In this case, in step S47, the past user can perform the authentication certification as an authentication certifier. This makes it possible to identify users who have been involved with the product 5.
なお、例えばステップS47は、要鑑定製品5の認証を満たしたユーザに対し、要鑑定製品5に関連する情報(例えばブロックチェーン8aに記録する際に用いられた製品情報や取引情報等)の少なくとも一部を閲覧する権限を与える処理を行ってもよい。
In addition, for example, step S47 may perform a process of granting a user who satisfies the authentication requirements of the product 5 to have the authority to view at least a portion of the information related to the product 5 to be authenticated (e.g., product information and transaction information used when recording in the blockchain 8a).
これに加えて、ステップS47では、例えば後述する鑑定証明を組み合わせて判断するようにしてもよい。
In addition, in step S47, the judgment may be made by combining, for example, the authentication certificate described below.
ステップS47では、鑑定証明者から取得したトランザクションハッシュ又はこれに応じた二次元コードに対応するNFT情報に紐付けられたトランザクションハッシュに基づいて第4ハッシュを生成する。この第4ハッシュの生成方法は、上述した第1ハッシュの生成方法と同様である。
In step S47, a fourth hash is generated based on the transaction hash obtained from the authentication certifier or the transaction hash associated with the NFT information corresponding to the corresponding two-dimensional code. The method of generating this fourth hash is the same as the method of generating the first hash described above.
また、ステップS47では、要鑑定製品5の小型記録媒体(a1)51aに記録された秘密鍵α1、製品情報、取引情報を含む情報、及び/又は、ギャランティカード24の小型記録媒体(b)52aに記録された秘密鍵β1、製品情報、取引情報を含む情報を読み取る。そして読み取った情報をブロックチェーン8aに記録する上で生成される第5ハッシュを得る。
In step S47, the information including the private key α 1 , product information, and transaction information recorded on the small recording medium (a 1 ) 51a of the product 5 to be authenticated, and/or the information including the private key β 1 , product information, and transaction information recorded on the small recording medium (b) 52a of the guarantee card 24 is read. Then, a fifth hash generated when recording the read information in the blockchain 8a is obtained.
次に、得られた第4ハッシュと第5ハッシュとに基づいて、新たに第6ハッシュを生成する。この第6ハッシュの生成方法は、上述した第3ハッシュの生成方法と同様である。
Next, a sixth hash is generated based on the obtained fourth hash and fifth hash. The method for generating this sixth hash is the same as the method for generating the third hash described above.
このようにして得られた第6ハッシュと第3ハッシュの整合性を判定する。
The consistency of the sixth hash and the third hash obtained in this way is then determined.
要鑑定製品5が真正品であれば、小型記録媒体(a1)51a、小型記録媒体(b)52aから読み取った情報をブロックチェーン8aに記録する上で生成される第5ハッシュは、第2ハッシュと同一になる。また鑑定証明者が真正品を保有しているのでれば、専用プラットフォーム8(例えばマーケットプレイス)から受け取るトランザクションハッシュ又は二次元コードに紐付けられるトランザクションハッシュに基づいて生成する第4ハッシュは、第1ハッシュと同一である。
If the product to be authenticated 5 is genuine, the fifth hash generated when recording the information read from the small recording medium (a 1 ) 51a and the small recording medium (b) 52a in the blockchain 8a will be the same as the second hash. Also, if the authentication certifier holds a genuine product, the fourth hash generated based on the transaction hash received from the dedicated platform 8 (e.g., a marketplace) or the transaction hash linked to the two-dimensional code will be the same as the first hash.
このため、このような第4ハッシュと第5ハッシュとに基づいて生成される第6ハッシュが第3ハッシュと同一であるか否かを介して、同様に要鑑定製品5が真正品であるか否かを判別することができる。具体的には、第6ハッシュを生成した後、これと同一の第3ハッシュがブロックチェーン8a上に格納されているか否かを検索する。このように、単なる第1ハッシュ、第2ハッシュのみならず、これらに基づいて生成した第3ハッシュを介して判別を行うことにより、より秘匿性を向上させることができる。これに加えて、ブロックチェーン8aに記録する時において、第1ハッシュ、第2ハッシュの2つを記録するのではなく、これらが反映された第3ハッシュを一つだけ記録すればよいことから、記録速度を向上させることができ、処理動作を高速化させることができる。
For this reason, it is possible to determine whether the product to be authenticated 5 is genuine or not based on whether the sixth hash generated based on the fourth hash and the fifth hash is identical to the third hash. Specifically, after the sixth hash is generated, a search is made to determine whether the same third hash is stored on the blockchain 8a. In this way, confidentiality can be improved by making the determination not only based on the first hash and second hash, but also based on the third hash generated based on these. In addition, when recording on the blockchain 8a, instead of recording both the first hash and the second hash, it is only necessary to record the third hash reflecting these, which can improve the recording speed and speed up the processing operation.
そして、本発明では、第1ブロックチェーンウォレットアドレスと第2ブロックチェーンウォレットアドレスとの整合性、及び第3ハッシュと第6ハッシュの整合性の双方を判定することにより、要鑑定製品5の鑑定証明を行うようにしてもよい。即ち、第1ブロックチェーンウォレットアドレスと第2ブロックチェーンウォレットアドレスとが同一であり、かつ第3ハッシュと第6ハッシュが同一であれば照合が終了する。照合の終了を通じて、要鑑定製品5が真正品である旨を判別する。これに対して、第1ブロックチェーンウォレットアドレスと第2ブロックチェーンウォレットアドレス、第3ハッシュと第6ハッシュの何れか一方又は両方が非同一の場合は、鑑定証明者が要鑑定製品5の所有者ではないことを判別することができる。
In the present invention, the authentication of the product 5 to be authenticated may be certified by determining both the consistency between the first and second blockchain wallet addresses, and the consistency between the third hash and the sixth hash. That is, if the first and second blockchain wallet addresses are identical and the third hash and the sixth hash are identical, the matching is completed. Upon completion of the matching, it is determined that the product 5 to be authenticated is genuine. On the other hand, if either or both of the first and second blockchain wallet addresses, or the third hash and the sixth hash are not identical, it can be determined that the authentication certifier is not the owner of the product 5 to be authenticated.
このように本発明では、第1ブロックチェーンウォレットアドレスと第2ブロックチェーンウォレットアドレスとの整合性、及び第3ハッシュと第6ハッシュの整合性という全く異なる方式に基づいて鑑定証明を行うことができる。このため、何れか一方の方式の鑑定証明をうまく潜り抜けて真正品と判定されたとしても、他方の方式の鑑定証明で偽造品と判定された場合、その要鑑定製品5については真正品とは判別されないものとなる。このように、要鑑定製品5のうち、より強固に鑑定証明を行う物品についてより高度な鑑定証明精度の下で実現できる。
In this way, in the present invention, authentication can be performed based on completely different methods, namely, the consistency between the first blockchain wallet address and the second blockchain wallet address, and the consistency between the third hash and the sixth hash. Therefore, even if a product 5 requiring authentication is determined to be genuine by successfully circumventing one of the authentication methods, if it is determined to be a counterfeit by the other authentication method, the product 5 will not be determined to be genuine. In this way, it is possible to achieve a higher level of authentication accuracy for products requiring authentication 5 that require stronger authentication.
なお、上述したステップS43~S47は、アプリケーション[A]9及びアプリケーション[B]11を用いて実施されるほか、例えば少なくとも一部については、専用プラットフォーム8を用いて実施されてもよい。
Note that the above-mentioned steps S43 to S47 may be performed using application [A] 9 and application [B] 11, or, for example, at least a part of them may be performed using a dedicated platform 8.
上記のほか、例えば鑑定証明方法は、第3ハッシュと第6ハッシュとを生成せずに、鑑定証明を行ってもよい。この場合、鑑定証明には、第2~第4検証情報、及び第2~第4署名情報が用いられる。各検証情報及び各署名情報は、例えばハッシュ形式の情報を含むほか、ハッシュ形式の情報を暗号化又は電子署名化(以下、暗号化等として説明)の処理を実施した情報を含んでもよい。なお、各検証情報及び各署名情報は、例えば暗号化等に用いられる秘密鍵、及び公開鍵の少なくとも何れかを含んでもよい。
In addition to the above, for example, the authentication certification method may perform authentication certification without generating the third hash and the sixth hash. In this case, the second to fourth verification information and the second to fourth signature information are used for the authentication certification. Each piece of verification information and each piece of signature information may include, for example, information in hash format, or may include information obtained by encrypting or digitally signing information in hash format (hereinafter referred to as encryption, etc.). Note that each piece of verification information and each piece of signature information may include at least one of a private key and a public key used for encryption, etc.
この場合、例えば図13に示すように、ステップS43の変形例であるステップS43aでは、要鑑定製品5の小型記録媒体(a1)51aに記録された秘密鍵α1、製品情報、及び取引情報の少なくとも何れかを含む情報に基づく第2検証情報を、ブロックチェーン8aに記録する。第2検証情報は、秘密鍵α1、製品情報、及び取引情報の少なくとも何れかを含む情報を示すほか、製品情報、及び取引情報の少なくとも何れかを含む情報に対して秘密鍵α1を用いて暗号化等の処理を実施した情報を示してもよい。上記のほか、第2検証情報は、例えば秘密鍵α1、製品情報、及び取引情報の少なくとも何れかを、ブロックチェーン8aに記録する上で得られるハッシュ形式の情報、又はハッシュに対して暗号化等の処理を実施した情報を示してもよい。
In this case, as shown in FIG. 13, for example, in step S43a, which is a modified example of step S43, second verification information based on information including at least one of the private key α 1 , product information, and transaction information recorded in the small recording medium (a 1 ) 51a of the product 5 to be inspected is recorded in the blockchain 8a. The second verification information may indicate information including at least one of the private key α 1 , product information, and transaction information, or may indicate information obtained by performing processing such as encryption on information including at least one of the product information and transaction information using the private key α 1. In addition to the above, the second verification information may indicate information in a hash format obtained when recording at least one of the private key α 1 , product information, and transaction information in the blockchain 8a, or information obtained by performing processing such as encryption on the hash.
また、ステップS43aでは、例えばギャランティカード24の小型記録媒体(b)52aに記録された秘密鍵β1、製品情報、及び取引情報の少なくとも何れかを含む情報に基づく第3検証情報を、ブロックチェーン8aに記録する。第3検証情報は、秘密鍵β1、製品情報、及び取引情報の少なくとも何れかを含む情報を示すほか、製品情報、及び取引情報の少なくとも何れかを含む情報に対して秘密鍵β1を用いて暗号化等を実施した情報を示してもよい。上記のほか、第3検証情報は、例えば秘密鍵β1、製品情報、及び取引情報の少なくとも何れかを、ブロックチェーン8aに記録する上で得られるハッシュ形式の情報、又はハッシュに対して暗号化等の処理を実施した情報を示してもよい。
In step S43a, third verification information based on information including at least one of the private key β1 , product information, and transaction information recorded in the small recording medium (b) 52a of the guarantee card 24 is recorded in the blockchain 8a. The third verification information may indicate information including at least one of the private key β1 , product information, and transaction information, or may indicate information obtained by encrypting or otherwise processing the product information and at least one of the transaction information using the private key β1 . In addition to the above, the third verification information may indicate information in a hash format obtained when recording at least one of the private key β1 , product information, and transaction information in the blockchain 8a, or information obtained by encrypting or otherwise processing the hash.
また、ステップS43aでは、例えばトランザクションハッシュに基づき生成された第4検証情報を、上記ブロックチェーンに記録する。第4検証情報は、トランザクションハッシュを示すほか、例えばトランザクションハッシュに対して暗号化等を実施した情報を示してもよい。なお、第4検証情報は、例えばトランザクションハッシュに応じた二次元コードに基づき生成されてもよい。
Furthermore, in step S43a, fourth verification information generated, for example, based on the transaction hash is recorded in the blockchain. The fourth verification information may indicate the transaction hash, or may indicate, for example, information obtained by encrypting the transaction hash. Note that the fourth verification information may be generated, for example, based on a two-dimensional code corresponding to the transaction hash.
なお、ステップS43aは、アプリケーション[A]9を用いて実施することができるほか、例えば少なくとも一部の処理に対して専用プラットフォーム8を用いて実施することができる。
Note that step S43a can be performed using application [A] 9, or, for example, can be performed using a dedicated platform 8 for at least a portion of the processing.
その後、上述したステップS44を実施せずに、ステップS47の変形例であるステップS47aにおいて、例えば鑑定証明者から取得した要鑑定製品5の小型記録媒体(a1)51aに記録された秘密鍵α1、製品情報、取引情報の少なくとも何れかを含む情報に基づく第2署名情報を取得する。第2署名情報は、製品情報、及び取引情報の少なくとも何れかを含む情報を示すほか、例えば製品情報、及び取引情報の少なくとも何れかの情報を読取り、読み取った情報をブロックチェーン8aに記録する上で生成されるハッシュ形式の情報等を示してもよい。なお、第2署名情報は、例えば上述した第5ハッシュと同様の生成方法を実施することで取得してもよい。
Then, without performing step S44 described above, in step S47a, which is a modified example of step S47, second signature information is obtained based on information including at least one of the private key α 1 , product information, and transaction information recorded in the small recording medium (a 1 ) 51a of the product 5 to be authenticated obtained from the authentication certifier, for example. The second signature information may indicate information including at least one of the product information and transaction information, or may indicate information in a hash format generated when reading at least one of the product information and transaction information and recording the read information in the blockchain 8a. Note that the second signature information may be obtained by performing a generation method similar to that of the fifth hash described above, for example.
また、ステップS47aでは、例えば鑑定証明者から取得したギャランティカード24の小型記録媒体(b)52aに記録された秘密鍵β1、製品情報、及び取引情報の少なくとも何れかを含む情報に基づく第3署名情報を取得する。第3署名情報は、製品情報、及び取引情報の少なくとも何れかを含む情報を示すほか、例えば製品情報、及び取引情報の少なくとも何れかの情報を読取り、読み取った情報をブロックチェーン8aに記録する上で生成されるハッシュ形式の情報等を示してもよい。なお、第3署名情報は、例えば上述した第5ハッシュと同様の生成方法を実施することで取得してもよい。
In step S47a, third signature information is obtained based on information including at least one of the private key β1 , product information, and transaction information recorded in the small recording medium (b) 52a of the guarantee card 24 obtained from the appraisal certifier. The third signature information may indicate information including at least one of the product information and transaction information, or may indicate information in a hash format generated when reading at least one of the product information and transaction information and recording the read information in the blockchain 8a. The third signature information may be obtained by implementing a generation method similar to that of the fifth hash described above.
また、ステップS47aでは、例えば鑑定証明者から取得したトランザクションハッシュ又はこれに応じた二次元コードに基づく第4署名情報を取得する。なお、第4署名情報は、例えば上述した第4ハッシュと同様の生成方法を実施することで取得してもよい。
Furthermore, in step S47a, fourth signature information is obtained, for example, based on the transaction hash obtained from the authentication certifier or a two-dimensional code corresponding thereto. Note that the fourth signature information may be obtained, for example, by implementing a generation method similar to that of the fourth hash described above.
その後、ステップS47aでは、第2検証情報と第2署名情報との整合性、第3検証情報と第3署名情報との整合性、及び第4検証情報と第4署名情報との整合性の少なくとも何れかを判定する。なお、各検証情報と署名情報との整合性は、例えば同一形式の情報(例えばハッシュ形式の情報)を対象として判定するほか、一方がハッシュ形式の情報、他方が暗号化等の処理を実施した情報を対象として判定してもよい。何れの場合においても、公知の技術を用いて判定することができる。また、各署名情報と各検証情報との整合性の判定方法として、例えば各署名情報を取得した後、これと同一の検証情報がブロックチェーン8a上に記憶されているか否かを検索した結果に基づき、同一か否かを判定してもよい。
Then, in step S47a, at least one of the consistency between the second verification information and the second signature information, the consistency between the third verification information and the third signature information, and the consistency between the fourth verification information and the fourth signature information is determined. Note that the consistency between each piece of verification information and the signature information may be determined, for example, for information of the same format (e.g., information in hash format), or may be determined for one piece of information in hash format and the other piece of information that has been encrypted or otherwise processed. In either case, the determination may be made using known technology. As a method for determining the consistency between each piece of signature information and each piece of verification information, for example, after acquiring each piece of signature information, a search may be performed to determine whether the same verification information is stored on the blockchain 8a, and then whether they are identical.
この際、例えば第1検証情報と第1署名情報との比較結果、第3検証情報と第3署名情報との比較結果、及び第4検証情報と第4署名情報との比較結果のうち、少なくとも何れかが整合性を有し、且つ、第2検証情報と第2署名情報との比較結果が整合性を有することで、要鑑定製品5の認証を満たす(即ち真正品)としてもよい。これにより、鑑定証明に用いられる情報のうち一部の情報に不具合が発生した場合においても、他の情報を用いた要鑑定製品5の認証を実現することができ、用途の可能性を広げることが可能となる。
In this case, for example, if at least one of the results of the comparison between the first verification information and the first signature information, the results of the comparison between the third verification information and the third signature information, and the results of the comparison between the fourth verification information and the fourth signature information are consistent, and if the results of the comparison between the second verification information and the second signature information are consistent, the product to be authenticated 5 may be deemed to be a genuine product. As a result, even if a problem occurs with some of the information used for authentication certification, authentication of the product to be authenticated 5 can be achieved using other information, making it possible to expand the possibilities for use.
なお、ステップS47aは、アプリケーション[B]11を用いて実施することができるほか、例えば少なくとも一部の処理に対して専用プラットフォーム8を用いて実施することができる。
Note that step S47a can be performed using application [B] 11, or, for example, can be performed using a dedicated platform 8 for at least a portion of the processing.
上述した実施形態における鑑定証明システム1によれば、デジタル財を対象とした鑑定証明を行う場合においても、信頼性の高い鑑定証明を行うことが可能となる。また、上述した実施形態における鑑定証明方法は、例えば鑑定証明システム1の各構成を用いて実施することができ、デジタル財を対象とした鑑定証明を行う場合においても、信頼性の高い鑑定証明を行うことが可能となる。
According to the authentication certification system 1 in the above-described embodiment, highly reliable authentication certification can be performed even when authentication certification is performed for digital goods. Furthermore, the authentication certification method in the above-described embodiment can be implemented, for example, using each component of the authentication certification system 1, and highly reliable authentication certification can be performed even when authentication certification is performed for digital goods.
なお、上述した端末2、72、分散型ファイルサーバ3、専用プラットフォーム8、アプリケーション[A]9、アプリケーション[B]11等の電子機器は、例えばCPU(Central Processing Unit)等のプロセッサ、RAM(Random Access Memory)、及びROM(Read Only Memory)を備え、上述した各種処理を実行する。また、上記電子機器は、HDD(Hard Disk Drive)等のデータ保存装置を備え、各種情報を保存する。
The electronic devices such as the terminals 2, 72, distributed file server 3, dedicated platform 8, application [A] 9, and application [B] 11 described above each have a processor such as a CPU (Central Processing Unit), a RAM (Random Access Memory), and a ROM (Read Only Memory), and execute the various processes described above. The electronic devices also have a data storage device such as a HDD (Hard Disk Drive), and store various types of information.
以上、本発明の実施形態を説明したが、この実施形態は例として提示したものであり、発明の範囲を限定することは意図していない。このような新規な実施形態は、その他の様々な形態で実施されることが可能であり、発明の要旨を逸脱しない範囲で、種々の省略、置き換え、変更を行うことができる。この実施形態やその変形は、発明の範囲や要旨に含まれるとともに、特許請求の範囲に記載された発明とその均等の範囲に含まれる。
Although an embodiment of the present invention has been described above, this embodiment is presented as an example and is not intended to limit the scope of the invention. Such a novel embodiment can be embodied in various other forms, and various omissions, substitutions, and modifications can be made without departing from the gist of the invention. This embodiment and its variations are included in the scope and gist of the invention, and are included in the scope of the invention and its equivalents described in the claims.
1 鑑定証明システム
2、72 端末
3 分散型ファイルサーバ
5 要鑑定製品
8 専用プラットフォーム
8a ブロックチェーン
8b ブロックチェーンデータ
10 公衆通信網
24 ギャランティカード
25 リーダー
43 ブロックチェーンウォレット 1Authentication certification system 2, 7 2 Terminal 3 Distributed file server 5 Product to be authenticated 8 Dedicated platform 8a Blockchain 8b Blockchain data 10 Public communication network 24 Guarantee card 25 Reader 43 Blockchain wallet
2、72 端末
3 分散型ファイルサーバ
5 要鑑定製品
8 専用プラットフォーム
8a ブロックチェーン
8b ブロックチェーンデータ
10 公衆通信網
24 ギャランティカード
25 リーダー
43 ブロックチェーンウォレット 1
Claims (10)
- 要鑑定製品のデジタル財データに基づいて上記要鑑定製品に個別に割り当てられるハッシュ化された識別子を生成する分散型ファイルサーバと、
上記識別子に紐付けた上記要鑑定製品のNFT情報をブロックチェーン上に記録すると共に生成されるトランザクションハッシュ又はこれに応じた二次元コードを出力する専用プラットフォームと、
上記要鑑定製品に関わる複数のユーザ毎に保有する第1検証情報を、上記NFT情報と紐付けて、複数の上記ユーザが関わる順番に沿って記録する記録手段と、
を備え、
鑑定証明時において、
鑑定証明者から取得したトランザクションハッシュ又はこれに応じた二次元コードに対応するNFT情報に紐付けられた上記第1検証情報を読み出し、
読み出した上記第1検証情報と、
上記鑑定証明者が保有する第1署名情報と
の整合性を判定することにより、上記要鑑定製品の鑑定証明を行うこと
を特徴とする鑑定証明システム。 A distributed file server that generates a hashed identifier that is individually assigned to the product to be authenticated based on the digital property data of the product to be authenticated;
A dedicated platform that records the NFT information of the product to be authenticated linked to the identifier on a blockchain and outputs a generated transaction hash or a two-dimensional code corresponding thereto;
A recording means for linking first verification information held by each of a plurality of users related to the product to be authenticated with the NFT information and recording the first verification information in the order in which the plurality of users are involved;
Equipped with
At the time of appraisal certification,
reading the first verification information linked to the NFT information corresponding to the transaction hash or the two-dimensional code corresponding thereto obtained from the authentication certifier;
the read first verification information;
The authentication and certification system performs authentication and certification of the product requiring authentication by determining consistency with first signature information held by the authentication and certifier. - 上記鑑定証明時において読み出された上記第1検証情報は、複数の上記ユーザのうち、上記要鑑定製品に関わる最新のユーザよりも前に関わったユーザが保有する第1署名情報に対して整合性を有すること
を特徴とする請求項1記載の鑑定証明システム。 The authentication certification system according to claim 1, characterized in that the first verification information read out during the authentication certification is consistent with first signature information held by a user among the multiple users who was involved in the product to be authenticated before the most recent user. - 上記鑑定証明時において読み出された上記第1検証情報は、複数の上記ユーザのうち、上記要鑑定製品に関わる最新のユーザが保有する第1署名情報に対して整合性を有すること
を特徴とする請求項1記載の鑑定証明システム。 2. The authentication certification system according to claim 1, wherein the first verification information read out during the authentication certification is consistent with the first signature information held by the latest user, among the plurality of users, who is involved in the product to be authenticated. - 上記第1検証情報は、
上記ユーザが保有するブロックチェーンウォレットアドレス、
上記ブロックチェーンウォレットアドレスを生成する際に用いる公開鍵、及び
上記ブロックチェーンウォレットアドレスを生成する際に用いる秘密鍵
の少なくとも何れかを示すこと
を特徴とする請求項1記載の鑑定証明システム。 The first verification information is
The blockchain wallet address held by the above user,
The authentication certification system of claim 1, characterized in that it indicates at least one of: a public key used when generating the blockchain wallet address; and a private key used when generating the blockchain wallet address. - 複数の上記ユーザは、消費者、製造メーカー・製造者・著作者及び各種業者の少なくとも何れかを含み、
秘密鍵α1、及び上記要鑑定製品に関する製品情報を記録した小型記録媒体(a1)が貼着又は組み込まれた上記要鑑定製品と、上記専用プラットフォームより出力されて生成される上記トランザクションハッシュ又は上記二次元コードとを用いて更なる鑑定証明が行われ、
上記製品情報、及び上記要鑑定製品が上記消費者へ渡るまでの各流通段階における取引情報を、上記製造メーカー・製造者・著作者及び各種業者の少なくとも何れかが、上記ブロックチェーンに記録するために使用されるアプリケーション[A]と、
上記鑑定証明者が、上記製品情報及び上記取引情報を、上記ブロックチェーンから読み出すために使用されるアプリケーション[B]と、
を更に備え、
上記専用プラットフォームは、上記製造メーカー・製造者・著作者及び各種業者の少なくとも何れかが、上記アプリケーション[A]を用いて、上記製品情報及び/又は上記取引情報に基づき取得した第2検証情報を上記ブロックチェーン上に記録し、
上記鑑定証明時において、
上記鑑定証明者が、上記要鑑定製品に付与された上記秘密鍵α1を使用し、上記アプリケーション[B]を用いて、上記製品情報及び上記取引情報に基づいて上記ブロックチェーンから読み出された第2署名情報と、
上記第2検証情報と
の整合性を判定することにより、上記要鑑定製品の鑑定証明を行うこと
を特徴とする請求項1~4のうち何れか1項記載の鑑定証明システム。 The plurality of users include at least one of consumers, manufacturers, creators, and various traders,
Further authentication is performed using the private key α 1 , the product to be authenticated to which a small recording medium (a 1 ) recording product information related to the product to be authenticated is attached or incorporated, and the transaction hash or the two-dimensional code output and generated from the dedicated platform,
An application [A] used by at least one of the manufacturer, manufacturer, author, and various traders to record the product information and transaction information at each distribution stage until the product to be authenticated is delivered to the consumer in the blockchain;
an application [B] used by the authentication certifier to read the product information and the transaction information from the blockchain;
Further comprising:
The dedicated platform records second verification information obtained by at least one of the manufacturer, manufacturer, author, and various traders using the application [A] based on the product information and/or the transaction information on the blockchain;
At the time of the above appraisal,
The authentication certifier uses the private key α1 assigned to the authentication-required product and the application [B] to read second signature information from the blockchain based on the product information and the transaction information;
The authentication and certification system according to any one of claims 1 to 4, characterized in that the authentication and certification of the product requiring authentication is performed by determining consistency with the second verification information. - 秘密鍵β1、及び上記製品情報を記録した小型記録媒体(b)が貼着又は組み込まれたギャランティカードと、上記専用プラットフォームより出力されて生成される上記トランザクションハッシュ又は上記二次元コードとを用いて更なる鑑定証明が行われ、
上記専用プラットフォームは、上記製造メーカー・製造者・著作者及び各種業者の少なくとも何れかが、上記アプリケーション[A]を用いて、上記製品情報及び/又は上記取引情報に基づき取得した第3検証情報を上記ブロックチェーン上に記録し、
上記鑑定証明時において、
上記鑑定証明者が、上記ギャランティカードに付与された上記秘密鍵β1を使用し、上記アプリケーション[B]を用いて、上記製品情報及び上記取引情報に基づいて上記ブロックチェーンから読み出された第3署名情報と、
上記第3検証情報と
の整合性を判定することにより、上記要鑑定製品の鑑定証明を行うこと
を特徴とする請求項5記載の鑑定証明システム。 Further authentication is performed using the private key β 1 and a guarantee card to which the small recording medium (b) recording the product information is attached or embedded, and the transaction hash or the two-dimensional code output and generated by the dedicated platform,
The dedicated platform records third verification information obtained by at least one of the manufacturer, manufacturer, author, and various traders using the application [A] based on the product information and/or the transaction information on the blockchain;
At the time of the above appraisal,
Third signature information read from the blockchain by the authentication certifier using the private key β1 assigned to the guarantee card and the application [B] based on the product information and the transaction information; and
6. The authentication certification system according to claim 5, wherein the authentication certification of the product requiring authentication is performed by determining consistency with the third verification information. - 上記専用プラットフォームは、上記トランザクションハッシュ又はこれに応じた二次元コードに基づき取得された第4検証情報を、上記ブロックチェーンに記録し、
上記鑑定証明時において、
上記鑑定証明者から取得したトランザクションハッシュ又はこれに応じた二次元コードに基づき取得された第4署名情報と、
上記第4検証情報と、
の整合性を判定することにより、上記要鑑定製品の鑑定証明を行うこと
を特徴とする請求項6記載の鑑定証明システム。 The dedicated platform records the fourth verification information obtained based on the transaction hash or the corresponding two-dimensional code in the blockchain;
At the time of the above appraisal,
fourth signature information obtained based on the transaction hash obtained from the authentication certifier or a two-dimensional code corresponding thereto;
The fourth verification information; and
7. The authentication certification system according to claim 6, further comprising: a verification unit for verifying the authentication-required product by determining the consistency of the above-mentioned. - 上記鑑定証明時において、
上記第1検証情報と上記第1署名情報との比較結果、
上記第3検証情報と上記第3署名情報との比較結果、及び
上記第4検証情報と上記第4署名情報との比較結果
のうち、少なくとも何れかが整合性を有し、且つ、
上記第2検証情報と上記第2署名情報との比較結果が整合性を有する
ことで、上記要鑑定製品の認証を満たすこと
を特徴とする請求項7記載の鑑定証明システム。 At the time of the above appraisal,
a comparison result between the first verification information and the first signature information;
At least one of the comparison result between the third verification information and the third signature information and the comparison result between the fourth verification information and the fourth signature information has consistency, and
8. The authentication certification system according to claim 7, wherein a comparison result between said second verification information and said second signature information is consistent, thereby satisfying the authentication of said product requiring authentication. - 上記専用プラットフォームは、上記トランザクションハッシュをそのまま上記第4検証情報とし、
鑑定証明時において、上記鑑定証明者から取得したトランザクションハッシュをそのまま上記第4署名情報とすること
を特徴とする請求項8記載の鑑定証明システム。 The dedicated platform uses the transaction hash as the fourth verification information,
9. The authentication and certification system according to claim 8, wherein, during authentication and certification, a transaction hash obtained from the authentication certifier is used as the fourth signature information as is. - 分散型ファイルサーバを用いて、要鑑定製品のデジタル財データに基づいて上記要鑑定製品に個別に割り当てられるハッシュ化された識別子を生成し、
専用プラットフォームを用いて、上記識別子に紐づけた上記要鑑定製品のNFT情報をブロックチェーン上に記録すると共に生成されるトランザクションハッシュ又はこれに応じた二次元コードを出力し、
記録手段を用いて、上記要鑑定製品に関わる複数のユーザ毎に保有する第1検証情報を、上記NFT情報と紐づけて、複数の上記ユーザが関わる順番に沿って記録し、
鑑定証明時において、
鑑定証明者から取得したトランザクションハッシュ又はこれに応じた二次元コードに対応するNFT情報に紐づけられた上記第1検証情報を、上記記録手段を読み出し、
読み出した上記第1検証情報と、上記鑑定証明者が保有する第1署名情報との整合性を判定することにより、
上記要鑑定製品の鑑定証明を行うこと
を特徴とする鑑定証明方法。
generating a hashed identifier, which is individually assigned to the product to be authenticated, based on the digital property data of the product to be authenticated, using a distributed file server;
Using a dedicated platform, record the NFT information of the product to be authenticated linked to the identifier on a blockchain and output a generated transaction hash or a two-dimensional code corresponding thereto;
Using a recording means, the first verification information held by each of the plurality of users related to the product to be authenticated is linked to the NFT information, and recorded in the order in which the plurality of users are involved;
At the time of appraisal certification,
The first verification information linked to the NFT information corresponding to the transaction hash or the two-dimensional code corresponding thereto obtained from the authentication certifier is read from the recording means;
By judging the consistency between the read first verification information and the first signature information held by the authentication certifier,
A method for authentication, characterized in that authentication is performed for the above-mentioned product requiring authentication.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2023547515A JP7367270B1 (en) | 2023-05-10 | 2023-05-10 | Appraisal certification system and appraisal certification method |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2024232035A1 true WO2024232035A1 (en) | 2024-11-14 |
Family
ID=
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11720907B2 (en) | Blockchain-based product authentication system | |
US11941644B2 (en) | Method of providing real asset authentication service using decentralized identifier and non-fungible token | |
JP6756817B2 (en) | Systems and methods for decentralized title recording and authentication | |
JP6959618B2 (en) | Systems and methods for authenticating document information | |
US10412071B2 (en) | Secure transaction systems and methods | |
US20210383377A1 (en) | Decentralized identity verification platforms | |
US20190251576A1 (en) | Tracking and verifying authenticity of an asset via a distributed ledger | |
CN112106324A (en) | Methods, computer program products and devices for creating, registering and verifying digitally stamped assets | |
US20160098723A1 (en) | System and method for block-chain verification of goods | |
Boehm et al. | Holistic tracking of products on the blockchain using NFC and verified users | |
KR20210058608A (en) | History management method, apparatus and program for preventing fake using blockchain | |
CN106656511A (en) | Method and system for uniformly managing identity endorsement | |
CN117426073A (en) | Trusted chain of custody for verifiable credentials | |
US20210090011A1 (en) | Identifying and Tracking System for Searching Items | |
WO2024232035A1 (en) | System and method for authentication certification | |
WO2024232302A1 (en) | Authenticity certification system and authenticity certification method | |
JP7477937B1 (en) | Appraisal and certification system and appraisal and certification method | |
JP7367270B1 (en) | Appraisal certification system and appraisal certification method | |
WO2024232081A1 (en) | Appraisal certification system and appraisal certification method | |
JP7371301B2 (en) | Product authentication system and method | |
Dalla Preda et al. | Exploring NFT Validation through Digital Watermarking | |
WO2024232407A1 (en) | Appraisal certification system | |
KR20210058091A (en) | Method for providing history management system by assigning authentication mark and blockchain-based fake prevention | |
KR20210058092A (en) | Blockchain-based transaction history management method with transactor authentication using eid | |
WO2024232405A1 (en) | Physically-distributed product authenticity certification system |