WO2021040359A1 - Procédé et système de gestion de visiteurs et système mettant en œuvre un code qr - Google Patents
Procédé et système de gestion de visiteurs et système mettant en œuvre un code qr Download PDFInfo
- Publication number
- WO2021040359A1 WO2021040359A1 PCT/KR2020/011274 KR2020011274W WO2021040359A1 WO 2021040359 A1 WO2021040359 A1 WO 2021040359A1 KR 2020011274 W KR2020011274 W KR 2020011274W WO 2021040359 A1 WO2021040359 A1 WO 2021040359A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- code
- authentication
- virtual
- server
- time
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
Definitions
- the present invention relates to a method and apparatus for managing a visitor using a QR code generated based on a virtual code for authentication.
- OTP One Time Password
- the OTP authentication method is a system introduced to reinforce security, and because a one-time password is generated each time a login is performed to perform user authentication, it is possible to overcome a security vulnerability caused by repeated use of the same password.
- the problem to be solved by the present invention is to provide a visitor management method and system that enables a visitor who cannot use a network to perform visitor authentication by generating a disposable QR code.
- the problem to be solved by the present invention is to provide a visitor management method and system capable of preventing an administrator from performing visitor authentication by stealing a QR code.
- the problem to be solved by the present invention is to provide a visitor management method and system capable of preventing leakage of visitor information to others.
- the present invention for solving the above process, the QR code verification module receiving a QR code generated from the QR code generation module, the QR code verification module extracting a virtual code for authentication from the QR code, the A QR code verification module verifying a QR code based on the authentication virtual code, and the QR code verification module matching the receiving time of the QR code and the authentication virtual code and storing the QR code.
- the code provides a visitor management method using a QR code generated based on a virtual code for authentication generated through a virtual code generation function for authentication included in the QR code generation module.
- the present invention provides a user authentication program using a virtual code for authentication, stored in a medium in order to execute the visitor management method using the QR code in combination with a computer as hardware.
- the present invention using a detailed code generation unit that generates one or more detailed codes based on user information registered in the QR code generation device, and a virtual code generation function for authentication, a virtual authentication for authentication in which the one or more detailed codes are combined.
- a QR code generation device for visitor authentication comprising a virtual code generation unit for generating a code, a QR code generation unit for generating a QR code based on the virtual code for authentication, and a QR code providing unit for outputting the QR code.
- a QR code receiving unit for receiving a QR code
- a virtual code extraction unit for extracting a virtual code for authentication from the QR code
- a QR code verification unit for verifying the QR code based on the virtual code for authentication
- a virtual code storage unit that matches and stores the authentication virtual code and the reception time of the QR code, or at a request from the server, or at a preset time interval, the stored authentication virtual code and the QR code reception time to the server. It provides a QR code verification device for visitor authentication including a transmitting virtual code providing unit.
- a virtual code receiving unit for receiving a reception point of the stored QR code matched to the plurality of authentication virtual codes and the plurality of authentication virtual codes from the QR code verification module, in each of the plurality of authentication virtual codes
- a detailed code extracting unit for extracting at least one detailed code
- a storage location search unit for searching a storage location of user information corresponding to each of the plurality of authentication virtual codes, based on the at least one detailed code
- the server provides a server for authenticating a visitor that matches and stores the location information corresponding to the QR code reception time and the QR code verification module in the storage location.
- 1 is a conceptual diagram showing a QR code.
- FIG. 2 is a block diagram of a visitor management system using a QR code according to an embodiment of the present invention.
- FIG. 3 is a block diagram of a QR code generating device according to an embodiment of the present invention.
- FIG. 4 is a block diagram of a QR code verification device according to an embodiment of the present invention.
- FIG. 5 is a configuration diagram of a server according to an embodiment of the present invention.
- 6 and 7 are flowcharts of a visitor management method using a virtual code for authentication according to an embodiment of the present invention.
- FIG. 8 is an exemplary diagram of a storage location search algorithm for searching a storage location of user information through a k-shaped cloud movement according to an embodiment of the present invention.
- FIG. 9 is an exemplary view for explaining verification of a virtual code for authentication according to an embodiment of the present invention.
- FIG. 10 is an exemplary diagram of a storage location search algorithm for searching a storage location of user information by moving on a track based on a detailed code according to an embodiment of the present invention.
- FIG. 11 is an exemplary diagram illustrating a storage space of a server according to an embodiment of the present invention.
- 'visitor authentication' refers to an act of providing a QR code to a QR code verification means as a procedure for verifying the identity of a user when a user visits a specific place or passes through a specific area.
- characters'character' is a constituent element constituting a code, and includes all or at least one of uppercase letters, lowercase letters, numbers, and special characters.
- 'code' means a character string in which characters are listed.
- the'virtual code for authentication' is a code generated by the virtual code generation means for authentication, and means a code used to perform user authentication by the virtual code verification means for authentication. That is, the'virtual code for authentication' refers to a virtual code temporarily assigned for each unit count so that user information can be extracted and verified.
- the'detail code' means a partial code included in the virtual code for authentication.
- the'unit count' is a unit defined as being set at a specific time interval and changing as the time interval elapses. For example, 1 count may be set and used at a specific time interval (eg, 1.5 seconds).
- the'authentication virtual code generation function' means a function used to generate the authentication virtual code.
- cloud movement means that the object rotates while performing a translational motion. That is,'cloud movement' refers to moving while performing a rotational motion and a translational motion together, and means that each point of a rotating object moves while in turn contacting the moving axis.
- 'UID user identification
- UID user identification
- the'storage location' means a point (count) on a track corresponding to a time point at which user information registration is requested by a user.
- 'user information' means information that can identify a user.
- 'user information' may include personal information (eg, name, phone number, resident registration number, etc.) of a user who owns a terminal generating a QR code to be described later.
- the'user information' may include user identification information (eg, UID to be described later) used to generate a virtual code included in the QR code.
- 1 is a conceptual diagram showing a QR code.
- QR Quick Response
- the QR code can contain a maximum of 7089 characters, a maximum of 4296 characters (ASDII), and a maximum of 1817 Asian characters such as Chinese characters.
- the QR code can be freely generated by the QR code generation program.
- the QR code generation program may receive letters and numbers and generate a QR code based on them.
- the generated QR code may be printed through a separate printing means, or may be displayed through a display unit included in a terminal having a built-in QR code generation program.
- the QR code can be generated by installing a QR code generation program in an existing terminal without having to separately provide a QR code generation device.
- the printed QR code or the QR code displayed on the display may be transmitted to the QR code verification means by the QR code receiving means.
- the QR code receiving means may be an optical device such as a camera.
- a camera included in a terminal equipped with a QR code verification means may be used as a QR code receiving means.
- the QR code verification means activates a camera included in the terminal and scans the printed QR code or the QR code displayed on the display.
- the QR code can be received by installing a QR code verification program in an existing terminal without having to separately provide a QR code receiving device.
- FIG. 2 is a block diagram of a visitor management system using a QR code according to an embodiment of the present invention.
- the user authentication system includes a QR code generating means 10, a QR code verifying means 20, and a server 30.
- the QR code generation means 10 refers to a device in which a dedicated program or a dedicated application (hereinafter, a dedicated program) for generating a QR code is built-in or installed.
- the QR code generating means 10 may be initially registered in the server 30 to be described later. A method of initially registering the QR code generating means 10 will be described later.
- the dedicated program serves to generate a QR code for authenticating a visitor.
- the dedicated program generates a QR code based on a separately generated virtual code for authentication.
- the authentication virtual code is a code consisting of a combination of letters and numbers, and can be converted into a QR code based on a QR code generation rule.
- the authentication virtual code may be generated by a virtual code generator built into the dedicated program.
- the virtual code generator may generate a virtual code for authentication based on user information.
- the user information may be information stored in both the QR code generating means 10 and the server 30.
- the QR code generation unit 10 generates a QR code based on information stored in both the QR code generation unit 10 and the server 30.
- the user information need not necessarily be stored in the memory built in the QR code generating means (10).
- user information may be stored in a separate card or wearable device capable of wireless communication, and the user allows the terminal in which the user information is stored to transmit the user information to the QR code generating unit 10, thereby generating a QR code (10) You can have this QR virtual code generated.
- the dedicated program includes a virtual code generation function for authentication, and generates a virtual code for authentication using user information.
- the dedicated program generates a virtual code for authentication by using user information as seed data of a virtual code generation function for authentication.
- the user information may be User Identification (UID).
- the dedicated program serves to register the QR code generation means 10 to the server 30. That is, the user installs the dedicated program in the QR code generating means 10 (ie, the user terminal), and the dedicated program transmits user information to the server 30 to register.
- the dedicated program may be a program built into the QR code generating means 10 when leaving the factory.
- the dedicated program receives user information from a user at the time of registration or generates user information based on login information of the user's dedicated program. After that, the dedicated program transmits user information to the server 30. As the server 30 registers user information in a specific count, the dedicated program receives setting data for specifying a virtual code generation function for authentication or a virtual code generation function for authentication from the server 30.
- the dedicated program may include an authentication virtual code generation function that generates an authentication virtual code capable of searching for a specific count in which user information is registered in the server 30.
- the dedicated program generates a virtual code for authentication based on user information whenever there is a user request, and then generates a QR code based on the generated virtual code for authentication. Since the virtual code for authentication is a code that is not duplicated every time, the QR code is also generated so that it is not duplicated every time.
- the QR code verification means 20 refers to a device in which a dedicated program or a dedicated application (hereinafter, a verification program) for verifying the QR code is built-in or installed.
- the verification program activates a camera included in the device in which the verification program is installed so that a QR code can be photographed. An image file corresponding to the QR code output through the camera shooting is created. The verification program verifies whether the image file including the QR code generated through the camera includes the QR code generated correctly.
- the verification program recognizes the QR code from the QR code image generated through the camera, and converts the recognized QR code into a virtual code for authentication.
- the same rules as those applied when generating the QR code may be applied. Accordingly, when converting the QR code into a virtual code for authentication, it is possible to obtain the same code as the virtual code for authentication that was the basis for generating the QR code.
- the verification program verifies whether the virtual code for authentication converted from the QR code is a normally generated code, and if the virtual code for authentication is a code that is normally generated, the QR code image includes a QR code that is normally generated. I can judge. A method of verifying the QR code by the QR code verification means 20 will be described later.
- the QR code verification means 20 generates a QR code image by activating the camera, and the QR code verification means 20 recognizes the QR code from the QR code image.
- the time when the QR code verification means 20 receives the QR code may be a time when a QR code image is generated through a camera or a time when a QR code is recognized from the QR code image.
- the QR code verification means 20 can receive the QR code in a variety of ways other than the above-described method, the point at which the QR code verification means 20 receives the QR code depends on the method of receiving the QR code. It can be different.
- the QR code verification means 20 When it is determined that the QR code received by the QR code verification means 20 is a normally generated QR code, the QR code verification means 20 matches the time of receiving the QR code with the virtual code for authentication converted from the QR code. And save it.
- the QR code verification means 20 transmits to the server 30 a time when the server 30 requests or receives the stored authentication virtual code and QR code at predetermined time intervals.
- the QR code verification means 20 verifies only that the QR code is a QR code generated within a predetermined time from the time when a visitor authentication request is made, and then receives a virtual code for authentication and a QR code extracted from the QR code. The time point is transmitted to the server 30.
- the QR code verification means 20 transmits a virtual code for authentication and a QR code reception time point to the storage server.
- QR code generation means 10 and QR code verification means 20 may be embedded or installed in a mobile terminal having a display, a camera, and a wireless communication unit.
- a user who wants to visit or pass through a specific area registers user information on the server 30 by installing a QR code generation means 10, and then performs visitor authentication through the QR code generation means 10. You can generate and present a QR code every time.
- a visitor manager in a specific area may install a QR code verification means 20 to scan a QR code presented by a visitor to check whether the QR code is a normally generated QR code, and store the visitor's visit record. have.
- the QR code verification means 20 may be interlocked with the opening and closing device.
- the opening and closing device may switch to an open state only when the QR code received by the QR code verification means 20 is a normally generated QR code, so that the visitor enters a specific area or passes through a specific area.
- the QR code verification means 20 may be built-in or installed in the opening and closing device.
- the opening and closing device must have an optical device, a communication unit, and a storage unit capable of receiving a QR code.
- the QR code verification means 20 can control the opening and closing device, and the QR code verification means 20 is a separate device including an optical device, a communication unit, and a storage unit capable of receiving a QR code. Can be built in or installed.
- the QR code verification means 20 may be registered in the server 30. Specifically, information related to a device (hereinafter, referred to as a QR code verification device) in which the QR code verification means 20 is built-in or installed in the server 30 may be matched with information related to the location of the device and stored.
- a QR code verification device information related to a device (hereinafter, referred to as a QR code verification device) in which the QR code verification means 20 is built-in or installed in the server 30 may be matched with information related to the location of the device and stored.
- the QR code verification means 20 when the QR code verification means 20 is initially registered with the server 30, the serial number of the QR code verification device and the location information of the QR code verification device are transmitted to the server 30, and the server 30 The serial number of the code verification device and the location information of the QR code verification device are matched and stored.
- the location information of the QR code verification device is information input from the user when registering the QR code verification means 20 with the server 30, or the GPS information collected from the GPS information collection unit provided in the QR code verification device. I can. If the location of the QR code verification device is changed even after the QR code verification device is registered on the server, the location information of the QR code verification device can be updated.
- the server 30 After the QR code verification means 20 is registered in the server 30, when the server 30 receives a virtual code for authentication from the QR code verification means 20, the server 30 is the QR code verification means 20 ) And user information extracted from the received virtual code for authentication may be matched and stored. This will be described later.
- the QR code verification means 20 receives and verifies the QR code from the plurality of QR code generation means 10, and the QR code verification means 20 corresponds to a plurality of virtual codes for authentication and a plurality of virtual codes for authentication, respectively. When the QR code is received is stored.
- the QR code verification means 20 may immediately transmit a virtual code for authentication and a time of reception of the QR code to the server 30. That is, the time of receiving the virtual code for authentication and the QR code is not stored in the device in which the QR code verification means 20 is installed, but may be directly transmitted to the server 30. Through this, it is possible to prevent the administrator from arbitrarily deleting visitor information.
- the QR code verification means 20 may transmit the virtual code for authentication and the time of receiving the QR code to the storage server. . A specific embodiment in which the server 30 includes a storage server and a verification server separated from each other will be described later.
- the server 30 receives a plurality of authentication virtual codes and a QR code reception time corresponding to each of the plurality of authentication virtual codes from the plurality of QR code verification means 20, and receives user information from each of the authentication virtual codes. After extraction, the user information, the point of reception of the QR code, and the location information corresponding to the QR code verification means 20 are matched and stored. Through this, the server 30 is able to grasp which place the plurality of visitors visited and passed through at what point in time.
- the QR code generated by the QR code generating means 10 cannot be used after a certain period of time, so even if the QR code is leaked, there is no fear that other people will use the leaked QR code to perform visitor authentication. .
- the QR code verification means 20 only verifies whether the received QR code is a normal QR code, and user information cannot be extracted from the QR code.
- the QR code verification means 20 since the user information is stored only in the server 30, even if the virtual code for authentication stored in the QR code verification means 20 is leaked, the user information is not leaked. Therefore, according to the present invention, there is no fear of leakage of user information (eg, user's personal information) by the QR code verification means 20.
- FIG. 3 is a block diagram of a QR code generating device according to an embodiment of the present invention.
- the QR code generation device 100 includes a detailed code generation unit 110, a virtual code generation unit 120, and a QR code generation unit 130 and a QR code providing unit 140. .
- the QR code generating device 100 may be a user terminal in which a program (ie, an application) for generating a QR code is installed, as an embodiment.
- the QR code generating device 100 is the QR code generating means 10 described above.
- the QR code generating device 100 After receiving the QR code generation request from the user, the QR code generating device 100 generates a virtual code for authentication, and generates a QR code based on the generated virtual code for authentication.
- the QR code generation device 100 when the QR code generation device 100 receives a QR code generation request from a user, the QR code generation device 100 activates a biometric authentication means provided in the QR code generation device 100 so that the user can perform biometric authentication. can do.
- the biometric authentication is to perform user authentication through at least one of the user's fingerprint, iris, vein, and face recognition, and the user registers biometric information in the QR code generation device 100 in advance and then each QR code generation request Biometric authentication can be performed.
- the QR code generating device 100 must have a means for recognizing biometric information.
- the QR code generation apparatus 100 may include at least one of a fingerprint recognition sensor, an iris recognition sensor, a vein recognition sensor, and a face recognition sensor.
- the QR code generating apparatus 100 may include various biometric information recognition means.
- the QR code generating device 100 may generate a QR code only when a user performs biometric authentication. Through this, it is possible to prevent another person from performing visitor authentication using the user's QR code generating device 100 or from denying that another person has performed visitor authentication through the user's QR code.
- the QR code generating device 100 may not generate a new QR code for a predetermined time after generating the QR code. Through this, it is possible to prevent the authentication of a plurality of visitors through one QR code generating device 100.
- the detailed code generation unit 110 plays a role of generating one or more detailed codes based on user information.
- the authentication virtual code generation function includes one or more detailed code generation functions. For example, if the virtual code for authentication includes a plurality of detailed codes, the virtual code generation function for authentication generates a plurality of detailed codes using a plurality of detailed code generation functions, and combines the plurality of detailed codes. Generate a virtual code for authentication by using the code combination function.
- the authentication virtual code is generated for each unit count by the QR code generating device 100, that is, a dedicated program 11 built-in or installed inside the user terminal, and means a mobile OTP (mobile one time password, mOTP). do.
- a mobile OTP mobile one time password, mOTP
- the QR code generating device 100 may use at least some of the user information stored in the QR code generating device 100 as one of the seed data of the virtual code generation function for authentication.
- the detailed code generation unit 110 generates each detailed code by using the UID as the seed data of each detailed code generation function using one detailed code generation function.
- the detailed code generation unit 110 may generate each detailed code using a time point or a count value at which the QR code generation is requested from the user.
- the detailed code generation unit 110 may generate a first code and a second code, including a first function and a second function as a detailed code generation function.
- the QR code generation device 100 only includes a first function for generating a first code and a second function for generating a second code as detailed code generation functions, in order to increase security. It may not include data on the correlation of the code.
- the virtual code generation unit 120 plays a role of generating a virtual code for authentication by combining one or more detailed codes using a virtual code generation function for authentication.
- the authentication virtual code is generated by combining a plurality of detailed codes according to a specific rule.
- the authentication virtual code generation function includes a rule for assembling a plurality of detailed codes (that is, a detailed code combining function). That is, the virtual code generation unit 120 may combine one or more detailed codes using a detailed code combining function included in the authentication virtual code generation function.
- the authentication virtual code generation unit 120 may generate an authentication virtual code by alternately arranging an N-digit first code and an N-digit second code.
- the detailed code combining function may be a function that combines the second code after the first code. As the number of detailed codes included in the authentication virtual code increases, various detailed code combining functions can be generated.
- the first code and the second code store the UID in the storage location search algorithm where user information is stored.
- Each can play a role in navigating a location.
- the first code sets the start point of the storage location search
- the second code sets the search path from the start point to the storage location of the UID according to a specific search method. That is, when the virtual code for authentication that is normally generated for each unit count is provided by the QR code generating device 100, the server 30 moves from the search start point corresponding to the first code to the search path corresponding to the second code.
- One point is determined as the point where user information is stored (i.e., the UID storage location).
- a specific method of searching for the storage location of the UID based on the first code and the second code constituting the virtual code for authentication will be described later.
- the QR code generation device 100 combines the first and second codes and a first virtual security code that is changed for each count from the initial time when the detailed code generation function is driven regardless of the user to generate a virtual code for authentication. Can be formed.
- the first virtual security code is formed by the same seed data (hereinafter, referred to as first seed data) regardless of the user, and is changed for each unit count. Since the first virtual security code is formed identically in all QR code generation devices 100, when different QR code generation devices 100 form the first virtual security code at the same time, the same code is formed.
- the first and second codes are formed by different seed data (hereinafter, referred to as second seed data) according to the user, and may include a second virtual security code that is changed for each unit count.
- Each of the first and second virtual security codes is formed to have different values even if they are formed at the same time.
- the second virtual security code may be included in at least one of the first and second codes, and even if different QR code generating apparatuses 100 are formed at the same time, they are formed with different values.
- the above-described QR code verification means 20 may include only an algorithm for extracting the first virtual security code from the virtual code for authentication and an algorithm for generating the first virtual security code.
- the QR code verification means 20 converts the received QR code into a virtual code for authentication, and extracts only the first virtual security code from the converted virtual code for authentication. Thereafter, when the QR code verification means 20 has a code that matches the extracted first virtual security code among the first virtual security codes generated within a predetermined unit count from the time the QR code is received, the QR code is normally It can be determined that it is a formed QR code. That is, the QR code verification means 20 may be made so that no information related to a specific user can be extracted from the virtual code for authentication.
- the first virtual security code may be used in addition to the above-described method for generating a virtual code for authentication and a method for generating a virtual code for authentication to be described later.
- the above-described authentication virtual code includes any one of a terminal unique value of the terminal (ie, the QR code generating device 100) installed with the QR code generation module 10 and a unique value generated through the user's biometric information. can do.
- the present invention can prevent the visitor from denying the fact that the person has visited the QR code used for visitor authentication.
- the unique value that can be included in the authentication virtual code for preventing visitor denial is not limited thereto.
- the authentication virtual code may include time information at which the QR code generation request is authorized.
- the time information may be used by a QR code verification device to be described later to verify the QR code. This will be described later.
- the detailed code generation unit 110 generates a new detailed code for each unit count, and accordingly, the QR code generation device 100 A new authentication virtual code is generated for each unit count.
- the virtual code for authentication that is newly generated for each unit count is not duplicated.
- the detailed code generation unit 110, the authentication virtual code newly generated for each unit count is not duplicated for a predetermined period of time to a specific user or a specific QR code generation device 100, and belongs to a specific group. It can be set so that it is not duplicated between users.
- the detailed code generation function included in the authentication virtual code generation function is MN
- Two codes may be generated as a first code or a second code, and each code is matched for each count from an initial point at which the detailed code generation function is driven. For example, when the unit count is set to 1 second, different MN codes are matched every second from the time when the detailed code generation function is initially driven.
- the period of using a specific detailed code generation function or the period of use of the QR code generation device 100 is a time length corresponding to the MN count.
- the QR code generation device 100 has a count corresponding to the specific time.
- the code value matched to may be generated as a first code or a second code.
- the QR code The generating device 100 may provide 366 codes as the first code and the second code. At this time, the QR code generation apparatus 100 may match each code for each count, and thus provide a first code and a second code changed for each count.
- a function for generating a first code or a second code i.e., a first function or a second code
- a function for generating a first code or a second code i.e., a first function or a second code
- the QR code generation device 100 may apply a virtual code generation function for authentication, which generates a virtual code for authentication different from the previous cycle, to the new use cycle, as the order in which the first code or the second code appears is different from the previous use cycle.
- the QR code generation device 100 prevents the same code as the authentication virtual code used in the previous use cycle from appearing as the authentication virtual code for each count in the new use cycle (that is, the first function generated according to the first function).
- the first function and the second function may be selected so that the matching relationship between the first code and the second code generated according to the second function is not included in the matching relationship included in the previous use period in all counts of the new use period.
- Generation function can be applied.
- the first code is the initial point at which the first function is driven so that duplicate virtual codes for authentication are not generated regardless of the user in the entire cycle. From among the codes matched for each count, set as a code value corresponding to the time (or count) at which the QR code generation request was made, and the second code reflects a value (e.g., UID) that always exists differently at the same time. It is set as the generated code value, and the authentication virtual code can be used as a code value in which the first code and the second code are combined. The first code has a different code value for each count, and the second code has a different code value for each UID at the same time, so that the authentication virtual code combined with the first code and the second code has different code values at all times. Will be printed.
- any one of a plurality of enumeration rules for listing M characters in ascending order is applied. That is, the QR code generation apparatus 100 may variously apply a rule of listing M characters in ascending order to the detailed code generation function included in the authentication virtual code generation function.
- the order of listing uppercase alphabetic letters in ascending order is the general order of A, B, C,... , Z can be in the order, A, C, B,... , May be in the Z order.
- the enumeration rule is changed in the authentication virtual code generation function, the order in which the codes are matched in turn with each count from the initial point in which the authentication virtual code generation function is operated is changed.
- the QR code generation unit 130 converts the virtual code for authentication generated in the above-described manner into a QR code according to the QR code generation rule.
- the QR code generation device 100 and the QR code verification device 200 used for visitor authentication may include the same QR code generation rule.
- the QR code providing unit 140 is a means for outputting the generated QR code, and may be a display provided in the QR code generating device 100.
- FIG. 4 is a block diagram of a QR code verification device according to an embodiment of the present invention.
- the QR code verification apparatus 200 may be a user terminal in which a program (ie, an application) for verifying a QR code is installed, as an embodiment.
- the QR code verification device 200 is the QR code verification means 20 described above.
- the QR code verification device 200 includes a QR code receiving unit 210, a virtual code extracting unit 220, a QR code verification unit 230, a virtual code storage unit 240, and a virtual code. Including study (250).
- the QR code receiver 210 may be a camera provided in the QR code verification device 200. However, the present invention is not limited thereto, and the QR code receiving unit 210 may include an optical device capable of imaging a printed QR code or a QR code displayed on a display device.
- the virtual code extraction unit 220 recognizes the QR code from the QR code image, and converts the recognized QR code into a virtual code for authentication. To this end, the virtual code extracting unit 220 may include the same rules as the QR code generation rule embedded in the QR code generation device 100. Through this, the virtual code extracting unit 220 may extract a virtual code for authentication identical to the virtual code for authentication formed in the QR code generating device 100 from the received QR code.
- the QR code verification unit 230 verifies whether the virtual code for authentication extracted by the virtual code extraction unit 220 is a normally formed code. Specifically, the QR code verification unit 230 extracts a virtual security code (OTP) that is changed for each unit count from the virtual code for authentication, and whether the extracted OTP is a virtual security code formed within a predetermined count from the time when the QR code is received.
- OTP virtual security code
- the virtual security code extracted from the virtual code for authentication is formed by the same first seed data regardless of the user, and may be a first virtual security code that is changed for each unit count. Since the first virtual security code is formed identically in all QR code generation devices 100, when different QR code generation devices 100 form the first virtual security code at the same time, the same code is formed.
- the QR code verification unit 230 may have the same function as the virtual security code generation function provided in the QR code generation device 100, and after generating a virtual security code within a predetermined count from the time when the QR code is received , It is determined whether there is a code identical to the virtual security code extracted from the virtual code for authentication among the generated virtual security codes.
- the QR code verification unit 230 determines that the QR code is normal if there is a code identical to the virtual security code extracted from the virtual code for authentication among the generated virtual security codes. In an embodiment, when it is determined that the QR code is normal, the QR code verification device 200 may output a message informing it. The administrator can check the message and allow the visitor to enter.
- the QR code verification unit 230 determines that the received QR code is not a normally generated QR code.
- the QR code verification device 200 may be configured to output a warning message. The administrator can check the warning message and deny access to the visitor.
- the QR code verification unit 230 compares the time information with the current time, and the current time corresponds to the time information. It is judged that the QR code is normal only when it is within a predetermined time from.
- the QR code verification unit 230 generates a virtual security code based on the time information and then determines whether it is the same as the virtual security code extracted from the authentication virtual code. When the generated virtual security code is the same as the virtual security code extracted from the virtual code for authentication, the QR code verification unit 230 determines that the QR code is normal.
- the QR code verification device 200 when the QR code verification device 200 is interlocked with the opening and closing device, the QR code verification device 200 opens the opening and closing device only when the received QR code is a normally generated QR code, and the QR code If it is determined that is an abnormally generated QR code, the opening and closing device is not opened.
- the QR code generated by the QR code generating device is leaked, it cannot be used after a predetermined period of time, so that other people cannot use the leaked QR code to authenticate visitors.
- the above-described QR code verification unit 230 may include only a function for extracting the first virtual security code from the virtual code for authentication and a function for generating the first virtual security code. Accordingly, the QR code verification device 200 only determines that the QR code is a normally generated code, and cannot extract any user information from the QR code. Through this, the present invention can prevent the leakage of user information through the QR code verification device 200.
- the virtual code storage unit 240 matches and stores the authentication virtual code extracted from the QR code with the QR code reception time point.
- the QR code verification device 200 performs a plurality of visitor authentication
- the virtual code storage unit 240 stores a plurality of authentication virtual codes and a QR code reception point matching each of the plurality of authentication virtual codes. .
- the virtual code providing unit 260 transmits to the server 30 the time of receiving the stored QR code matched with the virtual code for authentication and the virtual code for authentication stored whenever the server 30 requests or at predetermined time intervals.
- the virtual code providing unit 260 may transmit to the server 30 the time of receiving the stored QR code matched with the virtual code for authentication and the virtual code for authentication as soon as the QR code is verified.
- the server 30 or 300 includes a virtual code receiving unit 310, a detailed code extracting unit 320, a virtual code verification unit 330, and a storage location search unit 330.
- the server 30 extracts user information based on the virtual code for authentication, searches for a storage location corresponding to the extracted user information, and stores the searched user information by matching the visited place and time of the user.
- the virtual code receiving unit 310 receives a virtual code for authentication and a point of time of receiving the QR code from the QR code verification device 200.
- the detailed code extracting unit 320 serves to extract one or more detailed codes included in the virtual code for authentication.
- the detailed code extracting unit 320 includes a detailed code combining function included in the authentication virtual code generation function. Accordingly, when the authentication virtual code includes a plurality of detailed codes, the detailed code extracting unit 220 may extract a plurality of detailed codes from the authentication virtual codes by applying the detailed code combining function. For example, in the case of generating a virtual code for authentication in which two detailed codes (ie, a first code and a second code) are combined in the QR code generation device 100, the detailed code extraction unit 320 is The first code and the second code can be separated by applying the detailed code combining function to the character arrangement of the code.
- the QR code generating device 100 when the QR code generating device 100 generates a virtual code for authentication in which three detailed codes (ie, a first code, a second code, and a first virtual security code) are combined, the detailed code
- the extraction unit 320 may separate the first code, the second code, and the first virtual security code by applying a detailed code combining function to the character array of the virtual code for authentication.
- the storage location search unit 330 serves to search for a storage location of user information in a storage location search algorithm based on the extracted one or more detailed codes.
- the storage location search algorithm is matched to the authentication virtual code generation function used when generating the authentication virtual code in the QR code generation device 100.
- Various methods may be applied as a method in which the storage location search unit 330 searches for a storage location of user information based on each detailed code. In order for the storage location search unit 330 to search for a storage location based on a plurality of detailed codes, a correlation may be included between the detailed codes.
- the storage location means a point (count) on the track corresponding to the time point at which the registration of the virtual code generating means 10 is requested by the user. That is, when the track for the QR code generating means 10 is driven in the server 30, and a specific user information (for example, UID) is requested to be registered by a specific user at a specific time, corresponding to the corresponding time.
- the corresponding UID is registered in the count (that is, the count that has elapsed from the time of the last driving of the track to the time of registration).
- other types of user information are matched and stored in the storage location of the corresponding UID.
- the storage format of user information will be described later.
- the case where the user information extracted from the authentication security code by the server 30 is a UID is described as an example, but the present specification is not limited thereto, and the server 30 provides various types of authentication security codes. User information can be extracted.
- the storage location search unit 330 determines a search start point corresponding to the first code, The point moved according to the search path corresponding to the second code from the search start point can be found as the storage location of the UID. That is, the detailed code may include a first code for setting a starting point of the storage location search and a second code for setting a search path from the starting point to the storage location of the UID according to a specific search method. .
- the QR code verification device 200 uses the first code and the second code that are changed for each count. Based on the search start point and search path, you can search the storage location of UID.
- the storage location search unit 330 may include a storage location search algorithm to find the storage location of the UID using a plurality of detailed codes having correlations.
- the storage location search algorithm is an algorithm that enables storage location search when each detailed code included in the authentication virtual code is applied, and the authentication virtual code used when generating the authentication virtual code in the QR code generator 100 is applied. It matches the code generation function.
- the storage location search algorithm is in the first code.
- the storage location matching the registration time of the UID is arranged at the corresponding location.
- the server 30 can search the UID storage location even if the first code and the second code included in the authentication virtual code are changed.
- Various methods can be applied to the storage location search algorithm, and a specific example will be described later.
- the storage location search algorithm is not limited to the examples described later.
- the storage location search algorithm is a k-corner (k is MN) in which clouds move along a track in which MN codes corresponding to the first code are listed, and the vertex of the k-corner is a first code track.
- k is MN
- each vertex of the k-angle matches the storage location of the UID, and the point where the first code track (i.e., the first track) and the k-angle correspond to the first code It can be the starting point for searching the storage location corresponding to.
- the storage location search unit 330 may cloud-mov the k-angle so that a vertex of the k-angle is in contact with a point corresponding to the first code extracted from the detailed code extracting unit 220.
- the storage location search unit 330 is an angle corresponding to the second code at the position on the first track where the k-angle is in contact (for example, a specific angle divided by 180 degrees into MN to face the vertex of the k-angle)
- it is possible to search the vertex of the k-square which is the storage location where the UID corresponding to the authentication virtual code is stored.
- the server 30 cloud moves the k-angle to a point corresponding to the first code (that is, moves while making each vertex of the k-angle and each point on the track contact in turn). After that, the server 30 searches for a vertex corresponding to the storage location by instructing the angular direction corresponding to the second code.
- the storage location search unit 330 searches for the storage location of the UID using the first code and the second code in the authentication virtual code in the storage location search algorithm, the user's visit location and visit to the searched storage location Match the time and save it.
- the virtual code verification unit 340 compares the time when the QR code is received and the time when the authentication virtual code is generated using the authentication virtual code generation function in the QR code generation means (ie, the user terminal), and calculates the authentication virtual code. It plays the role of verifying. That is, the virtual code verification unit 340 does not verify the validity of the authentication virtual code based on the time when the authentication virtual code is received from the QR code verification unit, but when the QR code received together with the authentication virtual code is received. Based on, verify the validity of the virtual code for authentication.
- the virtual code verification unit 340 uses the virtual code generation function for authentication at the time of receiving the QR code and in the dedicated program 11 embedded or installed in the user terminal. By comparing the generated time points, when the generation time point falls within a preset error range from the reception time point, it may be determined that the received authentication virtual code is a normal code.
- the first code and the second code are randomly generated from the time when the UID is registered or the time when the QR code generation is requested by the virtual code generation means 10 It may be a code for a reference count added as much as the OTP code to be used.
- the QR code generation device 100 generates the virtual security code by reflecting it on the first code and the second code without outputting it to the outside.
- the authentication virtual code generation means e.g., a dedicated program
- generates a virtual security code value e.g., OTP code
- UID i.e., unique value
- a first code of the added count is generated, and a second code of the count corresponding to the virtual security code value is generated (ie, the virtual security code itself is generated as a second code). That is, the first code and the second code are generated based on the count shifted by the virtual security code value from the point A registered in the server 30 by the QR code generating device 100.
- the count shifted from the point A may be a count before or after the count corresponding to the current point according to the generated virtual security code value.
- the server 30 may search the UID storage location (or registration location) by applying the received first code and the second code to the storage location search algorithm. Through this, it is impossible for others to check the order in which the first code and the second code constituting the virtual code for authentication are provided, so that security can be improved.
- the server 30 extracts the virtual security code from the second code generated based on the virtual security code, and then receives the virtual code for authentication with a virtual security code generation function (ie, OTP function). It is checked whether there is a value that matches the virtual security code among the calculated OTP numbers by entering a count within a specific range from one count.
- the server 30 obtains the virtual security code value (that is, the OTP function value) used to generate the second code by applying the inverse function of the second function to the second code, and calculates the same value as the virtual security code value. I find it.
- the QR code verification means is the QR code. Since the count received from and the count generated by the OTP number corresponding to the virtual security code may not match, the server 30 allows an error range from the count receiving the QR code. Through this, the server 30 can select a virtual code for authentication formed by a normal method, so that security can be improved.
- the server 30 generates a first code corresponding to the count of adding the UID to the time at which the visitor authentication is requested (or the time at which the QR code is received) (time B), and , A second code corresponding to the count difference between the UID registration time (time A) and the user authentication request time (time B) plus the virtual security code value is generated. That is, the formula for generating the first code and the second code by the dedicated program for generating a virtual code for authentication is as follows.
- Second code f2 (Time B count-Time A count + virtual security code)
- the server 30 searches for the location where the UID is stored based on the first code and the second code in the received authentication virtual code, and based on this, a virtual security code within a specific count range from the time of receiving the visitor authentication request (i.e., OTP Number).
- the server 30 finds the UID registration time (point A) by searching for the point where the user information is stored based on the first code and the second code.
- the server 30 calculates a calculated value corresponding to the sum of the number of counts and the virtual security code (i.e., OTP number) within a specific count range from the UID registration time (point A) to the user authentication request reception time.
- Each is calculated, and it is checked whether there is a count equal to the number of counts corresponding to the second code (ie, a value obtained by applying the inverse function of the second function to the second code) among the calculated values.
- the server 30 can check whether the virtual code for authentication is normally provided.
- the server 30 receives the QR code received from the QR code verification device 200 in the storage location extracted from the verification virtual code (visit time) and the QR code verification device The location information (visited place) corresponding to 200 is matched and stored. Accordingly, when a specific user performs visitor authentication through the QR code verification device 200 located in a specific place, the specific user information, location information, and visit time are stored in the server.
- the server 30 may be formed of a plurality of servers.
- the specific user information, location information, and visit time may be stored in a plurality of servers in a block chain. Through this, it is possible to prevent others from manipulating the visitor record.
- the server 30 may physically separate the hardware including the storage location search unit 330 from the user information storage location. Through this, the present invention reduces the possibility of leakage of personal information.
- the server 30 may be formed of a storage server and a verification server separated from each other.
- the virtual code receiving unit 310 is included in the storage server, and the detailed code extracting unit 320, the virtual code verifying unit 330, and the storage location searching unit 330 may be included in the verification server.
- the storage server only stores the virtual code for authentication and the point at which the QR code is received, does not store user information, and cannot extract user information from the virtual code for authentication.
- the storage server and the verification server are configured to communicate with each other, and the storage server transmits a virtual code for authentication and a QR code reception time collected at a specific time and/or at a specific place according to a user request to the verification server. At this time, if necessary, location information corresponding to the virtual code for authentication, the serial number of the QR code verification device 200, or a unique value corresponding to the QR code verification module may be transmitted to the verification server together.
- the verification server stores user information and includes a virtual code verification algorithm for authentication.
- the verification server receives the authentication virtual code and the QR code reception point from the storage server, verifies the authentication virtual code, and extracts and stores user information from the authentication virtual code.
- the authentication virtual code presented when a visitor visits a specific place is stored only in the storage server, and the visitor's user information is stored only in the verification server.
- the present invention prevents leakage of personal information.
- the location information corresponding to the QR code verification device 200 may be stored in at least one of a storage server and a verification server.
- the location information corresponding to the QR code verification device 200 is stored only in the verification server, and when the storage server receives a virtual code for authentication from the QR code verification device 200, the QR code verification device ( 200) or a unique value corresponding to the QR code verification module is received, matched with the virtual code for authentication, and stored.
- the QR code verification module is registered in the verification server, and when the QR code verification module is initially registered in the verification server, the serial number of the QR code verification device 200 or the unique value of the QR code verification module and the QR code verification device 200 The location information of is transmitted to the verification server, and the verification server matches and stores the serial number of the QR code verification device 200 or the unique value of the QR code verification module with the location information of the QR code verification device 200.
- the verification server searches the serial number of the QR code verification device 200 corresponding to the specific location or the unique value of the QR code verification module, and the searched QR code
- the serial number of the verification device 200 or the unique value of the QR code verification module is transmitted to the storage server.
- the storage server transmits the serial number of the received QR code verification device 200 or the authentication virtual code corresponding to the unique value of the QR code verification module and the QR code reception time point to the verification server.
- the storage server searches for the time of receiving the QR code corresponding to the specific time range, and the time when the searched QR code is received and the corresponding authentication virtual code Is sent to the verification server.
- the verification server searches the serial number of the QR code verification device 200 corresponding to the specific location or the unique value of the QR code verification module. And, the serial number of the searched QR code verification device 200 or the unique value of the QR code verification module is transmitted to the storage server. Thereafter, the storage server searches for an authentication virtual code corresponding to the serial number of the received QR code verification device 200 or a unique value of the QR code verification module, and then corresponds to a specific time range among the searched authentication virtual codes. The virtual code for authentication that matches the QR code reception point is extracted. Thereafter, the storage server transmits the extracted virtual code for authentication and the corresponding QR code reception point to the verification server.
- the location information corresponding to the QR code verification device 200 is stored only on the storage server, and when the storage server receives a virtual code for authentication from the QR code verification device 200, the QR code verification device The location information corresponding to (200) is matched with a virtual code for authentication and stored.
- the QR code verification module is registered in the storage server, and when the QR code verification module is initially registered in the storage server, the serial number of the QR code verification device 200 or the unique value of the QR code verification module and the QR code verification device 200 ) Is transmitted to the storage server, and the storage server matches and stores the serial number of the QR code verification device 200 or the unique value of the QR code verification module with the location information of the QR code verification device 200.
- the storage server searches for a virtual code for authentication corresponding to the specific place, and when the searched virtual code for authentication and the QR code corresponding to the virtual code for authentication are received. And location information corresponding to the virtual code for authentication is transmitted to the verification server.
- the storage server searches for the time of receiving the QR code corresponding to the specific time range, and the time when the searched QR code is received and the corresponding authentication virtual code And the location information are sent to the verification server.
- the storage server matches the QR code reception time corresponding to the specific time range and the location information corresponding to the specific place, and stores the authentication.
- the virtual code is searched, and the searched authentication virtual code, location information corresponding thereto, and the time of receiving the QR code are transmitted to the verification server.
- the location information may be information input from a user when registering the QR code verification module in a storage server or a verification server, or GPS information collected from a GPS information collection unit provided in the QR code verification device 200. If the location of the QR code verification device 200 is changed even after the QR code verification device 200 is registered in the storage server or the verification server, the location information of the QR code verification device 200 may be updated.
- FIG. 6 is a flowchart of a QR code verification method according to an embodiment of the present invention.
- a QR code verification module is a QR code generated from the QR code generation module (QR code generation means 10) QR code receiving step of receiving a code (S110), QR code verification module extracting a virtual code for authentication from the QR code (S120), QR code verification module when the QR code is received and the authentication virtual Verifying the QR code based on the code (S130), and a step (S140) of matching and storing, by the QR code verification module, the time when the QR code is received and the virtual code for authentication.
- QR code verification means 20 is a QR code generated from the QR code generation module (QR code generation means 10) QR code receiving step of receiving a code (S110), QR code verification module extracting a virtual code for authentication from the QR code (S120), QR code verification module when the QR code is received and the authentication virtual Verifying the QR code based on the code (S130), and a step (S140) of matching and storing, by the QR code verification module, the time when the QR code is received and the virtual code for authentication.
- the QR code generation device 100 ie, the user terminal including the QR code generation unit 10
- the QR code verification device 200 ie, the user terminal including the QR code verification unit 20
- the administrator executes the verification program 12 to execute the QR code receiving function. Accordingly, the camera included in the device in which the verification program 12 is installed is activated to take a QR code.
- the verification program 12 when the visitor authentication is performed non-face-to-face, the verification program 12 may be executed by the visitor.
- the verification program 120 activates the camera so that the QR code can be photographed.
- the QR code verification module extracts the virtual code for authentication from the QR code, and verifies the QR code based on the time when the QR code is received and the virtual code for authentication. Specifically, the QR code verification module determines that the QR code is normal only when the time when the QR code is received is within a predetermined time from the time when the QR code is generated.
- the QR code verification module may have the same function as the virtual security code generation function provided in the QR code generation module, and after generating a virtual security code within a predetermined count from the time when the QR code is received, , It is determined whether there is a code identical to the virtual security code extracted from the virtual code for authentication among the generated virtual security codes.
- the QR code verification module determines that the received QR code is a normally generated QR code.
- the QR code verification module matches and stores the QR code reception time point and the authentication virtual code.
- the stored QR code reception point and the authentication virtual code are transmitted to the server at a request from the server or at predetermined time intervals.
- FIG. 7 is a flow chart illustrating a visitor management method according to an embodiment of the present invention.
- a QR code verification module determines a time when a QR code verification module is matched to each of a plurality of authentication virtual codes and the plurality of authentication virtual codes to receive a stored QR code. Transmitting (S210); Extracting at least one detail code from each of the plurality of authentication virtual codes (S220); A step (S230) of searching, by a server, a storage location of user information corresponding to each of the plurality of virtual codes for authentication based on the at least one detailed code (S230); And matching and storing the location information with the user information (S240).
- S210 Transmitting
- S230 A step of searching, by a server, a storage location of user information corresponding to each of the plurality of virtual codes for authentication based on the at least one detailed code (S230); And matching and storing the location information with the user information (S240).
- step S210 the server 30 receives a plurality of authentication virtual codes from a plurality of QR code verification modules and a time point of receiving a stored QR code matched to each of the plurality of authentication virtual codes.
- the server 30 may simultaneously receive location information corresponding to the QR code verification module from each of the plurality of QR code verification modules.
- the server 30 may match and store the received location information with a user information storage location to be described later.
- the QR code verification module may transmit location information input from an administrator to the server 30 or may transmit GPS information collected from a GPS information collection unit provided in the QR code verification device 200 to the server 30.
- the server 30 may receive a serial number of the QR code verification device 200 or a unique value corresponding to the QR code verification module from each of the plurality of QR code verification modules.
- the server 30 may search for location information of each of the QR code verification modules through the serial number or the unique value.
- the QR code verification module when the QR code verification module is initially registered with the server 30, the serial number of the QR code verification device 200 or the unique value of the QR code verification module and the location information of the QR code verification device 200 are stored in the server 30. And the server 30 matches and stores the serial number of the QR code verification device 200 or the unique value of the QR code verification module with the location information of the QR code verification device 200. The server 30 may search for location information using the serial number of the QR code verification device 200 or a unique value of the QR code verification module.
- the location information may be information input from a user when registering the QR code verification module with the server 30 or may be GPS information collected from a GPS information collection unit provided in the QR code verification device 200. If the location of the QR code verification device 200 is changed even after the QR code verification device 200 is registered in the server 30, the location information of the QR code verification device 200 may be updated.
- the server 30 extracts at least one detailed code from the authentication virtual code, and in S230, based on the at least one detailed code, user information corresponding to each of the plurality of authentication virtual codes Search the storage location of.
- the server 30 uses the first code and the second code to determine the UID storage location in the storage location search algorithm.
- the first code is a code that sets the starting point of the UID storage location search within the storage location search algorithm
- the second code sets the search path from the starting point to the UID storage location according to a specific search method. It could be code.
- the server 30 sets the location corresponding to the first code as a starting point, and according to the search method applied to the second code, based on the second code, the UID in the k-shaped arrangement state Searches for a point matched to the storage location (that is, a specific vertex of a k-square).
- the storage location is matched to each vertex of the k-square.
- the point where the first code track (ie, the first track) and the k-shape correspond to the first code is the starting point for searching the storage location corresponding to the first code.
- the server 30 searches for a matching point of the UID storage location based on the second code at the search start point.
- Various methods can be applied as a method of searching for a storage location in a k-angle based on the second code.
- the server 30 indicates an angle corresponding to the second code at a position on the first track where the k-angle is in contact (for example, a specific angle divided by MN by 180 degrees to face the vertices of the k-angle). Accordingly, based on the virtual code for authentication, it is possible to search the vertex of the k-angle, which is the storage location where the UID is stored.
- the server 30 in a state in which the k-angle is in contact with the point corresponding to the first code on the first track, the server 30 is based on the center of the k-angle and the contact point on the first track, ) Is divided into MN and each angle is matched to MN second codes.
- the direction of the line moving a specific number of unit angles (ie, 360 degrees/MN) from the line connecting the center of the k-angle and the contact point on the first track becomes a specific vertex of the k-angle.
- the server 30 may search for a vertex located in the corresponding angle direction.
- a specific position of the second code may be used to determine the angle calculation direction. That is, when the second code is generated using N characters (N is a natural number), the angle measurement direction can be determined with one digit.
- the server 30 divides the entire central angle (i.e., 360 degrees) based on the center of the k-angle and the contact point on the first track and matches the second code to each angle, the center of the k-angle The angle measured in the left direction or the right direction from the line connecting the contact point on the and the first track may be determined as a value of one digit.
- two second codes which are different according to the angle measurement direction, may be assigned to one vertex to each vertex on a k-angle. That is, when reaching one vertex to the inside and outside, it is matched with another second code, and a storage location of a different UID may be connected.
- the storage location search algorithm when generating a second code using N characters (N is a natural number), has a total angle of N-1 (e.g., 360 degrees when divided based on a central angle). You can determine the direction of angle application to reach each vertex by matching for half of) and using one digit.
- the method of searching for a storage location in the k-angle based on the second code is not limited to this, and a point dividing the point on the k-angle corresponding to the second code and the contact point on the first track by a specific ratio is searched as a storage location Various methods such as method can be applied.
- the authentication virtual code when the authentication virtual code includes a first code and a second code that are changed for each unit count, the first code is the unit count that has elapsed from the initial time when UID registration was started in the server 30. It is generated based on, and the second code is generated based on the unit count elapsed from the time when each user registers the UID through the dedicated program 11 installed in the QR code generating device 100. At this time, the unit count is set at a specific time interval and is changed as the time interval elapses.
- the storage location search algorithm moves on a track based on a plurality of detailed codes constituting a virtual code for authentication, and moves to a point matching the storage location of the UID.
- the server 30 sets the count on the track in which the code value corresponding to the first code is matched as the search start point, and the count corresponding to the second code It returns along the track from the search start point by the value, and searches for a point on the track (ie, the UID storage location) at the time when the UID is registered in the server 30.
- the server 30 searches for a point (or count) to which the first code is assigned in the authentication virtual code in the first code track, sets the search start point, and sets the second code in the reverse direction from the search start point.
- a target track is arranged to search for a point (or count) to which a second code is assigned in the authentication virtual code, and a point (or count) at which a UID is registered on the first code track is extracted.
- the count calculated as the server 30 sets the search start point based on the first code in the virtual code for authentication and applies the inverse function of the second function to the second code in the virtual code for authentication. It regresses as much as the value and searches for a point corresponding to the UID registration point.
- the server 30 may additionally verify the validity of the authentication virtual code. Specifically, the server 30 compares the reception time of the received QR code and the generation time of the authentication virtual code generated by using the authentication virtual code generation function in the authentication virtual code generation program, as shown in FIG. As shown, when the generation time is within an error range from the QR code reception time, it may be determined that the received virtual code for authentication is a normal code.
- the dedicated program 11 uses the virtual code generation function for authentication to correspond to the request time (ie, the generation time).
- An authentication virtual code (specifically, a second code) is generated based on the count value.
- one of the plurality of detailed codes may be generated using an OTP function using the generation time as seed data. That is, the OTP code may be included and generated in the second code.
- the authentication virtual code is provided to the server 30, and the server 30 extracts a plurality of detailed codes using a storage location search algorithm that matches the authentication virtual code generation function or the authentication virtual code generation function. do.
- the OTP code is extracted through one of the plurality of detailed codes (for example, the second code), and the time point at which the virtual code for authentication is generated is extracted through the OTP code.
- the virtual code for authentication is generated at the current time. You will be able to verify cognition. That is, if the generation time of the authentication virtual code is included within the range including the preset count value from the time when the QR code verification device 200 receives the QR code, the authentication virtual code is verified as a normally generated code. It becomes.
- the server 30 may store various user information.
- the user information may include at least one of a UID, a name, a terminal serial number, and a phone number, and the server 30 stores the user information after receiving it from the QR code generating device 100. I can.
- the server 30 may store a user's diagnosis result and information related to whether or not the confirmed person is contacted by matching the UID.
- the diagnosis result and whether the confirmed person is contacted may be updated by a user of the QR code generating device 100 or an administrator who has been given a separate authority.
- the server 30 searches for a visited place within a predetermined time from the changed point of time, and another user who performs visitor authentication at the same place as the user within a predetermined time from the changed point of time. Send a message to you. Further, the server 30 may change whether the confirmed person is contacted in the user information of another user who has performed visitor authentication in the same place as the corresponding user from non-contact to contact. When the contact of the confirmed person is changed from non-contact to contact, the server 30 may transmit a guide message recommending self-isolation to the corresponding user.
- the server 30 corresponds to the QR code verification device 200 whenever a storage location of specific user information is searched based on the authentication virtual code received from the QR code verification device 200.
- the location information and the QR code reception time can be matched to the storage location of the user information and stored.
- the user authentication method using a virtual code for authentication according to an embodiment of the present invention described above may be implemented as a program (or application) to be executed by being combined with a computer that is hardware and stored in a medium.
- the above-described program includes C, C++, JAVA, Ruby, which can be read by a processor (CPU) of the computer through the device interface of the computer, in order for the computer to read the program and execute the methods implemented as a program.
- It may include a code (Code) coded in a computer language such as machine language.
- code may include a functional code related to a function defining necessary functions for executing the methods, and a control code related to an execution procedure necessary for the processor of the computer to execute the functions according to a predetermined procedure. can do.
- code may further include code related to a memory reference to which location (address address) of the internal or external memory of the computer or the media or additional information necessary for the processor of the computer to execute the functions. have.
- the code uses the communication module of the computer to determine how It may further include a communication-related code for whether to communicate or what information or media to transmit and receive during communication.
- the storage medium is not a medium that stores data for a short moment, such as a register, cache, memory, etc., but a medium that stores data semi-permanently and can be read by a device.
- examples of the storage medium include, but are not limited to, ROM, RAM, CD-ROM, magnetic tape, floppy disk, optical data storage device, and the like. That is, the program may be stored in various recording media on various servers to which the computer can access, or on various recording media on the user's computer.
- the medium may be distributed over a computer system connected through a network, and computer-readable codes may be stored in a distributed manner.
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Lock And Its Accessories (AREA)
Abstract
Applications Claiming Priority (6)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| KR10-2019-0107065 | 2019-08-30 | ||
| KR20190107065 | 2019-08-30 | ||
| KR20200068428 | 2020-06-05 | ||
| KR10-2020-0068428 | 2020-06-05 | ||
| KR1020200091939A KR102451863B1 (ko) | 2019-08-30 | 2020-07-23 | Qr 코드를 이용한 방문자 관리 방법 및 시스템 |
| KR10-2020-0091939 | 2020-07-23 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2021040359A1 true WO2021040359A1 (fr) | 2021-03-04 |
Family
ID=74685645
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/KR2020/011274 Ceased WO2021040359A1 (fr) | 2019-08-30 | 2020-08-24 | Procédé et système de gestion de visiteurs et système mettant en œuvre un code qr |
Country Status (1)
| Country | Link |
|---|---|
| WO (1) | WO2021040359A1 (fr) |
Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| KR101296137B1 (ko) * | 2012-11-30 | 2013-08-13 | 주식회사 한국심트라 | 큐알코드이용 모바일아이디데이터 보안 방법 및 시스템 |
| KR101601636B1 (ko) * | 2015-06-18 | 2016-03-10 | 주식회사 렛츠온 | Qr 코드를 이용한 본인확인 시스템 |
| US9672458B2 (en) * | 2013-08-07 | 2017-06-06 | International Business Machines Corporation | Creation and management of dynamic quick response (QR) codes |
| KR101967874B1 (ko) * | 2017-02-22 | 2019-04-10 | 한국스마트인증 주식회사 | 주기적으로 변경되는 동적 코드 생성 방법과 그러한 동적 코드의 인증 방법 |
| KR102005554B1 (ko) * | 2018-08-09 | 2019-07-30 | 주식회사 센스톤 | 공카드를 이용한 금융거래제공방법 및 시스템 |
-
2020
- 2020-08-24 WO PCT/KR2020/011274 patent/WO2021040359A1/fr not_active Ceased
Patent Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| KR101296137B1 (ko) * | 2012-11-30 | 2013-08-13 | 주식회사 한국심트라 | 큐알코드이용 모바일아이디데이터 보안 방법 및 시스템 |
| US9672458B2 (en) * | 2013-08-07 | 2017-06-06 | International Business Machines Corporation | Creation and management of dynamic quick response (QR) codes |
| KR101601636B1 (ko) * | 2015-06-18 | 2016-03-10 | 주식회사 렛츠온 | Qr 코드를 이용한 본인확인 시스템 |
| KR101967874B1 (ko) * | 2017-02-22 | 2019-04-10 | 한국스마트인증 주식회사 | 주기적으로 변경되는 동적 코드 생성 방법과 그러한 동적 코드의 인증 방법 |
| KR102005554B1 (ko) * | 2018-08-09 | 2019-07-30 | 주식회사 센스톤 | 공카드를 이용한 금융거래제공방법 및 시스템 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| WO2020032321A1 (fr) | Système de fourniture de transaction financière reposant sur un code virtuel, dispositif de génération de code virtuel, dispositif de vérification de code virtuel, procédé de fourniture de transaction financière reposant sur un code virtuel et programme de fourniture de transaction financière reposant sur un code virtuel | |
| WO2017003051A1 (fr) | Dispositif électronique et procédé de génération de code aléatoire et unique | |
| WO2020032498A1 (fr) | Procédé et système d'authentification d'utilisateur faisant appel à un code d'authentification virtuel | |
| WO2020032482A1 (fr) | Procédé et système de fourniture de transaction financière au moyen d'une carte vide | |
| WO2019182409A1 (fr) | Dispositif électronique et son procédé d'authentification | |
| WO2022102930A1 (fr) | Système did utilisant une authentification par pin de sécurité basée sur un navigateur, et procédé de commande associé | |
| WO2020149500A1 (fr) | Procédé et appareil pour l'enregistrement d'une clé partagée | |
| WO2017039287A1 (fr) | Système et procédé d'authentification de signature manuelle sur la base de segments | |
| WO2020091525A1 (fr) | Procédé de paiement à l'aide d'une authentification biométrique et dispositif électronique associé | |
| WO2017061758A1 (fr) | Système et procédé d'authentification de signature manuscrite basés sur des blocs de segments | |
| WO2018164363A1 (fr) | Procédé de reconnaissance sans contact de parties du corps multiples et dispositif de reconnaissance de parties du corps multiples, utilisant des données biométriques multiples | |
| WO2015126037A1 (fr) | Système et procédé d'identification personnelle et antivol utilisant une clé aléatoire jetable | |
| WO2019031716A2 (fr) | Système de fourniture de règlement basé sur un jeton virtuel, appareil de génération de jeton virtuel, serveur de vérification de jeton virtuel, procédé de fourniture de règlement basé sur un jeton virtuel, et programme de fourniture de règlement basé sur un jeton virtuel | |
| WO2017183830A1 (fr) | Procédé et appareil de renforcement de la sécurité pour la reconnaissance d'iris, par enregistrement et appariement répartis de modèles d'iris | |
| WO2016006831A1 (fr) | Serrure de porte mettant en oeuvre la reconnaissance de l'iris et système associé, terminal de communication mobile et passerelle de réseau mise en oeuvre dans ledit terminal, et procédé d'authentification d'utilisateur associé | |
| WO2018070576A1 (fr) | Procédé de reconnaissance d'utilisateur à l'aide d'informations biométriques hybrides et dispositif associé | |
| WO2018199576A1 (fr) | Procédé et appareil permettant d'effectuer une authentification sur la base d'informations biométriques | |
| WO2021049681A1 (fr) | Dispositif électronique permettant d'effectuer une authentification se basant sur un serveur en nuage, et procédé de commande pour celui-ci | |
| WO2021040359A1 (fr) | Procédé et système de gestion de visiteurs et système mettant en œuvre un code qr | |
| WO2022186654A1 (fr) | Appareil de carte sim pour vérifier un code virtuel d'authentification généré pour la sécurité d'un dispositif ido | |
| WO2019031715A1 (fr) | Système, procédé et programme de commande fondés sur un code virtuel, dispositif de commande et moyen de génération de signal de commande | |
| WO2020162710A1 (fr) | Système, procédé et programme de commande fondés sur un code virtuel, dispositif de commande et moyen de génération de signal de commande pour objet mobile autonome | |
| WO2022186605A1 (fr) | Dispositif de carte à puce, dispositif de génération de code virtuel pour authentification, procédé de génération de code virtuel pour authentification l'utilisant, et serveur pour vérifier un code virtuel pour authentification | |
| WO2021172876A1 (fr) | Dispositif et procédé d'autorisation de processus basé sur un code d'autorisation virtuel | |
| WO2020032504A1 (fr) | Procédé et système de vote et de comptage basés sur un code de vote virtuel |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 20859279 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 20859279 Country of ref document: EP Kind code of ref document: A1 |
|
| 32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM1205A DATED 17/03/2023) |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 20859279 Country of ref document: EP Kind code of ref document: A1 |