ELECTRONIC VOTING SYSTEM AND ELECTRONIC VOTING METHOD
20230052587 · 2023-02-16
Inventors
Cpc classification
H04L9/3226
ELECTRICITY
G06F21/6254
PHYSICS
International classification
G06F21/62
PHYSICS
Abstract
The present invention relates to an electronic voting system and an electronic voting method. The system for electronic voting includes an operation computer including at least one processor and a memory coupled to the processor, wherein the processor causes the system to: perform user authentication of voting participants who wish to participate in the online electronic voting; anonymize information of the voting participants whose the user authentication has been completed; give unique identification information to each of the voting participants who have completed anonymization process; and collect the voting information that the electronic voting has been conducted using the unique identification information given to the voting participants, and count the collected voting information as voting results.
Claims
1. A system for electronic voting, comprising: an operation computer comprising at least one processor and a memory coupled to the at least one processor, wherein the at least one processor causes the system to: perform user authentication of voting participants who wish to participate in the online electronic voting; anonymize information of the voting participants whose the user authentication has been completed; give unique identification information to each of the voting participants who has completed the anonymization process; and collect the voting information that the electronic voting has been conducted using the unique identification information given to the voting participants and count the collected voting information as voting results.
2. The system for electronic voting of claim 1, wherein the at least one processor further causes the system to distribute and store the voting results in a storage means of the voting participants and a storage means of the voting targets to share a ledger of the voting results.
3. The system for electronic voting of claim 1, further comprising an identity authentication system that supports user authentication of the voting participants, wherein the user authentication of the voting participants causes at least one processor to: request to confirm whether the voting participant is the same person as the person known to the related person with terminal information of related persons including the acquaintance of the voting participant obtained from the participant terminal used by the voting participant and receive the identity verification information regarding the voting participant; extract information of related parties who agree that the voting participants are the same from among the received identity verification information, transmit the extracted voting participants to the identity authentication and request identity authentication of the voting participants; and determine the user authentication of the voting participant by receiving the identity authentication related information of the voting participant transmitted from the identity authentication system.
4. The system for electronic voting of claim 3, wherein generation of the identity authentication related information of the voting participant received by the operating computer comprising: analyzing, by the identity authentication system, communication details between extracted related persons transmitted from the operating computer and the voting participants and extracting relationship data of the communication details indicating a specific relationship between people; determining, by the identity authentication system, consistency between the extracted relationship data of the communication details and relationship data indicating a specific relationship between persons that the identity authentication system has itself or is collected and analyzed from external media; and generating, by the identity authentication system, information on whether the voting participants are identical based on the determination of the consistency.
5. The system for electronic voting of claim 1, wherein the anonymization of the voting participant information causes at least one processor to: delete all of the initial information provided by the voting participants to receive user authentication; and generate single new information and give the same single new information to all voting participants whose initial information has been deleted to anonymize the information of all voting participants by the same single new information.
6. The system for electronic voting of claim 2, wherein the sharing of the ledger of the voting results causes at least one processor to: manage virtual account information, which is a storage space allocated to at least one voting target, and identification account information, which is a storage space allocated to each of the voting participants; store information on the number of votes cast for each voting target in the at least one virtual account of the voting target; store the voting information of other voting participants who voted for the specific voting target, including user voting information for the specific voting target in the identification account of each of the voting participants; and process the information recorded in the virtual account of the specific voting target and the information recorded in the identification account of each voting participant who voted for the specific voting target to be the same.
7. The system for electronic voting of claim 1, further comprising a cloud computing system that is connected to communication with the operating computer to store voting related information including voting information of the voting participants, votes cast information of a voting target, and voting result aggregate information, and connected to communication with the terminal of the voting participant and the terminal of the voting target to provide stored voting related information.
8. An electronic voting method comprising: performing, by at least one processor of an operating computer, user authentication of voting participants who wish to participate in the online electronic voting; anonymizing, by the at least one processor of the operating computer, information of the voting participants whose the user authentication has been completed; giving, by the at least one processor of the operating computer, unique identification information to each of the voting participant who has completed anonymization process; collecting, by the at least one processor of the operating computer, the voting information that the electronic voting has been conducted using the unique identification information given to the voting participants and counting the collected voting information as voting results.
9. The electronic voting method of claim 8, further comprising distributing and storing the voting results in a storage means of the voting participants and a storage means of the voting targets to share a ledger of the voting results.
10. The electronic voting method of claim 8, further comprising an identity authentication system that supports user authentication of the voting participants, wherein the user authentication of the voting participants causes the operating computer to: request to confirm whether the voting participant is the same person as the person known to the related person with terminal information of related persons including the acquaintance of the voting participant obtained from the participant terminal used by the voting participant and receive the identity verification information regarding the voting participant; extract information of related parties who agree that the voting participants are the same from among the received identity verification information, transmit the extracted voting participants to the identity authentication and request identity authentication of the voting participants; and determine the user authentication of the voting participant by receiving the identity authentication related information of the voting participant transmitted from the identity authentication system.
11. The electronic voting method of claim 10, wherein generation of the identity authentication related information of the voting participant causes the identity authentication system to: analyze communication details between extracted related persons transmitted from the operating computer and the voting participants and extracting relationship data of the communication details indicating a specific relationship between people; determine consistency between the extracted relationship data of the communication details and relationship data indicating a specific relationship between persons that the identity authentication system has itself or is collected and analyzed from external media; and generate information on whether the voting participants are identical based on the determination of the consistency.
12. The electronic voting method of claim 8, wherein the anonymization of the voting participant information causes at least one processor to: delete all of the initial information provided by the voting participants to receive user authentication; and generate single new information and give the same single new information to all voting participants whose initial information has been deleted to anonymize the information of all voting participants by the same single new information.
13. The electronic voting method of claim 9, wherein the sharing of the ledger of the voting results causes at least one processor to: manage virtual account information, which is a storage space allocated to at least one voting target, and identification account information, which is a storage space allocated to each of the voting participants; store information on the number of votes cast for each voting target in the at least one virtual account of the voting target; store the voting information of other voting participants who voted for the specific voting target, including user voting information for the specific voting target in the identification account of each of the voting participants; and process the information recorded in the virtual account of the specific voting target and the information recorded in the identification account of each voting participant who voted for the specific voting target to be the same.
14. A system for electronic voting, comprising: an operation computer that manages the electronic voting of voting participants by performing anonymization of the voting participants participating in the online electronic voting, and comprises at least one processor and a memory coupled to the at least one processor, wherein the at least one processor causes the system to: delete initial information including name and phone number information provided by the voting participants; give same single new information to all voting participants whose initial information has been deleted; and perform anonymization by marking voting participants with the same single new information.
15. The system for electronic voting of claim 14, wherein the at least one processor of the operating computer generates and gives unique identification information that is distinct from each other to voting participants whose anonymization has been completed.
16. A system for electronic voting, comprising: an operating computer that collects and manages voting information of voting participants participating in online electronic voting, and comprises at least one processor and a memory coupled to the at least one processor, wherein the at least one processor causes the system to: store information of virtual account, which is a storage space allocated to each of the at least one voting target, and information of identification account, which is a storage space allocated to each of the voting participants, store information on the number of votes cast for each voting target in the at least one virtual account of the voting target; store voting information of other voting participants who voted for a specific voting target, including user voting information for the specific voting target in the identification account of each of the voting participants; and process the information recorded in the virtual account of the specific voting target and the information recorded in the identification account of each voting participant who voted for the specific voting target to be the same.
17. An electronic voting method comprising: deleting, by an operating computer, initial information including name and phone number information provided by the voting participants; giving, by the operating computer, same single new information to all voting participants whose initial information has been deleted; and performing, by the operating computer, anonymization by marking voting participants with the same single new information.
18. The electronic voting method of claim 17, further comprising generating and giving, by the operating computer, unique identification information that is distinct from each other to the voters who have completed the anonymization.
19. An electronic voting method comprising: storing, by at least one processor of an operating computer, information of virtual account, which is a storage space allocated to each of the at least one voting target, and information of identification account, which is a storage space allocated to each of the voting participants, storing, by the at least one processor of the operating computer, information on the number of votes cast for each voting target in the at least one virtual account of the voting target; storing, by the at least one processor of the operating computer, voting information of other voting participants who voted for a specific voting target, including user voting information for the specific voting target in the identification account of each of the voting participants; and processing, by the at least one processor of the operating computer, the information recorded in the virtual account of the specific voting target and the information recorded in the identification account of each voting participant who voted for the specific voting target to be the same.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0022]
[0023]
[0024]
[0025]
[0026]
[0027]
[0028]
[0029]
[0030]
[0031]
[0032]
[0033]
[0034]
[0035]
[0036]
[0037]
[0038]
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT
[0039] Hereinafter, embodiments of the present invention will be described in detail with reference to the accompanying drawings.
[0040] Although the terms used in the present invention may have various expressions, those determined to be suitable for describing the embodiment of the present invention are selected and used among them. Therefore, the terms used in the present invention are not limited thereto, and may be used as terms that can be substituted or substituted in general in the technical field.
[0041] Also, the terms used in the present invention may include a plurality of meanings. For example, among terms describing an embodiment of the present invention, “˜computer, ˜unit, ˜module, ˜means”, etc. may indicate hardware itself, and software executed by utilizing the hardware resource, that is, a web program, application programs, cloud computing programs, etc. Accordingly, it may be appropriately interpreted corresponding to the entire context of the description of the embodiments of the present invention.
[0042] In addition, among the terms used in the description of the embodiments of the present invention, “˜system” may mean an invention consisting of a combination of components including at least one hardware or software, a configuration of the invention, or a configuration element of the invention.
[0043]
[0044] As illustrated in
[0045]
[0046] As illustrated in
[0047] The operating computers 100 and 1000 in the embodiment of the present invention shown in
[0048]
[0049] As illustrated in
[0050] The personal information and participant terminal information of those who wish to participate in the voting includes name and phone number information.
[0051] The identity verification for the user authentication using the identity authentication means or identity authentication system 5000 will be described later.
[0052] The voting target information may include information such as a candidate's affiliation, personal information, academic background, career, and commitment when the voting target is an election. In addition, when the voting target is a survey, the voting target information may include information for voting in favor or against, or selection of, the contents of the questionnaire. In addition, the voting target information may include information corresponding to various voting targets, such as a general meeting of shareholders of the company.
[0053] In the case of a plurality of voting targets (candidates) for one voting act of the voting participants, for example, in the case of an election, virtual accounts allocated to each of a plurality of candidates may be given. Accordingly, the number of votes received by candidate A may be counted in the virtual account of candidate A.
[0054] The participant identification account management module 1600 records the information that the voting participant voted in the identification account assigned to each voting participant, as well as the voting information of a plurality of other voting participants for the same voting target.
[0055] The identification account of the participant may be configured to be accessible through the cloud computing system 10.
[0056] In the above embodiment of the present invention, it has been described that the user authentication of the voting participants is authenticated by verifying the identification of the voting participant through the identification authentication system, but is not limited thereto.
[0057] The user authentication for voting participation of voters can be performed in the range where the error prevention and security are secured, for example, through a general online self-authentication method. For example, ID/password input, mobile phone authentication, i-PIN authentication, security card authentication, OTP authentication, or identity authentication through an accredited certificate can also be performed.
[0058] In addition, the participant identification information management module 1300 of the operating computer includes a user authentication processing module for performing user authentication of each voting participant who requests to participate in voting through the participant terminal, and an anonymization processing module that anonymizes information of the voting participants who the user authentication in the user authentication module is completed.
[0059] The user authentication processing module receives the initial information of the voting participants transmitted from at least one participant terminal and performs user authentication processing of the voting participants through identification of each voting participant.
[0060] The anonymization processing module can be configured to delete all the initial information of the voting participants whose user authentication has been completed in the user authentication processing module, and to perform anonymization processing of voting participants by generating the same single new information and giving it to all voting participants, shown in
[0061]
[0062] As illustrated in
[0063]
[0064] As illustrated in
[0065]
[0066] As illustrated in
[0067]
[0068] As illustrated in
[0069] The identity management computer 5100 may be configured as at least one server computer having a communication means and capable of executing a computer program or a web program. The artificial intelligence computer 5200 may include at least one server computer having a communication means and capable of executing an artificial intelligence (AI) related computer program or web program. The data storage computer 5300 and the analysis data storage computer 5400 may be configured as a database management system (DBMS). The authentication requester terminal 5500 and the related person terminal 5600 are provided with communication means, and may be composed of terminals such as smartphones, tablet computers, personal computers (PC), notebook computers in which applications or web programs can be executed.
[0070] The application or web program provided by the authentication requester terminal 5500 may be configured as a personal authentication approval request means for requesting the identity authentication approval to the identity management computer 5100. The application or web program provided by the related party terminal 5600 may be configured as an identity confirmation data providing means for providing the identity management computer 5100 with relationship information and communication details with the requester of the user authentication. The Internet social network 5700 is configured to include various social network services (SNS) and Internet media.
[0071] The embodiment of the present invention comprising: receiving, by the identity management computer 5100, information of related persons such as acquaintances of the authentication requester and communication information of related persons from the authentication requester when the authentication requester terminal 5500 requests user authentication; requesting and receiving, by the identity management computer 5100, relationship information and communication details information with the authentication requester to the related person terminal 5600 to verify whether the authentication requester is the same person to the related persons; requesting, by the identity management computer 5100, identity verification by transmitting communication details information of the related persons to the artificial intelligence computer 5200; determining, by the artificial intelligence computer 5200, the consistency between the data analyzed by the received relationship information and communication details information of the related persons and the big data database generated by itself collected from the Internet social network 5700 to verify the identity; transmitting, by the artificial intelligence computer 5200, the identity verification information to the identity verification computer 5100; and transmitting, by the identity management computer 5100, the identity authentication approval information generated based on the received identity verification information to the authentication requester terminal 5500.
[0072] When the communication details information is voice information, the information may be analyzed using voice recognition technology or by determining whether the voice matches, or using a voice text conversion technique, and the like.
[0073] The relationship information between the related persons and the authentication requester may include, for example, family members, relatives, friends, work colleagues, school classmates, social members, and acquaintances for hobbies.
[0074] In addition, the communication details information of the related persons or related person group includes various types of communication information performed using a mobile phone, for example, a mobile phone text message (SMS, MMS, etc.), a chat message in a chatting application program running on a mobile phone, a text message on a social network service (SNS), e-mail letters, and Internet voice calls on mobile phones.
[0075] In the embodiment of the identity authentication system 5000 of the present invention, the function of the artificial intelligence computer 5200 is performed by the identity management computer 5100 and the artificial intelligence computer 5200 may be omitted.
[0076]
[0077] As shown in
[0078] The related person group management module 5140 may generate and manage related person groups by grouping related persons of the authentication requester into categories for example such as family, relatives, friends, work, school, friendship, and hobbies.
[0079] The security of information data and personal information of related persons in the related person identification data security management module 5170 may be encrypted and stored to protect communication details and contents thereof. When it is necessary to analyze the communication details and its contents, it can be decrypted and analyzed, and encrypted and stored again after the analysis processing. In addition, analysis processing is possible without decryption of communication details and contents encrypted by homomorphic encryption technology or the like.
[0080] The anti-corruption information management module 5190, for example, in order to prevent self-authentication by a person other than the authentication requester despite the unknown relationship between the authentication requester and the related person for illegal purposes, can use the method of verifying the name through a bank account opened in the name of the authentication requester, or verifying the validity of the name of the authentication requester's mobile phone in use through password confirmation.
[0081] The motive of illegal use of the identity authentication system of the present invention can be blocked by taking measures such as giving a strong penalty to an illegal user or deducting a reliability score index.
[0082]
[0083] As shown in
[0084] If the face picture or mobile phone number input from the authentication requester terminal 5500 managed by the authentication requester data management unit 5121 is different from that previously managed, the change history is recorded by the identity management computer 5100 can be stored and managed.
[0085]
[0086] As shown in
[0087] The reliability of the person who has received user authentication approval managed by the user authentication reliability information management unit 5163 can be given a reliability index score of, for example, 80 points when the first user authentication is approved, and when data is further analyzed and authenticated by an artificial intelligence computer due to an increase in communication details in the future, a reliability index score may be additionally given according to a predetermined criterion.
[0088] The predetermined criterion for adding the index score of reliability can be determined in proportion to, for example, the number of related persons who participated in the identity verification, the total number of related persons groups, the total period during which messages are transmitted and received. And it can be set based on a numerical value that is proportional or inversely proportional to the average of users of each item.
[0089] The at least one password input by the user who wants to receive the user authentication of the authentication requester information management unit 5110 is a means for preventing illegal use and involuntary use such as misuse, theft, etc. of the identity authentication request. For example, two passwords can be set for daily use and for emergency use. The daily password is used to receive user authentication normally, and the emergency password is used involuntarily by coercion in abnormal situations such as kidnapping. The daily use password and the emergency password are set differently, and the daily use password and the emergency password are processed in the same way through the above-described procedure when an authentication request is made. However, the user can selectively set the emergency password.
[0090] In addition, the user can set or select the action to be taken on the operating computer when the user authentication request is made by entering the emergency password. For example, the operating computer may be set to transmit a message notifying that the user is in an emergency situation to an immediate family member, lover, or friend along with location information. In addition, it can be set to request help by sending a message directly to an investigation agency such as a police station.
[0091] In addition, in relation to changing the password, the change of the daily password can be performed in a conventional way by accessing the operating computer, and the change of the emergency password can be performed only face-to-face in a specific location such as a financial institution or community center affiliated with the identity authentication system of the present invention.
[0092] In addition, an input field may be configured to input the password together with a name and a face photograph, or a name and a mobile phone number, on the application screen of the authentication requester terminal 5500 when the authentication requester terminal 5500 requests user authentication. In this case, the input order of the items to be entered into the input box may be arbitrarily entered. However, if the input order for each item is consistently set, a procedure to check whether illegal use is performed may be performed according to a change in the input order.
[0093]
[0094] As shown in
[0095] Determination of artificial intelligence operation errors in the artificial intelligence error information management module 5250, manual operation setting, and problem solving due to strong artificial intelligence, respectively, can be used to control artificial intelligence using the collective intelligence convergence system (Applicant's registered patent No. 10-1804960).
[0096]
[0097] As shown in
[0098] The criteria setting information management unit 5242 may be set the criteria which for example divides the group of related persons into, for example, family, friends, and workplace, and sets the number of family members to at least 3, the number of friends to at least 7, and the number of office workers to at least 10.
[0099] In addition, in the communication details characteristic statistics management unit 5243, for example, the characteristics of transmission and reception are the number of related persons for each related person group, the total transmission and reception period, transmission and reception period, number of transmission and reception, reaction time between transmission and reception, title, subject, word, vocabulary, sentences, honorifics, abbreviations, whether emoticons are used, usage, punctuation marks, whether abbreviations or short words are used, singularities in content, etc. Mathematical main values such as the average, standard deviation, maximum value, and minimum value of each item related to the transmission and reception characteristics may be calculated, or a frequently used expression may be stored in the analysis data storage computer 5400.
[0100] The average data management unit 5244 for each related person group may write, for example, as shown in Table 1 below in order to calculate average data of transmission and reception items for each related person group.
TABLE-US-00001 TABLE 1 Family Friends Workplace Number of related persons 3 persons 7 persons 10 persons Total period of Transmission/Reception 350 days 70 days 280 days Cycle of Transmission/Reception 5 days 12 days 2 days Number of Transmission/Reception 2 times/week 1 times/week 3 times/week Total time of Transmission/Reception 15 minutes 90 minutes 3 minutes Topic Meal Promise Work Word Rice Location Report Sentence Eat Meet Dine together
[0101] In the determination of identity in the identity determination information management unit 5245, for example, when the numerical value of a specific item, such as the number of related persons, is less than the average, the criterion of other items may be strengthened than the average.
[0102] For example, the transmission/reception period may be longer, the transmission/reception period may be further reduced, the number of transmission and reception is required more, the response time between transmission/reception may be further shortened, or the degree of matching of subjects, words, and sentences may be increased.
[0103] On the other hand, when the numerical value of a specific item, such as the number of related persons, is greater than the average, the criteria for other items may be relaxed compared to the average to determine equality.
[0104] The analysis-related big data management module 5220 of the artificial intelligence computer 5200 receives pre-entered data such as representative words, vocabulary, sentences, and expressions used in the relation by the system operator for each relation group of the authentication requester and data provided by those who have agreed to use the identity authentication system of the present invention, updates and accumulates data such as representative words, vocabulary, sentences, and expressions used in the relationship. In addition, the artificial intelligence computer can access various social network services (SNS) and internet media to collect expressions used in specific relationships, and store and manage these data in the analysis data storage unit 5400 as big data.
[0105]
[0106] As illustrated in
[0107]
[0108] As illustrated in
[0109] The data storage means 5300 and the analysis data storage means 5400 are not limited to the above embodiment. In addition, it may be configured to store the execution results of the identity management computer 5100 and the artificial intelligence computer 5200.
[0110] In the embodiment of the present invention, when the authentication requester is a corporation (company) rather than an individual, it can be considered that the corporation does not have a risk of personal information leakage and that the method of verifying the identity of the corporation is well prepared in the existing system. For example, it can be applied by setting a different criterion, such as using the address of a corporation instead of the photo of the authentication requester, or by relaxing the method of verifying identity compared to the case of an individual.
[0111] For example, if the authentication requester is a corporation (company), the related person group can be set with at least one employee, customer, and customer.
[0112] In addition, as an auxiliary means for preventing illegal use, verification through the bank of a corporation (company), verification through corporate registration number inquiry, or verification method through business registration number can be used.
[0113] Hereinafter, the operation of the electronic voting system of the embodiment of the present invention described with reference to
[0114] <User Authentication of Voting Participants>
[0115] Online user authentication of voting participants (here, both those who want to participate in voting and voting participants are used interchangeably) are performed using the identity authentication means or identity authentication system (hereinafter collectively referred to as the ‘identity authentication system’).
[0116] The operating computer performs an identity verification of the voting participants based on the consistency information between data capable of inferring the relationship between the voting participant and the related person by analyzing the communication details between the related people group and the voting participant provided through information of the related person group including the acquaintances provided by the voting participants to verify the identity of the voting participants and attribute data representing acquaintance relationships between persons collected and stored by the identity authentication system, and performs the user authentication of the voting participants based on the extracted identity verification information of the voting participants.
[0117] The information provided from the voting participants for identity verification and user authentication of the voting participants includes the names of voting participants and their mobile phone numbers. The user authentication can be performed by receiving a photo of the voting participant, but in the electronic voting system of the present invention, since anonymization of the voting participant is important, it is preferable to receive a name. In addition, it is good to be provided with the gender information of the voting participants for the verification of the voting results and statistical processing. In addition, in the electronic voting system of the present invention, a related person group or related persons for identity verification by using the identity verification system in the electronic voting system of the present invention sets a condition for confirmation of a predetermined number or more among specific groups such as family, friends, lovers, co-workers, etc., and then the artificial intelligence computer may be configured to automatically combine a set number according to a result of performing a task.
[0118] In addition, when the subject of voting is an election, it is necessary to confirm the age of the voting participant in order to confirm the voting age of the voting participant. For example, if the electable date of birth is set to Oct. 15, 1999, the relevant information can be provided by requesting confirmation from the related persons as to whether the voting participant was born before the relevant date and month.
[0119] In addition, if the subject of voting is a local election, it is necessary to confirm the address of the voting participant. In this case, the identity authentication system is affiliated with an address confirmation organization such as a courier company, post office, or e-commerce company that delivers a commerce object to a specific person's address, or joins as a member, and the identity authentication system provides the name and phone number of the voting participant to the address verification institution, and can check the record of whether or not parcels or mail have been recently delivered or delivered to the address of the voting participant.
[0120] In addition, in the early stage of system construction of the present invention, it is possible to supplementally verify the age and address of the voting participants through business alliances with public institutions such as government agencies.
[0121] <Anonymization of Voting Participants>
[0122] In order to proceed with voting in the electronic voting system of the present invention, the information of the voting participants whose user authentication and voting participation qualifications are confirmed is anonymized. In order to anonymize voting participants, the operating computer deletes all the initial information of voting participants (e.g., name and phone number information of voting participants to perform user authentication), and then is given the same new information (e.g., one name and one specific phone number) to all voting participants. After the operation computer confirms that the initial information of all voting participants is deleted and the same new information is given, unique identification information is given to each voting participant. The unique identification information given to each voting participant can be created by, for example, a combination of numbers including country information and regional information (e.g., kr-02-554-3028, etc.).
[0123] In this way, before giving unique identification information to the voting participants, the anonymization process as described above is performed, so that it is impossible to know whose unique identification information is assigned.
[0124] If the anonymization process is described as an example, as shown in
[0125] As a result, each of the three voting participants has their own identification information, but it is impossible to know which of the three provided identification information is, and as a result, it is anonymized.
[0126] <Vote by Voting Participants>
[0127] The unique identification information of a voting participant given through the anonymization process of the voting participant can be used as an ID for voting in the electronic voting system of the present invention.
[0128] When a voting participant conducts a vote, voting for the voting target is carried out only with the unique identification information given to the voting participants, and the voting participant's personal information can be thoroughly blocked. However, it may be configured so that information about the region, gender, age, etc. of the voting participants can be utilized for statistical processing, etc. within the scope that does not harm the secret ballot.
[0129] If the voting participant is given unique identification information and does not immediately proceed with voting, if within the voting period, access the operating system and log in using the unique identification information as an ID, and then vote.
[0130] After the voting participant completes the voting, the voting participant's unique identification information may be deactivated and processed so that it cannot be used for voting. After the voting participant votes with the unique identification information, the unique identification information is deactivated so that voting cannot be performed again, but the operation computer collects the voting information of the voting participant and the vote information of the voting target and can be configured to be used for inquiry.
[0131] In addition, in order to prevent fraudulent proxy voting of the vote, if the vote is not conducted with the unique identification information within a set period, the corresponding unique identification information may be inactivated.
[0132] <Shared Ledger of Voting Result Information>
[0133] The total number of unique identification information given to voting participants whose identity verification has been completed and their eligibility to participate in the voting for the voting target has been confirmed is calculated and stored as the information on the total number of voting participants (e.g., the total number of voters if the subject of voting is an election) who participated in the voting target. The total number of unique identification information of the voters who voted for the voting target (e.g., all candidates if the voting target is an election) is calculated as the sum of the total number of votes and stored as the total number of votes. With the final result numerical value stored in the unique identification information of the voting participants who voted for a specific target, the total number of votes for a specific target among the voting targets is calculated and stored.
[0134] The results of the electronic voting performed based on the unique identification information of the voting participants are configured so that the voting participants, voters, and operating computers can share them in a single ledger form.
[0135] Hereinafter, the ledger sharing process of the electronic voting system of the present invention will be described in more detail by taking an election as an example.
[0136] 1) Voting participants who have verified their identity and eligibility to participate in voting (hereinafter referred to as ‘voters’) when a votes for candidate A, candidate A sends plus 1 vote (+1) information to own virtual account (for counting votes) and at the same time transmit the plus 1 vote (+1) information to voter a's unique identification information (e.g., kr-01-785-123456789).
[0137] 2) Voter a stores one plus vote (+1) in an identification account (allocated storage space provided by the cloud, etc.) linked to his or her own identification information.
[0138] 3) When voter b, whose identity verification and voting eligibility have been confirmed, votes for candidate A, candidate A adds 1 plus (+1) information to voter a's 1 and adds 2 to his virtual account (for counting votes).
[0139] At the same time, voter b sends the plus one vote (+1) information to voter b's unique identification information (e.g., kr-01-785-1234567444), and the number of votes 2 is stored by adding the number of votes (+1) to candidate A of voter a to the identification account associated with voter b's unique identification information.
[0140] At the same time, the number of votes 2 is stored by adding the number of votes (+1) of voter b to candidate A to the identification account linked to the unique identification information of voter a. In other words, candidate A may be configured to transmit and store a new number of votes of 2 in each identification account of the voters a and b who voted for him.
[0141] 4) When voter c, who has verified his/her identity and eligibility to participate in voting, votes for candidate A, candidate A adds +2 votes (+2) information to 1 voted vote by voter c and adds 3 votes to his/her virtual account (for counting votes).
[0142] At the same time, voter c transmits plus one vote (+1) information to voter c's unique identification information (e.g., kr-01-785-1234567547), and the number of votes 3 is stored by adding the number of votes (+2) to candidate A of voter a and b to the identification account associated with voter c's unique identification information.
[0143] At the same time, the number of votes 3 is stored by adding the number of votes (+1) to candidate A of voter c to each identification account associated with the unique identification information of voters a and b.
[0144] In other words, candidate A may be configured to transmit and store a new number of 3 votes in each identification account of the voters (a and b and c) who have voted for him.
[0145] An example of the ledger sharing process of the electronic voting system of the present invention is shown in Table 2 below.
TABLE-US-00002 TABLE 2 Candidates Voters Ledger Number of Votes cast A a 1 + 1 + 1 3 B 1 + 1 + 1 c 1 + 1 + 1 C f 1 + 1 + 1 + 1 + 1 + 1 5 g 1 + 1 + 1 + 1 + 1 + 1 h 1 + 1 + 1 + 1 + 1 + 1 i 1 + 1 + 1 + 1 + 1 + 1 j 1 + 1 + 1 + 1 + 1 + 1
[0146] Voters a, b, and c who voted for candidate A simultaneously share in real time the cumulative number of votes for candidate A according to the above procedure. Therefore, as a result, candidate A and all voters who voted for candidate A share a ledger with the same result value.
[0147] Due to the characteristic configuration of the electronic voting system of the present invention, the personal information of the voting participants is already deleted and anonymized with the assigned unique identification information, so personal information exposure is fundamentally blocked, and the cumulative number of votes and voting result values since sharing of is processed as encrypted identification information, it can be implemented so that personal information is not exposed.
[0148] In addition, the contents of the shared ledger of each candidate and voter can be implemented so that the data is stored in the operating system (physical space such as cloud space and server) in real time to track and manage the vote status for each candidate in real time.
[0149] In addition, the candidate's vote count information and voter's real-time vote share sharing information of the voters allocate virtual space such as cloud in the system to each candidate and voter, respectively, and store it, and at the same time, each candidate and each voter's personal terminal (pc, laptop, mobile phone, communication equipment, etc.) can be operated to prevent manipulation and forgery by double storing data and ledgers in the physical space (hard disk, etc.).
[0150] In addition, the electronic voting system of the present invention grants unique identification information through anonymization to voters whose user authentication and voting qualifications have been confirmed, and the voting participants vote based on the received unique identification information. Therefore, in the voting results, invalid votes do not occur, and the verification method can be made concisely and clearly.
[0151] In addition, as can be seen from the above description, according to the embodiment of the present invention, false and fraudulent qualifications of voters can be fundamentally blocked, and the anonymity of voters is thoroughly guaranteed to ensure secret voting, and to equal voting is thoroughly guaranteed by giving only one unique identification information, and voting can be executed in a fundamentally impossible manner, such as manipulation of the total number of voting participants, manipulation of the number of votes cast per candidate, and manipulation of counting by joint conspiracy between candidates.
[0152]
[0153] As shown in
[0154] In the embodiment of the present invention of
[0155]
[0156] As shown in
[0157]
[0158] The embodiments of the present invention described above are only some of the various predictable embodiments implementing the technical idea of the present invention.
[0159] In the electronic voting system and method of the present invention, the user authentication of the voting participants and verification of information required for voting participation is performed based on the identity verification information of a certain number of related persons of the voting participants, and the technical idea for the anonymization of the voting participants whose user authentication has been completed, and the voting participants who have undergone the anonymization process are given unique identification information to participate in voting, and the unique identification information given to the voting participants is used as the basis for voting and voting results counting, and various types of technical ideas included in the technical idea that solve all problems of electronic voting by storing and sharing the ledger for recording voting results in a cloud system with storage space for voting participants and voting subjects, as well as on the operating computer and on its own server It is natural that the embodiment is included in the protection scope of the present invention.