The present disclosure relates to a registration device, a verification device, an identification device, and an individual identification system.
Conventionally, as a technique for discriminating between an authentic device and a counterfeit device for devices such as semiconductor chips, an individual identification system utilizing a property that it is difficult to reproduce (a physically unclonable function (PUF)) unique to the device has been proposed (see Japanese Patent Application Laid-Open No. 2015-154291).
In addition, a determination device has been proposed that verifies the legitimacy of a set consisting of device information and a signature by using device information unique to a determination target device, a signature for the device information, and a verification key corresponding to a generation key with which the signature is generated, and that determines the legitimacy of the determination target device on the basis of the verified legitimacy (see republished Japanese Patent No. 2016 -207944).
In addition, a verification system that verifies the legitimacy of an article, which is to be subjected to authenticity determination, on the basis of a feature amount extracted from the article has been disclosed (see Japanese Patent Application Laid-Open No. 2010 -81039).
Although an individual device to be determined can be identified using individual identification utilizing a PUF, it is not possible to verify whether or not the device to be determined satisfies the specifications desired by the user. In addition, even in the case of technology that uses device information unique to the determination target device, it is not possible to verify whether or not the determination target device satisfies the specifications desired by the user.
However, in the case of technology that verifies the legitimacy of an article to be determined by using a feature amount extracted from the article, when the feature amount is predicted, it is possible to counterfeit an article having the same feature amount or a device that outputs the same feature amount. In this case, the legitimacy of the article cannot be correctly verified.
The present disclosure was conceived in view of the foregoing situation, and an object thereof is to provide a registration device, a verification device, an identification device, and an individual identification system that are capable of verifying whether or not an identification target is a legitimate article that satisfies specifications, and of identifying an individual identification target.
The disclosed technology is, as one aspect, a registration device of an individual identification system that includes the registration device and a verification device, and that identifies an individual identification target, the registration device including: a registration unit that outputs verification information enabling verification of an identification key that is unique to the identification target, by using, as inputs, an input signal that depends on at least one of a physical property and an image feature of the identification target, and non-physical information that does not depend on the physical property and that differs for each identification target.
According to the present disclosure, it is possible to verify whether or not an identification target is a legitimate article that satisfies specifications, and to identify an individual identification target.
Hereinafter, exemplary embodiments for carrying out the technology according to the present disclosure will be described in detail with reference to the drawings.
First, before describing the details of the embodiment, problems with PUF technology will be described.
Generally, PUF-based individual identification is used to detect device counterfeiting for devices, such as semiconductor devices, for which PUF technology is established. In particular, this form of identification is often used to verify that a device dispatched by a sender and a device purchased by a purchaser and delivered by the delivery party to the purchaser are identical.
Specifically, as illustrated in
In general, however, it is not important to the purchaser that the shipped article and the received article are completely identical, and it is often important to the purchaser that the article is not counterfeit, that is, that same is a legitimate article meeting the required specifications. Specifically, for example, in the case of diamond, when a purchaser purchases a diamond selected after viewing a sample, the diamond sent from the sender need not be the sample diamond itself, and often there is no problem for the purchaser as long as the diamond has the same number of carats, hardness, size, and the like.
In the following embodiments, an individual identification system will be described that is capable of verifying whether or not a substance and a device for which PUF technology has not been established are legitimate articles that satisfy the required specifications, and of performing individual identification similar to when PUF technology is employed.
First, a configuration of an individual identification system 10 according to the present embodiment will be described with reference to
Next, a hardware configuration of the registration device 12 according to the present embodiment will be described with reference to
The storage unit 22 is realized by a hard disk drive (HDD), a solid state drive (SSD), a flash memory, or the like. The storage unit 22 serving as a storage medium stores a registration program 29. After reading the registration program 29 from the storage unit 22, the CPU 20 deploys this program in the memory 21 and executes the deployed registration program 29.
A measurement device 27 for measuring a physical quantity that depends on a physical property of an identification target is connected to the external I/F 26. In the present embodiment, an example will be described in which a device for measuring the weight of the identification target is applied as the measurement device 27. The measurement device 27 outputs a signal representing a measurement result obtained by measuring the identification target, to the CPU 20 via the external I/F 26.
Next, a hardware configuration of the verification device 14 according to the present embodiment will be described with reference to
The storage unit 32 is realized by an HDD, an SSD, a flash memory, or the like. A verification program 39 is stored in the storage unit 32 serving as a storage medium. After reading the verification program 39 from the storage unit 32, the CPU 30 deploys this program in the memory 31 and executes the deployed verification program 39.
Similarly to the measurement device 27, a measurement device 37 for measuring a physical quantity that depends on the physical property of the identification target is connected to the external I/F 36. In the present embodiment, an example will be described in which a device for measuring the weight of an identification target is applied as the measurement device 37. The measurement device 37 outputs a signal representing a measurement result obtained by measuring the identification target, to the CPU 30 via the external I/F 36.
Next, a hardware configuration of the identification device 16 according to the present embodiment will be described with reference to
The storage unit 42 is realized by an HDD, an SSD, a flash memory, or the like. The storage unit 42 serving as a storage medium stores an identification program 48. After reading the identification program 48 from the storage unit 42, the CPU 40 deploys this program in the memory 41 and executes the deployed identification program 48.
The storage device 18 has a nonvolatile storage area. In the present embodiment, an example will be described in which a write-once storage device with which it is difficult to falsify stored data is applied as the storage device 18. An example of the storage device 18 includes a blockchain. Note that the storage device 18 may be a storage device that is provided to any one of the registration device 12, verification device 14, and identification device 16. In addition, the storage device 18 may be a combination of storage devices provided to two or more among the registration device 12, verification device 14, and identification device 16. Furthermore, the storage device 18 may be a combination of storage devices capable of communicating via a network with the registration device 12, verification device 14, and identification device 16, and storage devices that are provided to one or more of the registration device 12, verification device 14, and identification device 16.
Next, functional configurations of the registration device 12, the verification device 14, and the identification device 16 according to the present embodiment will be described with reference to
As illustrated in
The measurement unit 50 measures the physical property of the identification target from an input signal P1 inputted from the measurement device 27. As described earlier, the input signal P1 is a signal representing a physical quantity that depends on the physical property of the identification target. Specifically, for example, the measurement unit 50 measures the number of carats of diamond from the input signal P1 indicating the weight of the diamond to be identified, as measured by the measurement device 27. Note that the number of input signals P1 may be plural. For example, in addition to the weight of the diamond, a signal indicating the dimensions of the outer shape of the diamond, a signal indicating the hardness of the diamond, and the like, may be inputted from the measurement device 27 to the registration device 12.
The determination unit 52 determines whether the measurement result by the measurement unit 50 is legitimate. In the present embodiment, the determination unit 52 determines whether or not the measurement result by the measurement unit 50 is legitimate by determining whether or not the measurement value constituting the measurement result by the measurement unit 50 is within a range that has been preset as a legitimate value range. Specifically, for example, when the number of carats of the diamond to be identified is one carat, the determination unit 52 determines that the measurement result is legitimate when the measurement result by the measurement unit 50 is within an error of 1% from one carat, that is, from 0.99 carat to 1.01 carat. In this case, the determination unit 52 determines that the measurement result is not legitimate when the measurement result by the measurement unit 50 is less than 0.99 carat or more than 1.01 carat. Accordingly, the determination unit 52 is capable of determining the authenticity of an identification target.
In the present embodiment, the determination result by the determination unit 52 is two values, namely, a value indicating that the identification target is legitimate and a value indicating that the identification target is not legitimate. In the case of PUF technology, for example, a signal is used which has a fine individual difference such as the delay time from when a signal is inputted to the identification target device to when the signal is outputted. Therefore, a noise removal technology called a fuzzy extractor or the like is required for this signal. However, in the present embodiment, due to the determination result by the determination unit 52 being represented by two values, complicated processing such as noise removal as required for PUF technology becomes unnecessary.
Furthermore, for example, by assigning a bit string having a relatively large number of bits such as a 128-bit bit string to the determination result by the determination unit 52, it is possible to suppress counterfeiting of the determination result.
Note that the determination result by the determination unit 52 is not two values indicating whether or not the measurement result by the measurement unit 50 is legitimate, but may be, for example, three or more values indicating a level at which the measurement result by the measurement unit 50 satisfies legitimacy.
The generation unit 54 generates an identification key Key1 that is unique to the identification target from the determination result by the determination unit 52 and from the non-physical information U1 that does not depend on the physical property of the identification target and differs for each identification target. In the present embodiment, the generation unit 54 generates, as the identification key Key1, a hash value of a value obtained by combining the determination result by the determination unit 52 with the non-physical information U1. The non-physical information U1 according to the present embodiment is, for example, information including the manufacturer of an identification target, a serial number, a lot number, a transaction ID, various transaction information, a random number, the number of verifications, and the like, and is information that enables an individual identification target to be specified. Note that the generation unit 54 may generate, as the identification key Key1, a hash value of the exclusive OR from the determination result by the determination unit 52 and the non-physical information U1, and only needs to be able to generate a random number subjected to processing such as encryption from the determination result by the determination unit 52 and the non-physical information U1. The generation unit 54 may generate the identification key Key1 from the determination result by the determination unit 52 and a portion of the non-physical information U1 (for example, a set consisting of the manufacturer and the serial number). The serial number may be a combination of a lot number and a branch number of a product.
The registration unit 56 generates verification information enabling verification of the identification key Key1 from the identification key Key1 generated by the generation unit 54. In the present embodiment, the registration unit 56 generates, as the verification information, the hash value of the identification key Key1 generated by the generation unit 54. The verification information may be encrypted data of the identification key Key1, and may be generated by processing having unidirectionality in which the identification key Key1 cannot be specified from the verification information. Furthermore, the functional parts that generate the hash values of the registration device 12, the verification device 14, and the identification device 16, other than the registration unit 56, are similarly not limited to hash functions, and may also use unidirectional functions including encryption or the like. The registration unit 56 then outputs the generated verification information and the identification information for specifying the verification information of the identification target, to the storage device 18 via the network I/F 25. As a result, the registration unit 56 registers the verification information and the identification information in the storage device 18. The storage device 18 holds the verification information and the identification information in association with each other. As the identification information, a portion of the non-physical information U1 (for example, a set consisting of the manufacturer and the serial number) can be applied.
As illustrated in
Similarly to the measurement unit 50, the measurement unit 60 measures the physical property of the identification target from an input signal P2 inputted from the measurement device 37. As described earlier, the input signal P2 is a signal representing a physical quantity that depends on the physical property of the identification target. Similarly to the determination unit 52, the determination unit 62 determines whether the measurement result by the measurement unit 60 is legitimate.
Similarly to the generation unit 54, the generation unit 64 generates an identification key Key2 that is unique to the identification target from the determination result by the determination unit 62 and from the non-physical information U2 that does not depend on the physical property of the identification target and that differs for each identification target. Similarly to the non-physical information U1, the non-physical information U2 is information including, for example, a manufacturer of an identification target, a serial number, a random number, the number of verifications, and the like, and is information enabling an individual identification target to be specified. For example, when the purchaser purchases the identification target, the non-physical information U2 is reported from the sender to the purchaser. Note that the sender may tag the identification target onto the non-physical information U2. In this case, the purchaser is able to ascertain the non-physical information U2 from the tag attached to the identification target.
When receiving the identification target from the delivery party, the purchaser inputs the non-physical information U2 to the verification device 14 held by the delivery party, via the input device 34.
The output unit 66 outputs the identification key Key2 generated by the generation unit 64 to the identification device 16 via the network I/F 35.
As illustrated in
The acquisition unit 70 acquires the identification key Key2 outputted from the verification device 14. The acquisition unit 70 also acquires, from the storage device 18, the verification information corresponding to the identification information of the identification target. In the present embodiment, the identification information of the identification target can be extracted from the non-physical information U2 of the identification target, which is reported beforehand by the sender to the purchaser.
The verification unit 72 verifies the legitimacy of the identification key Key2 by using the verification information acquired by the acquisition unit 70, and the identification key Key2. Specifically, the verification unit 72 calculates the hash value of the identification key Key2 and compares the calculation result with the verification information. When the calculated hash value of the identification key Key2 matches the verification information, the verification unit 72 outputs success information indicating that the legitimacy of the identification key Key2 has been successfully verified, to the registration unit 74. However, when the calculated hash value of the identification key Key2 does not match the verification information, the verification unit 72 outputs failure information indicating that the verification of the legitimacy of the identification key Key2 has failed, to the registration unit 74.
When the verification unit 72 succeeds in verifying the legitimacy of the identification key Key2, the registration unit 74 registers verified information indicating that the verification information registered in the storage device 18 has been verified, in the storage device 18 in association with the verification information. Furthermore, the registration unit 74 outputs information indicating the verification result by the verification unit 72 to the display device 43. The purchaser is able to ascertain whether or not the identification target delivered by the delivery party is legitimate by visually recognizing the verification result displayed on the display device 43.
Next, the operation of the individual identification system 10 according to the present embodiment will be described with reference to
In step S10 of
In step S14, as described earlier, the generation unit 54 generates the identification key Key1 that is unique to the identification target from the determination result in step S12 and from the non-physical information U1 that does not depend on the physical property of the identification target and that differs for each identification target.
In step S16, as described earlier, the registration unit 56 generates verification information that enables verification of the identification key Key1 from the identification key Key1 generated in step S14. In step S18, as described earlier, the registration unit 56 outputs the verification information generated in step S16 and the identification information of the identification target to the storage device 18 via the network I/F 25. When the processing of step S18 is complete, the registration processing ends. When the determination of step S12 is a negative determination, the processing from step S14 to step S18 is not executed, and the registration processing ends.
Next, generation processing in which the verification device 14 generates the identification key Key2 will be described with reference to
In step S20 of
In step S24, as described earlier, the generation unit 64 generates the identification key Key2 that is unique to the identification target from the determination result by the processing of step S22 and the non-physical information U2 that does not depend on the physical property of the identification target and that differs for each identification target. In step S26, the output unit 66 outputs the identification key Key2 generated in step S24 to the identification device 16 via the network I/F 35. When the processing of step S26 is complete, the registration processing ends.
Next, identification processing in which the identification device 16 identifies an identification target will be described with reference to
In step S30 of
In step S34, the acquisition unit 70 acquires the verification information corresponding to the identification information of the identification target from the storage device 18. In step S36, as described earlier, the verification unit 72 determines whether or not the legitimacy of the identification key Key2 has been successfully verified by determining whether or not the hash value of the identification key Key2 acquired in step S30 matches the verification information acquired in step S34. When this determination is a negative determination, the processing moves to step S42, and in the case of an affirmative determination, the processing moves to step S38.
In step S38, the registration unit 74 registers verified information indicating that the verification information registered in the storage device 18 has been verified, in the storage device 18 in association with the verification information. In step S40, the registration unit 74 outputs, to the display device 43, information indicating that the legitimacy of the identification key Key2 has been successfully verified. The purchaser is able to ascertain that the identification target is correct by visually recognizing the information displayed on the display device 43. When the processing of step S40 is complete, the identification processing ends.
However, in step S42, the registration unit 74 outputs, to the display device 43, information indicating that the verification of the legitimacy of the identification key Key2 has failed. The purchaser is able to ascertain that the identification target is counterfeit by visually recognizing the information displayed on the display device 43. When the processing of step S42 is complete, the identification processing ends. In step S44, the registration unit 74 outputs, to the display device 43, information indicating that the identification target has already been verified, thereby displaying the information on the display device 43. When the processing of step S44 is complete, the identification processing ends.
As described earlier, according to the present embodiment, it is possible to verify whether or not an identification target is a legitimate article that satisfies specifications, and to identify an individual identification target.
For example, a case will be considered in which the delivery party replaces an authentic identification target with an identification target that is counterfeit and for which the measurement result by the measurement unit 60 of the verification device 14 is not included in a range that is preset as a legitimate value range (does not satisfy specifications). In this case, the determination unit 62 of the verification device 14 outputs a determination value that differs from the determination value outputted from the determination unit 52 of the registration device 12. Therefore, the hash value of the identification key Key2 generated by the generation unit 64 of the verification device 14 does not match the verification information generated from the identification key Key1 stored in the storage device 18. Therefore, the purchaser is able to ascertain that the received identification target is a counterfeit.
Furthermore, for example, a case is considered in which an attacker other than the sender and the delivery party sends an identification target that is a counterfeit identification target and for which the measurement result by the measurement unit 60 of the verification device 14 is included in a range that has been preset as a legitimate value range. In this case, since the attacker cannot know the non-physical information U1, the attacker cannot generate the correct identification key Key1. In this case, the verification information generated from the identification key Key1 does not match the hash value of the identification key Key2 generated by the generation unit 64 of the verification device 14. Therefore, the purchaser is able to ascertain that the received identification target is a counterfeit. Moreover, even when the attacker colludes with the delivery party, if the sender notifies the purchaser of the non-physical information U1 in a manner that the delivery party and the attacker are not aware of this information, the attacker is similarly unable to generate the correct identification key Key1. Therefore, the purchaser is able to ascertain that the received identification target is a counterfeit.
In the present embodiment, in order to make it possible to distinguish even when a plurality of verification information items that correspond to a plurality of identification targets are stored in the storage device 18, the identification information is stored in the storage device 18 in association with the verification information items. Furthermore, in the present embodiment, when the verification of the identification target is successful, the verified information is stored in the storage device 18 in association with the verification information. These information items are not used in the case of a PUF. Therefore, in the case of a PUF, if the delivery party counterfeits the verification device 14 so as to cause the verification device 14 to store the identification key Key2 that has been successfully verified and such that this key is outputted from the verification device 14, it is considered that verification of the identification target always succeeds because there is no verified information.
In contrast, in the present embodiment, in a case in which verified information is added, the identification target is not verified. However, in a case in which the re-verification is performed, as illustrated in
Note that, in the present embodiment, in order to make it difficult to analyze and change the measurement result by the measurement unit 60 and the determination result by the determination unit 62, the measurement unit 60, the determination unit 62, the generation unit 64, and the output unit 66 of the verification device 14 may be realized by an integrated circuit (IC) chip that is tamper-resistant.
A second embodiment of the disclosed technology will be described. Note that the configuration of the individual identification system 10 (see
A functional configuration of the registration device 12 according to the present embodiment will be described with reference to
As illustrated in
The generation unit 54A generates the identification key Key1 from the determination value stored in the storage unit 22 and the non-physical information U1. In the present embodiment, the generation unit 54A generates the identification key Key1 from a hash value, or the like, of a value obtained by combining the determination value and the non-physical information U1.
Next, the operation of the individual identification system 10 according to the present embodiment will be described with reference to
A registration processing in which the registration device 12 registers verification information will be described with reference to
In
As described earlier, according to the present embodiment, the same advantageous effects as those of the first embodiment can be obtained.
For example, in a case in which the sender intentionally or erroneously stores an incorrect determination value in the storage unit 22, if the verification device 14 is legitimate, the identification key Key1 and the identification key Key2 are not the same. In this case, since the identification device 16 fails to verify the identification target, the purchaser is able to ascertain that the determination value is incorrect. Even in a case in which a sender sends an identification target whose physical property is not legitimate (does not satisfy the specifications) intentionally or by mistake even though a determination value indicating that the physical property of the identification target is legitimate is stored in the storage unit 22, the identification key Key1 and the identification key Key2 are not the same. Here too, since the identification device 16 fails to verify the identification target, the purchaser is able to ascertain that the determination value is incorrect.
A third embodiment of the disclosed technology will be described. Note that the configuration of the individual identification system 10 (see
A hardware configuration of the registration device 12 according to the present embodiment will be described with reference to
As illustrated in
A hardware configuration of the verification device 14 according to the present embodiment will be described with reference to
As illustrated in
Next, functional configurations of the registration device 12 and the verification device 14 according to the present embodiment will be described with reference to
As illustrated in
The compression unit 53 compresses the non-physical information U1. Specifically, the compression unit 53 calculates a random number having unidirectionality with a smaller number of bits than the non-physical information U1, such as a hash value of the non-physical information U1. This calculation result is the compressed non-physical information U1. Through this compression, a different random number is generated for each non-physical information item U1.
The generation unit 54B generates the identification key Key1 by means of a function having unidirectionality such as encryption, using a predetermined key, of the determination result by the determination unit 52 and the non-physical information U1 compressed by the compression unit 53. In the present embodiment, the generation unit 54B encrypts a value obtained by combining the determination result by the determination unit 52 and the compressed non-physical information U1 according to a predetermined encryption algorithm such as AES (Advanced Encryption Standard). The identification key Key1 is generated by this encryption.
As illustrated in
The compression unit 63 compresses the non-physical information U2 similarly to the compression unit 53. Similarly to the generation unit 54B, the generation unit 64A generates the identification key Key2 by using a predetermined key to encrypt the determination result by the determination unit 62 and the non-physical information U2 compressed by the compression unit 63. The registration device 12 and the verification device 14 pre-store a common key that is used for encryption by the generation unit 54B and the generation unit 64A.
Next, the operation of the individual identification system 10 according to the present embodiment will be described with reference to
First, registration processing in which the registration device 12 registers verification information will be described with reference to
In
Next, generation processing in which the verification device 14 generates the identification key Key2 will be described with reference to
In
As described earlier, according to the present embodiment, the same advantageous effects as those of the first embodiment can be obtained.
In the present embodiment, it is difficult to counterfeit the verification device 14 because the identification key Key1 and the identification key Key2 are outputted as different random numbers for each individual identification target and for each number of verifications.
Note that, also in the present embodiment, similarly to the second embodiment, a determination value that is preset by the sender and that indicates that the physical property of the identification target is legitimate may also be stored in the storage unit 22 of the registration device 12.
A fourth embodiment of the disclosed technology will be described. Note that the configuration of the individual identification system 10 (see
A hardware configuration of the registration device 12 according to the present embodiment will be described with reference to
A measurement device 27A for measuring a physical quantity that depends on an image feature of an identification target is connected to the external I/F 26. In the present embodiment, an example in which a digital camera is applied as the measurement device 27A will be described. The measurement device 27A outputs a signal (for example, image data) that depends on an image feature of the identification target obtained by photographing the identification target, to the processor 20B via the external I/F 26.
Next, a hardware configuration of the verification device 14 according to the present embodiment will be described with reference to
A measurement device 37A for measuring a physical quantity that depends on an image feature of an identification target is connected to the external I/F 36. In the present embodiment, an example in which a digital camera is applied as the measurement device 37A will be described. The measurement device 37A outputs a signal (for example, image data) that depends on an image feature of the identification target obtained by photographing the identification target, to the processor 30B via the external I/F 36.
Next, functional configurations of the registration device 12, the verification device 14, and the identification device 16 according to the present embodiment will be described with reference to
As illustrated in
The measurement unit 50A measures an image feature of an identification target from the input signal I1 inputted from the measurement device 27A. Specifically, for example, the measurement unit 50A measures the image feature of the identification target by performing image analysis processing on the image data indicated by the input signal I1. Examples of image features include a diamond shape and outline dimensions (for example, the length of a crown and a pavilion, or the like). Note that a feature added to an identification target such as a signature using a random pattern and characters may also be applied as the image feature.
Similarly to the determination unit 52, the determination unit 52A determines whether the measurement result by the measurement unit 50A is legitimate. In the present embodiment, an image feature of the identification target is preset in the determination unit 52A, which determines whether or not a measurement result by the measurement unit 50A is legitimate by determining whether or not a measurement value constituting the measurement result by the measurement unit 50A is within a range that has been preset as a legitimate value range. This determination is made by comparing a measurement result by the measurement unit 50A and a preset image feature.
The encryption unit 55 generates a session key 1 and encrypts a determination result by the determination unit 52 by using the generated session key 1. Hereinafter, the determination result by the determination unit 52 is referred to as “determination result 1”, and the encrypted determination result 1 is referred to as “determination result 1C”. Further, the session key 1 is a different key for each verification device 14 constituting a communication destination.
The encryption unit 55 encrypts the non-physical information U1 by using the session key 1. Hereinafter, the encrypted non-physical information U1 is referred to as “non-physical information C”. The encryption unit 55 also encrypts the session key 1 by using the public key of the verification device 14. Hereinafter, the encrypted session key 1 is referred to as “session key 1A”.
The encryption unit 55A generates a session key 2 that is different from the session key 1, and encrypts the determination result by the determination unit 52A by using the generated session key 2. Hereinafter, the determination result by the determination unit 52A is referred to as “determination result 2”, and the encrypted determination result 2 is referred to as “determination result 2C”. Further, the session key 2 is a different key for each verification device 14 constituting a communication destination. Note that the session key 1 and the session key 2 may be the same key.
The encryption unit 55A also encrypts the image feature of the identification target that has been set in the determination unit 52A by using the session key 2. Hereinafter, the encrypted image feature is referred to as “image feature C”. The encryption unit 55A also encrypts the session key 2 by using the public key of the verification device 14. Hereinafter, the encrypted session key 2 is referred to as “session key 2A”.
The generation unit 54C generates the identification key Key1 that is unique to the identification target from the determination result 1C, the determination result 2C, and the non-physical information U1 that does not depend on the physical property of the identification target and that is different for each identification target. In the present embodiment, the generation unit 54C generates, as the identification key Key1, a hash value of a value obtained by concatenating the determination result 1C, the determination result 2C, and the non-physical information U1.
Similarly to the registration unit 56, the registration unit 56A generates verification information, which enables verification of the identification key Key1, from the identification key Key1 generated by the generation unit 54C. The registration unit 56A also generates a digital signature R (hereinafter referred to as “signature R”) for the verification information and the identification information by using the private key of the registration device 12. The signature R is an example of information for authenticating the registration device 12. The registration unit 56A then outputs the verification information, the identification information, the session key 1A, the session key 2A, the non-physical information C, the image feature C, and the signature R to the storage device 18 via the network I/F 25. The storage device 18 verifies the legitimacy of the signature R, and when the signature R is legitimate, holds the verification information, the identification information, the session key 1A, the session key 2A, the non-physical information C, the image feature C, and the signature R. As a result, the registration unit 56A registers the verification information, the identification information, the session key 1A, the session key 2A, the non-physical information C, the image feature C, and the signature R in the storage device 18.
As illustrated in
The acquisition unit 67 acquires the session key 1A, the session key 2A, the non-physical information C, and the image feature C corresponding to the identification information of the identification target, from the storage device 18. The decryption unit 68 decrypts the session key 1A and the session key 2A by using the secret key of the verification device 14. Through this decryption, the session key 1 and the session key 2 are obtained. The decryption unit 68 also decrypts the non-physical information C by using the session key 1. Through this decryption, the non-physical information U1 is obtained. The decryption unit 68 decrypts the image feature C by using the session key 2. Through this decryption, the image feature of the identification target is obtained.
Similarly to the measurement unit 50A, the measurement unit 60A measures the image feature of the identification target from the input signal I2 inputted from the measurement device 37A. Similarly to the determination unit 52A, the determination unit 62A determines whether the measurement result by the measurement unit 60A is legitimate by using the image feature decrypted by the decryption unit 68.
The encryption unit 65 encrypts the determination result by the determination unit 62 by using the session key 1 obtained through the decryption by the decryption unit 68. Hereinafter, the determination result by the determination unit 62 is referred to as “determination result 3”, and the encrypted determination result 3 is referred to as “determination result 3C”.
The encryption unit 65A encrypts the determination result by the determination unit 62A by using the session key 2 obtained through decryption by the decryption unit 68. Hereinafter, the determination result by the determination unit 62A is referred to as “determination result 4”, and the encrypted determination result 4 is referred to as “determination result 4C”.
Similarly to the generation unit 54 C, the generation unit 64B generates the identification key Key2, which is unique to the identification target, from the determination result 3C, the determination result 4C, and the non-physical information U1 obtained through decryption by the decryption unit 68. The generation unit 64B also generates confirmation information. This confirmation information is information that includes the generation date and time of the identification key Key2, the device ID of the verification device 14, and the like. The generation unit 64B generates a digital signature V (hereinafter referred to as “signature V”) for the confirmation information by using the secret key of the verification device 14. The signature V is an example of information for authenticating the verification device 14.
The output unit 66A outputs the identification key Key2, the confirmation information, and the signature V, which have been generated by the generation unit 64B, to the identification device 16 via the network I/F 35.
As illustrated in
The acquisition unit 70A acquires the identification key Key2, the confirmation information, and the signature V which are outputted from the verification device 14. The acquisition unit 70A also acquires, from the storage device 18, the verification information corresponding to the identification information of the identification target.
When the verification unit 72 succeeds in verifying the legitimacy of the identification key Key2, the registration unit 74A registers verified information indicating that the verification information registered in the storage device 18 has been verified, and confirmation information and the signature V, in the storage device 18. The storage device 18 verifies the legitimacy of the signature V, and when the signature V is legitimate, holds the verified information, the confirmation information, and the signature V in association with the identification information. Furthermore, the registration unit 74A outputs information indicating the verification result by the verification unit 72 to the display device 43.
Next, the operation of the individual identification system 10 according to the present embodiment will be described with reference to
In step S50 of
In step S54, similarly to step S12, the determination unit 52 determines whether the measurement result obtained through the processing of step S50 is legitimate. When this determination is an affirmative determination, the processing moves to step S56. In step S56, as described earlier, the determination unit 52A determines whether the measurement result by the processing of step S52 is legitimate. When this determination is an affirmative determination, the processing moves to step S58.
In step S58, the encryption unit 55 generates the session key 1 and encrypts the determination result 1 in step S54 by using the generated session key 1. In step S60, the encryption unit 55 encrypts the non-physical information U1 by using the session key 1. In step S62, the encryption unit 55 encrypts the session key 1 by using the public key of the verification device 14.
In step S64, the encryption unit 55A generates the session key 2 and encrypts the determination result 2 in step S56 by using the generated session key 2. In step S66, the encryption unit 55A encrypts the image feature of the identification target set in the determination unit 52A by using the session key 2. In step S68, the encryption unit 55A encrypts the session key 2 by using the public key of the verification device 14.
In step S70, as described earlier, the generation unit 54C generates the identification key Key1 that is unique to the identification target from the determination result 1C obtained in step S58, the determination result 2C obtained in step S64, and the non-physical information
U1. In step S72, the registration unit 56A generates verification information that enables verification of the identification key Key1 from the identification key Key1 generated in step S70, as described earlier. In step S74, the registration unit 56A generates the signature R for the verification information and the identification information by using the private key of the registration device 12.
In step S76, the registration unit 56A outputs, to the storage device 18, the verification information and the identification information that are obtained in step S72, the session key 1A obtained in step S62, the session key 2A obtained in step S68, the non-physical information C obtained in step S60, the image feature C obtained in step S66, and the signature R obtained in step S74. The storage device 18 verifies the legitimacy of the signature R, and when the signature R is legitimate, holds the verification information, the identification information, the session key 1A, the session key 2A, the non-physical information C, the image feature C, and the signature R.
When the processing of step S76 is complete, the registration processing ends. When the determination of step S54 is a negative determination, the processing from step S56 to step S76 is not executed, and the registration processing ends. When the determination of step S56 is a negative determination, the processing from step S58 to step S76 is not executed, and the registration processing ends.
Next, generation processing in which the verification device 14 generates the identification key Key2 will be described with reference to
In step S80 of
In step S84, the acquisition unit 67 acquires the session key 1A, the session key 2A, the non-physical information C, and the image feature C that correspond to the identification information of the identification target, from the storage device 18. In step S86, the decryption unit 68 decrypts the session key 1A and the session key 2A that are acquired in step S84 by using the secret key of the verification device 14. In step S88, the decryption unit 68 decrypts the non-physical information C acquired in step S84 by using the session key 1 obtained in step S86.
In step S90, using the session key 2 obtained in step S86, the decryption unit 68 decrypts the image feature C acquired in step S84. In step S92, as described earlier, the measurement unit 60A measures the image feature of the identification target from the input signal I2 inputted from the measurement device 37A. In step S94, as described earlier, the determination unit 62A determines whether the measurement result obtained by the processing of step S92 is legitimate by using the image feature obtained in step S90.
In step S96, the encryption unit 65 encrypts the determination result 3 obtained by the processing of step S82 by using the session key 1 obtained in step S86. In step S98, the encryption unit 65A encrypts the determination result 4 obtained by the processing of step S94 by using the session key 2 obtained in step S86.
In step S100, as described earlier, the generation unit 64B generates the identification key Key2 that is unique to the identification target from the determination result 3C obtained in step S96, the determination result 4C obtained in step S98, and the non-physical information U1 obtained in step S88. In step S102, the generation unit 64B generates confirmation information. In step S104, the generation unit 64B generates the signature V by using the secret key of the verification device 14.
In step S106, the output unit 66A outputs the identification key Key2 generated in step S100, the confirmation information generated in step S102, and the signature V generated in step S104 to the identification device 16. When the processing of step S106 is complete, the generation processing ends.
Next, identification processing in which the identification device 16 identifies an identification target will be described with reference to
In step S110, the acquisition unit 70A acquires the identification key Key2, the confirmation information, and the signature V that are outputted from the verification device 14. Similarly to step S32, in step S112, the acquisition unit 70A determines whether the verified information is associated, in the storage device 18, with the verification information corresponding to the identification information of the identification target. When this determination is an affirmative determination, the processing moves to step S124, and when the determination is a negative determination, the processing moves to step S114.
Similarly to step S34, in step S114, the acquisition unit 70A acquires the verification information corresponding to the identification information of the identification target from the storage device 18. Similarly to step S36, in step S116, the verification unit 72 determines whether the hash value of the identification key Key2 acquired in step S110 matches the verification information acquired in step S114, thereby determining whether the legitimacy of the identification key Key2 has been successfully verified. When this determination is a negative determination, the processing moves to step S122, and in the case of an affirmative determination, the processing moves to step S118.
In step S118, the registration unit 74A registers, in the storage device 18, verified information indicating that the verification information registered in the storage device 18 has been verified, and the confirmation information and the signature V that are acquired in step S110. The storage device 18 verifies the legitimacy of the signature V, and when the signature V is legitimate, holds the verified information, the confirmation information, and the signature V in association with the identification information. Similarly to step S40, in step S120, the registration unit 74A outputs information indicating that the legitimacy of the identification key Key2 has been successfully verified, to the display device 43. The purchaser is able to ascertain that the identification target is correct by visually recognizing the information displayed on the display device 43. When the processing of step S120 is complete, the identification processing ends.
However, similarly to step S42, in step S122, the registration unit 74A outputs information indicating that the verification of the legitimacy of the identification key Key2 has failed, to the display device 43. The purchaser is able to ascertain that the identification target is counterfeit by visually recognizing the information displayed on the display device 43. When the processing of step S122 is complete, the identification processing ends. Similarly to step S44, in step S124, the registration unit 74A outputs, to the display device 43, information indicating that the identification target has already been verified. When the processing of step S124 is complete, the identification processing ends. Also in the present embodiment, the reverification can be similarly performed by the processing described in the first embodiment (see, for example,
As described earlier, according to the present embodiment, the same advantageous effects as those of the first embodiment can be obtained.
Note that, in the first to third embodiments, the image feature of the identification target may be used similarly to the fourth embodiment. In this case, an image feature may be used instead of the physical property of the identification target, or both the physical property and the image feature of the identification target may be used.
In the first to third embodiments, the signatures R and V may be used similarly to the fourth embodiment.
In the fourth embodiment, similarly to the second embodiment, the determination value may be pre-stored in the storage unit 22 of the registration device 12.
Furthermore, in the fourth embodiment, in a case in which the image feature of the identification target can be measured beforehand, the image feature may be reported beforehand by the registration device 12 to the verification device 14.
Furthermore, in the fourth embodiment, in a case in which the verification device 14 is not determined at the time of registration by the registration device 12, encryption using the session key may not be performed at the time of registration, and may be performed after the verification device 14 is determined.
In the fourth embodiment, a case in which the signatures R and V are generated by using a public key encryption system has been described, but the present invention is not limited to this arrangement. The signals R and V may also be generated by using a common key encryption method. In this case, an embodiment in which the storage device 18 functions as a key distribution center is exemplified.
In addition, the session keys 1 to 4 of the fourth embodiment may be fixed for each verification device 14 instead of being changed every time encryption is performed.
In the fourth embodiment, the input signal P1 and the input signal I1 may be one input signal, that is, one input signal that depends on both the physical property and the image feature of the identification target. In this case, the registration device 12 measures the physical properties and the image feature of the identification target from the one input signal. Furthermore, the input signal P2 and the input signal I2 may similarly be one input signal, that is, one input signal that depends on both the physical property and the image feature of the identification target. In this case, the verification device 14 measures the physical property and the image feature of the identification target from the one input signal.
A fifth embodiment of the disclosed technology will now be described. Note that the configuration of the individual identification system 10 (see
The functional configurations of the verification device 14 and identification device 16 according to this embodiment will be described with reference to
As illustrated in
The encryption unit 65B encrypts the measurement result by the measurement unit 60 according to a predetermined encryption algorithm such as AES. The output unit 66B outputs the measurement result encrypted by the encryption unit 65B to the identification device 16 via the network I/F 35.
As illustrated in
The acquisition unit 70B acquires the encrypted measurement result outputted from the verification device 14. The acquisition unit 70B also acquires, from the storage device 18, the verification information corresponding to the identification information of the identification target. The decryption unit 75 decrypts the encrypted measurement result acquired by the acquisition unit 70B. The verification device 14 and the identification device 16 pre-store a common key that is used for the encryption by the encryption unit 65B and the decryption by the decryption unit 75.
Similarly to the determination unit 62, the determination unit 76 determines whether the measurement result obtained through the decryption by the decryption unit 75 is legitimate. Similarly to the generation unit 64, the generation unit 77 generates an identification key Key2 that is unique to the identification target from the determination result by the determination unit 76 and from the non-physical information U2 that does not depend on the physical property of the identification target and that differs for each identification target. The identification key Key2 generated by the generation unit 77 is inputted to the verification unit 72.
Next, the operation of the individual identification system 10 according to the present embodiment will be described with reference to
First, output processing in which the verification device 14 outputs the measurement result will be described with reference to
In
Next, identification processing in which the identification device 16 identifies an identification target will be described with reference to
In step S31-1 of
As described earlier, the present embodiment affords the same advantageous effects as those of the first embodiment even when, in the first embodiment, the functions of the determination unit 62 and the generation unit 64 of the verification device 14 are transferred to the identification device 16. Furthermore, the functions of the verification device 14 and the identification device 16 according to the fifth embodiment can be realized by an application program of a personal computer or a smartphone, for example. In this case, the application program is managed by the sender, the sender and purchaser share, in advance, the key that is used by the encryption unit 65B and decryption unit 75, and the purchaser sets the key for the application program obtained from the sender.
The verification device 14 is managed by the sender, loaned to the delivery party at the time of shipping the identification target, and returned to the sender after delivery is complete. The sender inspects the returned verification device 14 for evidence of modification and disassembly. The verification device 14 is set up by the sender with a key previously shared with the purchaser at the time of shipping the identification target.
As described above, if the sender and purchaser are legitimate, the delivery party cannot modify or disassemble the verification device 14, even if an attempt is made to analyze same, because the verification device 14 will be inspected by the sender following its return. In addition, the information sent and received between the verification device and the identification device is encrypted with a key shared between the sender and the purchaser, and hence cannot be analyzed by the delivery party. Hence, the delivery party is unable to commit fraud.
In the second to fourth embodiments, functions that correspond to the determination unit 62 and the generation unit 64 of the verification device 14 according to the first embodiment may be transferred to the identification device 16. The image feature of the identification target may also be used in the fifth embodiment as per the fourth embodiment.
A sixth embodiment of the disclosed technology will now be described. Note that the configuration of the individual identification system 10 (see
The functional configurations of the verification device 14 and identification device 16 according to this embodiment will be described with reference to
As illustrated in
The encryption unit 65C encrypts the measurement result by the determination unit 62 according to a predetermined encryption algorithm such as AES. The output unit 66C outputs the measurement result encrypted by the encryption unit 65C to the identification device 16 via the network I/F 35.
As illustrated in
The acquisition unit 70C acquires the encrypted determination result outputted from the verification device 14. The acquisition unit 70C also acquires, from the storage device 18, the verification information corresponding to the identification information of the identification target. The decryption unit 75A decrypts the encrypted determination result acquired by the acquisition unit 70C. The verification device 14 and the identification device 16 pre-store a common key that is used for the encryption by the encryption unit 65C and the decryption by the decryption unit 75A.
Similarly to the generation unit 64, the generation unit 77A generates an identification key Key2 that is unique to the identification target from the determination result obtained through the decryption by the decryption unit 75A, and from the non-physical information U2 that does not depend on the physical property of the identification target and that differs for each identification target. The identification key Key2 generated by the generation unit 77A is inputted to the verification unit 72.
Next, the operation of the individual identification system 10 according to the present embodiment will be described with reference to
First, output processing in which the verification device 14 outputs the determination result will be described with reference to
In
Next, identification processing in which the identification device 16 identifies an identification target will be described with reference to
In step S31A-1 of
As described earlier, the present embodiment affords the same advantageous effects as those of the first embodiment even when, in the first embodiment, the functions of the generation unit 64 of the verification device 14 are transferred to the identification device 16.
Note that, although cases are described in the fifth and sixth embodiments in which some of the functions of the verification device 14 according to the first embodiment are transferred to the identification device 16, the functions of the verification device 14 and the identification device 16 may also be realized by one device, as illustrated in
In each of the foregoing embodiments, a case in which diamond is applied as the identification target has been described, but the present invention is not limited to diamond. For example, a solid other than a diamond may also be applied as the identification target. For example, a bag-packed powder such as fused silica and alumina may be applied as the identification target. In this case, examples of a physical quantity that depends on the physical property of the identification target include the particle size distribution of the powder, and examples of the image feature of the identification target include the color of the powder.
For example, a liquid containing ions of a specific substance may be applied as the identification target. In this case, an example of a physical quantity that depends on the physical property of the identification target includes an ion concentration. For example, a liquid containing a specific substance may be applied as the identification target. In this case, examples of a physical quantity that depends on the physical property of the identification target include the concentration of the specific substance in the gas.
Furthermore, in each of the foregoing embodiments, in a case in which there are a plurality of bases, such as a warehouse and a delivery center, through which the identification target passes between the sender and the purchaser, information indicating the number of times legitimacy is verified each time may be applied as the number of verifications of the non-physical information items U1 and U2. In this case, for example, the non-physical information items U1 and U2 used in the verification of the identification target at the first base include the number of verifications indicating the first time, and the non-physical information items U1 and U2 used in the verification of the identification target at the second base include the number of verifications indicating the second time. Here, because the identification key and the verification information thereof are different at each base through which the identification target passes between the sender and the purchaser, the identification target can be independently verified.
As a specific example, a first delivery party delivers the identification target product from the sender to the port, station, or airport, a second delivery party delivers the product from that port, station, or airport to the destination port, station, or airport, a third delivery party delivers the product from the destination port, station, or airport to a collection-delivery station, and a fourth delivery party delivers the product from the collection-delivery station to the purchaser. In this case, and when it is determined that the product delivered to the purchaser is not an authentic product, it is possible to specify at which stage the product was switched as follows:
The sender generates a first non-physical information item with the count set to 1 and sends the first non-physical information item to the second delivery party. The sender sends, to the third delivery party, a second non-physical information item with the count set to 2 and the random number also changed, and sends, to the fourth delivery party, a third non-physical information item with the count set to 3 and the random number also changed. Finally, the sender sends, to the purchaser, a fourth non-physical information item with the count set to 4 and the random number also changed.
Upon receiving a product from the first delivery party, the second delivery party uses the first non-physical information item to verify the product, and sends the verification result to the first delivery party or the sender. Upon receiving the product from the second delivery party, the third delivery party uses the second non-physical information item to verify the product, and sends the verification result to the second delivery party or the sender. Upon receiving the product from the third delivery party, the fourth delivery party uses the third non-physical information item to verify the product, and sends the verification result to the third delivery party or the sender. Upon receiving the product from the fourth delivery party, the purchaser uses the fourth non-physical information item to verify the product, and sends the verification result to the fourth delivery party or the sender.
Here, in a case where the product is switched en route, because the delivery party or purchaser who was to receive the product knows the verification result, which is verified as fraudulent, at the stage immediately after the switch, the delivery party or purchaser does not receive the product and contacts the sender. Although an example is illustrated here in which each delivery party verifies the product and delivers the product to the next delivery party or to the purchaser, product verification is performed each time the product is received also in a case where, for example, the first recipient receives the product from the first delivery party and where the second delivery party receives the product from the first recipient and delivers the product. In this case, it is assumed that the first non-physical information item is sent to the first recipient and a new non-physical information item with a modified count and random number is sent to the second delivery party. Accordingly, the product is verified at each stage the product is distributed, and hence if the product is switched, it is possible to specify at which stage the product was switched.
Next, a case will be considered where the first purchaser resells the product to a second purchaser while demonstrating the authenticity of the product. In this case, irrespective of the authenticity of the product, the first purchaser is able to counterfeit the verification device that outputs the identification key Key2 or authenticity information that the product is legitimate, which corresponds to the non-physical information held by the first purchaser. In order to prevent the foregoing, the second purchaser receiving the resold product from the first purchaser asks the sender to issue a new non-physical information item, and uses the new non-physical information item issued by the sender to verify the product. In this case, since the first purchaser is unable to generate an identification key Key2 that corresponds to the new non-physical information item, the second purchaser is able to ascertain that the product received from the first purchaser is not a genuine product. Thus, the first purchaser is unable to resell a counterfeit version of the product. The sender is also able to ascertain how their own products are being resold.
In an example where a product passes through a plurality of bases, adding additional information for each base as non-physical information may be considered. Examples of the additional information include information such as a reception date and time, a re-shipment date and time at each base, a management temperature at the base, or the like. In this case, the non-physical information is different including the number of verifications. In contrast, for example, the following four countermeasures are conceivable.
As a first countermeasure, in a case in which each base has a registration device, it is conceivable to perform the registration processing illustrated in the first to fourth embodiments by using, as new non-physical information, information that is obtained by concatenating additional non-physical information in order, starting with initial non-physical information, and to newly register the verification information of an identification key Key1' that is obtained by the registration processing, in a recording device. At the time of verification, verification is performed similarly to the first to fourth embodiments on the assumption that the new non-physical information is encrypted using a key that is shared with the next reception destination and stored in the storage device or directly sent to the next reception destination. This verification can be handled when there is no non-physical information for each number of verifications as described earlier, and the load on the sender is the smallest.
As a second countermeasure, in a case in which non-physical information having the number of verifications allocated to the bases is used, verification information of the identification key Key1' is generated and recorded as new non-physical information that is obtained by concatenating the non-physical information and the additional information for each base, similarly to the first countermeasure, and verification is performed. Thus, the processing at each base can be made efficient.
As a third countermeasure, in a case in which each base does not have a registration device, an output using a one-way function such as a hash value for non-physical information to be added is calculated, an exclusive OR, from the output and an identification key Key1 generated using non-physical information including the number of verifications of the base, is taken as a new identification key Key1', and the verification information is registered in the storage device. At the time of verification, first, an identification key Key2 is generated using the previous non-physical information having the number of verifications of the base, and the result of taking the exclusive OR and the hash value for the additional non-physical information is verified as the identification key Key2'.
As a fourth countermeasure, in a case in which there is no verification count in the non-physical information, a hash value obtained by concatenating non-physical information from initial non-physical information to additional non-physical information is generated, and verification information for the result of taking the identification key Key1 generated using the initial non-physical information, and the exclusive OR, is registered as a new identification key Key1', and an identification key Key2', which is generated by using non-physical information that has been encrypted and registered during verification, or that is used during registration and sent to the next reception destination, is inspected.
Alternatively, rather than an exclusive OR, a hash value may be generated by concatenating, with the additional non-physical information, an identification key Key2 that was inspected at the time of reception, and a value using a one-way function generated from information that includes the inspected identification key Key2 and the additional non-physical information may also be used as the new identification key Key1'.
Moreover, in each of the foregoing embodiments, various processing, which is executed as a result of the CPU executing software (a program), may be executed by various processors other than the CPU. Examples of the processor in this case include a PLD in which the circuit configuration can be changed after manufacturing, such as an FPGA, and a dedicated electric circuit which is a processor having a circuit configuration exclusively designed to execute specific processing such as an application specific integrated circuit (ASIC). Various processing may be executed by one of these various processors, or may be executed by a combination of two or more processors of the same type or different types (for example, a plurality of FPGAs, a combination of a CPU and an FPGA, and so forth). More specifically, the hardware structure of these various processors is, more specifically, an electric circuit in which circuit elements such as semiconductor elements are combined.
In the third and fourth embodiments, various processing executed by the processors 20A, 20B, 30A, and 30B may be executed due to the CPU executing software (a program).
In each of the foregoing embodiments, an aspect in which the registration program 29 is pre-stored (-installed) in the storage unit 22 has been described, but the present invention is not limited to this arrangement. The registration program 29 may be provided in a form recorded on a recording medium such as a compact disc read only memory (CD-ROM), a digital versatile disc read only memory (DVD-ROM), or a universal serial bus (USB) memory. The registration program 29 may also be downloaded from an external device via a network.
Furthermore, in each of the foregoing embodiments, an aspect in which the verification program 39 is pre-stored (-installed) in the storage unit 32 has been described, but the present invention is not limited to this arrangement. The verification program 39 may be provided in the form of being recorded on a recording medium such as a CD-ROM, a DVD-ROM, or a USB memory. The verification program 39 may also be downloaded from an external device via a network.
In each of the foregoing embodiments, an aspect in which the identification program 48 is pre-stored (pre-installed) in the storage unit 42 has been described, but the present invention is not limited to this arrangement. The identification program 48 may also be provided in the form of being recorded on a recording medium such as a CD-ROM, a DVD-ROM, or a USB memory. The identification program 48 may also be downloaded from an external device via a network.
The disclosure of Japanese Patent Application No. 2020-009468, filed on Jan. 23, 2020, is incorporated herein by reference in its entirety. All documents, patent applications, and technical standards disclosed in the present specification are incorporated herein by reference to the same extent as if the individual documents, patent applications, and technical standards were specifically and individually marked as being incorporated by reference.
Number | Date | Country | Kind |
---|---|---|---|
2020-009468 | Jan 2020 | JP | national |
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/JP2020/048166 | 12/23/2020 | WO |