Content wallet device and self-sovereign identity and copyright authentication system using the same

ABSTRACT

Disclosed is a content wallet device to which a storage device storing a content is connected including a communication unit for communication between the content wallet device and a user terminal device; an encryption unit generating encryption data including a user ID and a password for authentication between the content wallet device and the user terminal device; a switch unit controlling an electrical connection between the storage device and the communication unit; and a reset unit initializing the generated password when the electrical connection between the storage device and the communication unit is released by the switch unit.

TECHNICAL FIELD

The present disclosure relates to a content wallet device and a systemusing the same, and more particularly, to a content wallet device inwhich security of content information is enhanced by newly generating apassword required for self-sovereign identity authentication, and asystem using the same.

BACKGROUND ART

It is common for private business operators who want to operate anonline platform to operate their businesses by entrusting an operatorwho operates a centralized database with data management regardingpersonal information required for membership registration and platformuse history, and the right to use the corresponding information.

In a case where a private online platform operated with the centralizeddatabase as such is hacked by a third party, there is a problem thatdata of other users who use the private online platform in common may beeasily leaked.

In addition, when private business operators who want to operate apersonal online platform use the private online platform, they shouldnot only pay a high fee for use of the private online platform, but mayalso quickly cope with a problem occurring in personal data management.

DISCLOSURE Technical Problem

An object of the present disclosure is to provide to a content walletdevice capable of allowing a user to directly transmit a content storedin a storage device to a purchaser who wants to purchase the contentwithout the intervention of a central management server and enhancingsecurity by generating a new password whenever user authentication isrequired so that hacking or leakage does not easily occur, and a systemusing the same.

Technical Solution

According to an embodiment of the present disclosure, a content walletdevice to which a storage device storing a content is connected mayinclude: a communication unit for communication between the contentwallet device and a user terminal device; an encryption unit generatingencryption data including a user ID and a password for authenticationbetween the content wallet device and the user terminal device; a switchunit controlling an electrical connection between the storage device andthe communication unit; and a reset unit initializing the generatedpassword when the electrical connection between the storage device andthe communication unit is released by the switch unit.

In this case, when the storage device and the communication unit areelectrically connected to each other by the switch unit, the encryptionunit may generate a first random password, when the electricalconnection between the storage device and the communication unit isreleased by the switch unit, the reset unit may initialize the firstrandom password, and when the storage device and the communication unitare electrically connected to each other again by the switch unit, theencryption unit may generate a second random password.

In addition, when the storage device and the communication unit areelectrically connected to each other by the switch unit, thecommunication unit may transmit a signal for blocking a network of theuser terminal device to the user terminal device.

Here, when the network of the user terminal device is blocked, theauthentication may be performed between the content wallet device andthe user terminal device through the encryption data generated by theencryption unit.

Furthermore, the encryption unit may encrypt the content and transmitthe encrypted content to the communication unit, when the storage deviceand the communication unit are electrically connected to each other bythe switch unit.

In addition, the encryption unit may insert an identification codeunique to a user into the content.

According to another embodiment of the present disclosure, a system mayinclude a content wallet device and a user terminal device, wherein thecontent wallet device transmits encryption data including a user ID anda password to the user terminal device for authentication between thecontent wallet device and the user terminal device, and the userterminal device performs the authentication between the content walletdevice and the user terminal device when a password input according to auser's manipulation is matched with the transmitted password.

Here, the content wallet device may randomly generate and transmit apassword for the authentication whenever the authentication between thecontent wallet device and the user terminal device is performed.

In addition, the content wallet device may transmit a signal forblocking a network of the user terminal device to the user terminaldevice when the storage device and the content wallet device areelectrically connected to each other, and the user terminal device mayblock the network when a user's manipulation corresponding to thetransmitted signal is input.

Advantageous Effects

As set forth above, according to various embodiment of the presentdisclosure, when a user sells a content, the user and a purchaser maydirectly sell and purchase the content, respectively, withouttransferring authority to a central management system, and by generatinga new password whenever the user authenticates ownership of the content,a third party hacking may be prevented to prevent illegal leakage of thecontent.

DESCRIPTION OF DRAWINGS

FIG. 1 is a block diagram illustrating a configuration of a contentwallet device according to an embodiment of the present disclosure.

FIG. 2 is a block diagram illustrating a configuration of a contentwallet device according to another embodiment of the present disclosure.

FIGS. 3A and 3B are cross-sectional views for describing the contentwallet device illustrated in FIG. 2.

FIG. 4 is a view for describing a state in which a content wallet deviceis embedded in a user terminal device according to another embodiment ofthe present disclosure.

FIG. 5 is a view for describing a state in which various storage devicesare connected to a content wallet device according to another embodimentof the present disclosure.

FIG. 6 is a diagram for describing a system using a content walletdevice according to an embodiment of the present disclosure.

FIG. 7 is a flowchart for describing a flow of the system using acontent wallet device illustrated in FIG. 6.

FIG. 8 is a diagram for describing a system using a content walletdevice according to another embodiment of the present disclosure.

BEST MODE FOR INVENTION

Hereinafter, the present disclosure will be described in more detailwith reference to the accompanying drawings. In addition, in describingthe present disclosure, when it is decided that a detailed descriptionfor known functions or configurations related to the present disclosuremay obscure the gist of the present disclosure, the detailed descriptiontherefor will be omitted. Further, terms to be described later aredefined in consideration of functions in the present disclosure and maybe changed depending on the intention or relationship of users andoperators. Therefore, these terms should be defined based on contentsthroughout the present specification.

A storage device 300 according to the present disclosure may be anindependent storage device including a storage function, such as anexternal hard drive, a universal serial bus (USB), a compact disk (CD),or a memory card capable of storing a content, and it will hereinafterbe described that the storage device is a memory card (hereinafter,denoted by 300 which is a reference numeral of the storage device), butthe storage device is not limited thereto.

FIG. 1 is a block diagram illustrating a configuration of a contentwallet device according to an embodiment of the present disclosure.

Referring to FIG. 1, the content wallet device 100 may be connected to amemory card 300 in which a content is stored, and may transmit thecontent stored in the memory card 300 to a user terminal device 200.

In this case, the user terminal device 200 may be a mobile terminaldevice, but may be other electronic devices capable of performingelectrical communication, such as a tablet personal computer (PC), apersonal digital assistant (PDA), a wearable device, a laptop computer,a desktop PC, and a digital camera.

In addition, the content wallet device 100 may include a communicationunit 110, an encryption unit 120, a switch unit 130, a storage unit 140,and a reset unit 150 in order to transmit the content.

The communication unit 110 enables communication between the contentwallet device 100 and the user terminal device 200, and communicationmay be performed through a direct connection in a wired manner or anindirect connection in a wireless manner within a predetermined range.

For example, in a connection between the user terminal device 200 andthe content wallet device 100 in the wired manner, a manner ofconnecting the content wallet device 100 to a charging terminalgenerally used in the user terminal device 200 may be used. In addition,the user terminal device 200 and the content wallet device 100 may bedirectly connected to each other using a manner of connecting thecontent wallet device 100 to a terminal into which an external harddrive, a USB, an earphone, or the like, is inserted.

In the connection in the wireless manner, when the content wallet device100 and the user terminal device 200 are positioned within apredetermined range, the content wallet device 100 and the user terminaldevice 200 may be indirectly connected to each other using near fieldcommunication (NFC), radio frequency identification (RFID), Bluetooth,infrared communication, and the like.

The content wallet device 100 and the user terminal device 200 areconnected to each other by the communication unit 110 as such, such thatthe content stored in the memory card 300 inserted into the contentwallet device 100 may be moved to the user terminal device 200, and apassword randomly generated for authentication in the content walletdevice 100 may be moved to the user terminal device 200.

Moreover, the communication unit 110 may transmit a signal for blockinga network of the user terminal device 200 to the user terminal device200, which will be described in detail below.

The encryption unit 120 may generate encryption data including a useridentification (ID) and a password (pass-code) for authenticationbetween the content wallet device 100 and the user terminal device 200.

Specifically, the encryption unit 120 may generate the encryption datawhen the memory card 300 and the communication unit 110 are electricallyconnected to each other.

The user ID included in the encryption data may be a user authenticationID stored in the storage unit 140, and may be, for example, an identityauthentication ID by a decentralized identity (DID).

The DID is a self-sovereign identity verification technology based on adecentralized storage system, and the decentralized storage system is amethod that does not delegate ownership of information that may identifyan identity of an individual to a centralized system such as a specificinstitution or company and separately stores and manages informationrequired for identity verification by end members of a network.

In other words, the self-sovereign identity verification technology is amanner in which individuals prove their sovereignty over identityverification information.

The encryption unit 120 may generate the DID as the encryption datatogether with a password by invoking the DID from the storage unit 140.

In addition, the password included in the generated encryption data maybe a password generated by mixing numbers, letters, symbols, or thelike, with each other or generated by using a number of times of atouch, a pattern, a touch area designation, or the like.

For example, when the number of inputable digits of the generatedpassword is 10, in a case where the user terminal device is a desktopPC, the password may be generated by mixing only numbers from 0 to 9among numbers, letters, or symbols with each other or be generated bymixing Korean, English, and symbols written together with numbers abovethe numbers included in a typewriter with each other.

In addition, the password may be generated in the form of a patternusing a straight line or a curved line from the content wallet device toa screen of the desktop PC.

Furthermore, the encryption unit 120 may encrypt the content stored inthe memory card 300 before the content is transmitted to the userterminal device 200, and transmit the encrypted content to thecommunication unit 110. This is that the encryption unit 120 encryptsthe content when the memory card 300 and the communication unit 110 areelectrically connected to each other by the switch unit 130.

For example, the encryption unit 120 may encrypt the content in ananalog manner using a pre-stored mechanism or encrypt the content in adigital manner using a pre-stored logical algorithm.

The encrypted content is encrypted according to a public key encryptionmanner or a private key encryption manner, and the encryption unit 120may also generate a decryption key and transfer the generated decryptionkey to the communication unit 110 so that the encrypted content may bedecrypted again.

In addition, the encryption unit 120 may exclude the encryption of thecontent and insert only an identification code unique to a user into thecontent so as to identify an original author of the content, in order tosimplify a content encryption process.

For example, the identification code unique to the user may be formedthrough a watermark. The watermark is a technology of inserting a markknown only by the original author of the content, and in a case where athird party who was unauthorized illegally copies or distributes thecontent, the watermark inserted into the content may be extracted toconfirm that the content is the content of the original author and maybe used to track a path through which the content is copied.

The switch unit 130 may control an electrical connection between thememory card 300 and the communication unit 110.

For example, the switch unit 130 is a button type whose position may bephysically changed, and may include a toggle switch, a push buttonswitch, a sliding button switch, and the like.

The switch unit 130 whose position may be physically changed as such mayelectrically connect the memory card 300 and the communication unit 110to each other by moving in a direction in which the memory card 300 isinserted into the content wallet device 100 after the memory card 300 isinserted into the content wallet device 100. Conversely, the switch unit130 may release the electrical connection between the memory card 300and the communication unit 110 by moving in an opposite direction to thedirection in which the memory card 300 is inserted into the contentwallet device 100.

However, this is an embodiment for describing the present disclosure.Therefore, when communication between the content wallet device 100 andthe user terminal device 200 is performed, a manner in which the memorycard 300 and the communication unit 110 are automatically connected toeach other in the content wallet device 100 rather than a manner ofconnecting the memory card 300 and the communication unit 110 to eachother by physically adjusting the position of the switch unit 130 may beimplemented.

In addition, when the memory card 300 and the communication unit 110 areelectrically connected to each other by the switch unit 130, thecommunication unit 110 may transmit the signal for blocking the networkof the user terminal device 200 to the user terminal device 200.

In a case where the user terminal device 200 is a mobile terminaldevice, the communication unit 110 may transmit a message asking whetheror not to switch a mode of the mobile terminal device to an airplanemode to the mobile terminal device, and it may be selected by a user'smanipulation whether or not to switch the mode of the mobile terminaldevice to the airplane mode.

Furthermore, when the network of the user terminal device 200 isblocked, authentication may be performed between the content walletdevice 100 and the user terminal device 200 through the encryption dataincluding the user ID and the password, generated by the encryption unit120.

Continuing to describe the mobile terminal device as an example, in acase where the switch of the mode of the mobile terminal device to theairplane mode is selected by the user, the network of the mobileterminal device may be blocked, and the encryption data generated by theencryption unit 120 may be transmitted to the mobile terminal device.

In this case, the user inputs the password included in the transmittedencryption data to the mobile terminal device, and in a case where theinput password coincides with the password generated by the contentwallet device 100, data regarding copyright identification informationfor the stored content may be additionally recorded in the contentwallet device 100.

In addition, authentication of the user for the encrypted content isperformed by confirming whether or not the password input to the mobileterminal device by a user's manipulation coincides with the passwordgenerated by the content wallet device 100. As a result, self-sovereignidentity authentication may be performed.

As described above, in a case where the user terminal device is thedesktop PC, the desktop PC may receive the password generated by mixingonly the numbers from 0 to 9 among the numbers, the letters, or thesymbols with each other or the password generated by mixing Korean,English, and the symbols written together with the numbers above thenumbers included in the typewriter with each other, and authenticationmay be performed by inputting a password corresponding to the passwordtransmitted through the typewriter or other input device.

In addition, in a case of a pattern password, authentication may beperformed by drawing a transmitted pattern password with a mouse or atouchable screen of the user terminal device to input the password.

Here, it may be confirmed in the storage unit 140 included in thecontent wallet device 100 whether or not the password transmitted by theencryption unit 120 and the password input by the user through the userterminal device 200 coincide with each other.

For example, it may be confirmed through a password authenticationmodule or a password authentication program stored in the storage unit140 whether or not the password transmitted by the encryption unit 120and the password input by the user through the user terminal device 200coincide with each other.

The storage unit 140 may include at least one of a read only memory(ROM), a random access memory (RAM), an erasable programmable read onlymemory (EPROM), an electrically erasable programmable read only memory(EEPROM), and a hard disk, and may be a storage medium including anon-volatile memory capable of storing data.

When the password generated in the content wallet device 100 through thestorage unit 140 and the password input to the user terminal device 200by the user's manipulation coincide each other, the user who is an ownerof the user ID may inquire the content stored in the memory card 300 ofthe content wallet device 100 authenticated through the user terminaldevice 200.

In addition, in a case where it is necessary to transmit the content toanother external terminal device, the inquired content may be selectedand transmitted from the content wallet device 100 to the user terminaldevice 200, and the user terminal device 200 may then transmit thereceived content to another external terminal device.

Here, in a case where the selected content is transmitted from thecontent wallet device 100 to the user terminal device 200, the selectedcontent may be encrypted and then transmitted.

Meanwhile, the content wallet device 100 may include a processor (notillustrated). In this case, the operation of the encryption unit 120described above may be performed by the processor (not illustrated). Inthis case, the encryption unit 120 may be replaced by the processor (notillustrated).

The processor (not illustrated) may read a program stored in thepassword authentication module stored in the storage unit 140 tocalculate whether or not the generated password and the password inputto the user terminal device 200 by the user's manipulation coincide witheach other.

In addition, the processor (not illustrated) may read a program storedin a content encryption module stored in the storage unit 140 to encryptthe content as described above.

The reset unit 150 may initialize the generated password when theelectrical connection between the memory card 300 and the communicationunit 110 is released by the switch unit 130.

For example, when the memory card 300 is inserted into the contentwallet device 100 and the switch unit 130 is moved in the direction inwhich the memory card 300 is inserted into the content wallet device100, the memory card 300 and the communication unit 110 are electricallyconnected to each other, such that the encryption unit 120 may generatea first random password.

Thereafter, when the switch unit 130 is moved in the opposite directionto the direction in which the memory card 300 is inserted into thecontent wallet device 100, the first random password may be initializedby the reset unit 150 while the electrical connection between the memorycard 300 and the communication unit 110 is released.

In this case, the first random password generated by the encryption unit120 is stored in the storage unit 140, and the first random passwordstored in the storage unit 140 may be initialized by the reset unit 150while the electrical connection between the memory card 300 and thecommunication unit 100 is released by the switch unit 130.

When the switch unit 130 is moved again in the direction in which thememory card 300 is inserted into the content wallet device 100, theencryption unit 120 may generate a second random password different fromthe initialized first random password while the memory card 300 and thecommunication unit 110 are electrically connected to each other again,and the second random password may also be stored in the storage unit140.

In this way, whenever the content wallet device 100 and the userterminal device 200 are connected to each other, the encryption unit 120may randomly generate a new password, and the previously randomlygenerated password may be initialized by the reset unit 150 to prevent ahacking risk by a third party.

FIG. 2 is a block diagram illustrating a configuration of a contentwallet device according to another embodiment of the present disclosure,and FIGS. 3A and 3B are cross-sectional views for describing the contentwallet device illustrated in FIG. 2.

Here, the communication unit 110, the encryption unit 120, the switchunit 130, the storage unit 140, and the reset unit 150 have already beendescribed, and a detailed description thereof will thus be omitted.

Referring to FIG. 2, the content wallet device 100 may further includean input unit 160.

The input unit 160 is for receiving a user's manipulation, and thepassword generated by the content wallet device 100 may be input andgenerated to the input unit 160 by the user's manipulation.

In other words, as an embodiment, the randomly generated password may berandomly generated through the encryption unit 120 while the memory card300 and the communication unit 110 are electrically connected to eachother by the switch unit 130 illustrated in FIG. 1, and as anotherembodiment, the password may be input and randomly generated by theuser's manipulation through the input unit 160 illustrated in FIG. 2.

Since the password is generated by the user's manipulation, it will benatural that the password before being initialized by the reset unit 150and the password after being initialized by the reset unit 150 may bethe same as each other.

In this case, the encryption unit 120 illustrated in FIG. 2 may encryptthe content stored in the memory card 300 and generate a decryption keyfor decrypting the encrypted content.

In addition, the encryption unit 120 may generate an identification codeunique to the user so that the original author of the content may beidentified.

Describing an operation of the content wallet device 100 with referenceto FIGS. 3A and 3B, the memory card 300 may be inserted into the contentwallet device 100, and the inserted memory card 300 may be connected tothe encryption unit 120.

In this case, when the switch unit 130 is moved in the direction inwhich the memory card 300 is inserted into the content wallet device100, the encryption unit 120 may generate a user ID by invoking the userID stored in the storage unit 140 while the memory card 300 and thecommunication unit 110 are electrically connected to each other.

In addition, a password arbitrarily input by the user through the inputunit 160 may be randomly generated, and at the same time, be stored inthe storage unit 140.

The password generated through the input unit 160 and the user IDgenerated through the encryption unit 120 may be transferred to thecommunication unit 110.

The randomly generated password transferred to the communication unit110 may be transmitted to the user terminal device 200, and when theuser inputs the randomly generated password through the user terminaldevice 200, the content wallet device 100 receives the password input bythe user through the communication unit 110, and the storage unit 140stores the received password.

In this way, the storage unit 140 may confirm whether or not thepassword randomly generated in the content wallet device 100 and thepassword input to the user terminal device 200 coincide with each other.

In a case where these passwords coincide with each other, the user mayinquire the content stored in the memory card 300 through the userterminal device 200. In addition, when the content is to be transmittedto an external terminal device, the encryption unit 120 may encrypt thecontent stored in the memory card 300 and transfer the encrypted contentto the communication unit 110, and the communication unit 110 maytransmit the encrypted content to the external terminal device throughthe user terminal device 200.

When the switch unit 130 is moved to the opposite direction to thedirection in which the memory card 300 is inserted into the contentwallet device 100, the password stored in the storage unit 140 may beinitialized by the reset unit 150.

However, the content wallet device 100 illustrated in FIGS. 3A and 3B isan example for implementing the present disclosure, and thus, positionsof components included in the content wallet device 100 may be changedaccording to user's use and convenience.

FIG. 4 is a view for describing a state in which a content wallet deviceis embedded in a user terminal device according to another embodiment ofthe present disclosure.

Referring to FIG. 4, the content wallet device 100 may be implemented ina form in which it is embedded in the user terminal device 200.

In this case, communication between the content wallet device 100 andthe user terminal device 200 is performed in a process in which thecontent wallet device 100 is inserted into the user terminal device 200,and when the content wallet device 100 is completely inserted into theuser terminal device 200, the content wallet device 100 and the userterminal device 200 may be electrically connected to each other.

The content wallet device 100 and the user terminal device 200 areelectrically connected to each other, and at the same time, the contentwallet device 100 transmits a message for blocking an externalcommunication network to the user terminal device 200.

When the user inputs a selection to block the external communicationnetwork to the user terminal device 200, the content wallet device 100may randomly generate a password, and invoke a user ID stored in thecontent wallet device 100 and transmit the user ID to the user terminaldevice 200 together with the generated password.

In this case, the password transmitted to the user terminal device 200is input by the user, and the content wallet device 100 matches theinput password and the password randomly generated by the content walletdevice 100 with each other to confirm whether or not the input passwordand the password randomly generated by the content wallet device 100coincide with each other, encrypts the content stored in the memory card300, and transmits the encrypted content to the user terminal device200.

When the transmission of the encrypted content to the user terminaldevice 200 is completed, the inserted content wallet device 100 may beseparated from the user terminal device 200 to the outside.

In this case, the randomly generated password may be initialized whilethe content wallet device 100 is separated from the user terminal device200.

As another example in which the content wallet device 100 is embedded inthe user terminal device 200 and is implemented, a switch unit (notillustrated) whose position may be changed may be included on onesurface of the content wallet device 100 exposed to the outside withoutbeing inserted when the content wallet device 100 is inserted into theuser terminal device 200.

Such a switch unit may be a toggle switch, a push button switch, asliding button switch, and the like, and the electrical connectionbetween the content wallet device 100 and the user terminal device 200may be controlled by moving the switch unit.

FIG. 5 is a view for describing a state in which various storage devicesare connected to a content wallet device according to another embodimentof the present disclosure.

Referring to FIG. 5, the content wallet device 100 may include aplurality of input/output ports, and various storage devices may beconnected to the content wallet device 100 through the input/outputports.

In this case, the wallet device 100 including the plurality ofinput/output ports may be a docking station device such as USB orThunderbolt.

FIG. 6 is a diagram for describing a system using a content walletdevice according to an embodiment of the present disclosure.

Referring to FIG. 6, the system 10 using a content wallet device mayinclude the content wallet device 100 and the user terminal device 200.

The content wallet device 100 may transmit encryption data including auser ID and a randomly generated password to the user terminal device200 for authentication between the content wallet device 100 and theuser terminal device 200.

The user terminal device 200 may perform the authentication between thecontent wallet device 100 and the user terminal device 200 when apassword input according to a user's manipulation is matched with thetransmitted password.

For example, the content wallet device 100 may transmit the randomlygenerated password to the user terminal device 200, the user inputs thetransmitted password through the user terminal device 200, and thecontent wallet device 100 receiving the input password may match theinput password and the randomly generated password with each other toconfirm whether or not the input password and the randomly generatedpassword coincide with each other.

Here, the randomly generated password may be newly generated wheneverthe content wallet device 100 and the user terminal device 200 performthe authentication, and the content wallet device 100 may confirmwhether or not the newly generated password and the input passwordcoincide with each other whenever the authentication is performed.

When the matched passwords coincide with each other, the content walletdevice 100 may transfer the content and the user ID to the user terminaldevice 200, and may directly transmit the encrypted content and a userID together with a decryption key to a user terminal device 200-1 ofanother user who wants to purchase the content.

In this case, the user terminal device 200 may perform identityauthentication by decentralized identities (DIDs) by transmitting theuser ID transmitted from the content wallet device 100 to the userterminal device 200-1 of another user.

For example, when the user terminal device 200 that is to supply thecontent transmits a deactivated user ID (DID) and the encrypted contenttransmitted from the content wallet device 100 to the user terminaldevice 200-1 of another user, the user terminal device 200-1 of anotheruser may perform user identity authentication for a correspondingindividual demand to a supplier by transmitting a self-sovereignidentity (SSI).

To the contrary, another user inputs a password randomly generatedthrough his/her content wallet device 100-1 to the user terminal device200-1, and may transmit a content owned by him/her to the user terminaldevice 200-1 and directly transmit the content to another user terminaldevice 200 when a password transferred from the content wallet device100-1 and the password input by the user of the user terminal device200-1 coincide with each other.

A third party hacking and illegal leakage of contents may be preventedby proving that different users owning the contents are legitimate usersthrough the passwords randomly generated through the content walletdevices 100 and 100-1 and the user terminal devices 200 and 200-1 andthen transmitting the user IDs and the contents.

Referring to FIGS. 1 and 6, the system 10 including the content walletdevice 100 may transmit a signal for blocking a network of the userterminal device 200 to the user terminal device 200 when the memory card300 and the content wallet device 100 are electrically connected to eachother, and the user terminal device 200 may block the network when auser's manipulation corresponding to the transmitted signal is input.

In this case, the blocked network may be an external communicationnetwork of the user terminal device 200, and may include, for example, alocal area network (LAN), a metropolitan area network (MAN), and a widearea network (WAN), and the like.

Specifically, for example, in a case where the user terminal device 200is a mobile terminal device, the communication unit 110 may transmit amessage asking whether or not to switch a mode of the mobile terminaldevice to an airplane mode to the mobile terminal device, and it may beselected by a user's manipulation whether or not to switch the mode ofthe mobile terminal device to the airplane mode.

In this case, when the user selects the switch of the mode of the mobileterminal device to the airplane mode, a network, which is an externalcommunication network of the mobile terminal device, may be blocked, andonly communication between the content wallet device 100 and the userterminal device 200 may be performed through a direct connection in awired manner or an indirect connection in a wireless manner within apredetermined range.

FIG. 7 is a flowchart for describing a flow of the system using acontent wallet device illustrated in FIG. 6.

Referring to FIG. 7, the system 10 using a content wallet device maysequentially perform a step (S100) of inserting the memory card into thecontent wallet device, a step (S200) of determining whether or not theinserted memory card and the content wallet device have been connectedto each other, a step (S300) of transmitting a signal for blocking anetwork from the content wallet device to the user terminal device, astep (S400) of determining whether or not the network of the userterminal device has been blocked, a step (S500) of transmittingencryption data from the content wallet device to the user terminaldevice, a step (S600) of confirming whether or not randomly generatedpasswords between the content wallet device and the user terminal devicecoincide with each other, and a step (S700) of encrypting a content bythe content wallet device and transmitting the encrypted content fromthe content wallet device to the user terminal device.

The step (S100) of inserting the memory card into the content walletdevice is a step of inserting the memory card in which the content isstored into the content wallet device. Then, the step (S200) ofdetermining whether or not the inserted memory card and the contentwallet device have been connected to each other may be performed.

In this case, the step (S200) of determining whether or not the insertedmemory card and the content wallet device have been connected to eachother may be a step of confirming whether or not the memory card and thecontent wallet device have been electrically connected to each other dueto a physical change.

In a case where the memory card and the content wallet device have notbeen electrically connected to each other, the system using a contentwallet device does not perform a procedure of transmitting the contentto the user terminal device.

On the other hand, when the memory card and the content wallet devicehave been electrically connected to each other, the step (S300) oftransmitting the signal for blocking the network from the content walletdevice to the user terminal device may be performed.

The step (S300) of transmitting a signal for blocking a network from thecontent wallet device to the user terminal device may be a step oftransmitting the signal for blocking the network, which is an externalcommunication network used by the user terminal device for communicationwith other electronic devices.

When the signal for blocking the network is normally transmitted to theuser terminal device, it may be selected by a user's manipulationwhether or not to block the network.

The step (S400) of determining whether or not the network of the userterminal device has been blocked may be a step of determining whether ornot the network of the user terminal device has been normally blockedwhen the blocking of the network is selected by the user's manipulation.

When the network of the user terminal device has not been normallyblocked, the system using a content wallet device may return to the step(S200) of determining whether or not the inserted memory card and thecontent wallet device have been connected to each other to determinewhether or not the inserted memory card and the content wallet devicehave been connected to each other.

On the other hand, when the network of the user terminal device has beennormally blocked, the step (S500) of transmitting encryption data fromthe content wallet device to the user terminal device may be performed.

In this case, the encryption data may be data including a user ID and arandomly generated password.

The step (S500) of transmitting encryption data from the content walletdevice to the user terminal device may be a step of randomly generatinga password and transmitting the randomly generated password to the userterminal device by the encryption unit included in the content walletdevice when the memory card and the content wallet device are normallyconnected to each other.

In this case, the user ID as well as the randomly generated password maybe transmitted to the user terminal device.

When the randomly generated password is transmitted to the user terminaldevice as described above, the step (S600) of confirming whether or notthe randomly generated passwords between the content wallet device andthe user terminal device coincide with each other may be performed.

In the step (S600) of confirming whether or not the randomly generatedpasswords between the content wallet device and the user terminal devicecoincide with each other, when the randomly generated passwordtransmitted to the user terminal device is input to the user terminaldevice by a user's manipulation, the input password is transmitted tothe content wallet device, and the transmitted password is matched withthe randomly generated password in the content wallet device.

When the matched passwords do not coincide with each other, the step(S200) of determining whether or not the inserted memory card and thecontent wallet device have been connected to each other may beperformed, and the previously randomly generated password may beinitialized and another password may be randomly generated while anelectrical connection between the memory card and the content walletdevice is newly made. On the other hand, when the matched passwordscoincide with each other, the step (S700) of encrypting the content bythe content wallet device and transmitting the encrypted content fromthe content wallet device to the user terminal device may be performed.

The step (S700) of encrypting the content by the content wallet deviceand transmitting the encrypted content from the content wallet device tothe user terminal device may be a step of transmitting the encryptedcontent together with a decryption key capable of decrypting theencrypted content so that another user to which an original author ofthe content is to transmit the content and a user who normally purchasesthe content may use the content, simultaneously with encrypting thecontent stored in the memory card.

In this case, the encrypted content may be transmitted in a state inwhich an identification code unique to the user is inserted into theencrypted content, in order to identify the original author of thecontent.

FIG. 8 is a diagram for describing a system using a content walletdevice according to another embodiment of the present disclosure.

Referring to FIG. 8, the system 10 using a content wallet device maydirectly transmit contents between users who own user terminal devices200, 200-1, 200-2, 200-3, 200-4, and 200-5 for free or for a fee, butthe user may easily receive desired contents by using content walletdevices 100, 100-1, 100-2, 100-3, 100-4, and 100-5 for a plurality ofuser terminal devices 200, 200-1, 200-2, 200-3, 200-4, and 200-5.

In this case, when any one of the plurality of user terminal devices200, 200-1, 200-2, 200-3, 200-4, and 200-5 performs user authenticationthrough the content wallet device 100 and then transmits an encryptedcontent to a network, the network may provide a preview or relatedinformation of the encrypted content.

Then, in a case where a plurality of users view the preview or therelated information of the encrypted content through their own userterminal devices 200-1, 200-2, 200-3, 200-4, and 200-5 and want topurchase the encrypted content, the plurality of users make payment forthe encrypted content, and when the payment is completely made, anoriginal author who owns the encrypted content may transmit theencrypted content and a decryption key together to the other userterminal devices 200-1, 200-2, 200-3, 200-4, and 200-5.

Here, purchase histories, transmission histories, and the like, betweenthe user terminal devices 200, 200-1, 200-2, 200-3, 200-4, and 200-5that use the content wallet devices 100, 100-1, 100-2, 100-3, 100-4, and100-5 may be performed and stored by a distributed ledger.

The distributed ledger may be based on a generally used blockchain, andall the exchange histories of the content using the content walletdevice 100 according to the present disclosure may be stored by usingthe distributed ledger.

In addition, the distributed edger may store information on a user whocreates the purchase history, the transmission history, and the like,through a user ID transmitted from each of the content wallet devices100, 100-1, 100-2, 100-3, 100-4, and 100-5.

In this case, as described above, the used user ID is a userauthentication ID owned by the user of each of the content walletdevices 100, 100-1, 100-2, 100-3, 100-4, and 100-5, that is, adecentralized ID (DID).

Accordingly, each of the users may view all histories stored by thedecentralized ledger, and it may be easily known which users have madepurchases, transmissions, and the like, such that transparenttransactions are possible.

In addition, the user may directly manage a user authentication methodin which the identity information was managed by a central server byusing the DID.

In other words, for example, when the content stored in the memory cardis a moving image, a decentralized ID (DID) required for identityauthentication of the user may be transmitted from the user terminaldevice 200 that is to supply the moving image to the user terminaldevices 200-1, 200-2, 200-3, 200-4, and 200-5 that are to purchase themoving image.

Thereafter, when the user terminal devices 200-1, 200-2, 200-3, 200-4,and 200-5 that are to purchase the moving image transmit identityauthentication values (SSIs), such that identity authentication of usersis established, the moving image may be encrypted in which it is notcompletely disclosed, and be transmitted to the user terminal devices200-1, 200-2, 200-3, 200-4, and 200-5 that are to purchase the movingimage together with a decryption key.

In this process, all of supply records of the user terminal device 200that has supplied the moving image, purchase histories of the userterminal devices 200-1, 200-2, 200-3, 200-4, and 200-5 that are topurchase the moving image, and the like, may be stored in distributedledger data by each of the user terminal devices 200-1, 200-2, 200-3,200-4, and 200-5.

Although embodiments of the present disclosure have been illustrated anddescribed hereinabove, the present disclosure is not limited to theabove-mentioned specific embodiments, but may be variously modified bythose skilled in the art to which the present disclosure pertainswithout departing from the scope and spirit of the present disclosure asdisclosed in the accompanying claims. These modifications should also beunderstood to fall within the scope of the present disclosure.

1. A content wallet device to which a storage device storing a contentis connected, comprising: a communication unit for communication betweenthe content wallet device and a user terminal device; an encryption unitgenerating encryption data including a user ID and a password forauthentication between the content wallet device and the user terminaldevice; a switch unit controlling an electrical connection between thestorage device and the communication unit; and a reset unit initializingthe generated password when the electrical connection between thestorage device and the communication unit is released by the switchunit, wherein when the storage device and the communication unit areelectrically connected to each other by the switch unit, thecommunication unit transmits a signal for blocking a network of the userterminal device to the user terminal device.
 2. The content walletdevice of claim 1, wherein when the storage device and the communicationunit are electrically connected to each other by the switch unit, theencryption unit generates a first random password, when the electricalconnection between the storage device and the communication unit isreleased by the switch unit, the reset unit initializes the first randompassword, and when the storage device and the communication unit areelectrically connected to each other again by the switch unit, theencryption unit generates a second random password.
 3. (canceled)
 4. Thecontent wallet device of claim 2, wherein when the network of the userterminal device is blocked, the authentication is performed between thecontent wallet device and the user terminal device through theencryption data generated by the encryption unit.
 5. The content walletdevice of claim 1, wherein the encryption unit encrypts the content andtransmits the encrypted content to the communication unit, when thestorage device and the communication unit are electrically connected toeach other by the switch unit.
 6. The content wallet device of claim 1,wherein the encryption unit inserts an identification code unique to auser into the content.
 7. A system comprising a content wallet deviceand a user terminal device to which a storage device storing content isconnected, wherein the content wallet device transmits encryption dataincluding a user ID and a password to the user terminal device forauthentication between the content wallet device and the user terminaldevice, and the user terminal device performs the authentication betweenthe content wallet device and the user terminal device when a passwordinput according to a user's manipulation is matched with the transmittedpassword, wherein the content wallet device transmits a signal forblocking a network of the user terminal device to the user terminaldevice when the storage device and the content wallet device areelectrically connected to each other, and the user terminal deviceblocks the network when a user's manipulation corresponding to thetransmitted signal is input.
 8. The system of claim 7, wherein thecontent wallet device randomly generates and transmits a password forthe authentication whenever the authentication between the contentwallet device and the user terminal device is performed.
 9. (canceled)