User identity privacy protection method and system based on zero-knowledge proof
A zero-knowledge proof, user identity technology, applied in the field of user identity privacy protection based on zero-knowledge proof, can solve the problems of identity privacy exposure and user identity privacy cannot be well protected.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0030] Such as figure 1 As described above, the embodiment of the present invention provides a zero-knowledge proof-based user identity privacy protection method flow, including the following steps:
[0031] S1. Identity key request: the data user 10 sends an identity key generation request message to the identity management center 30 through the established secure channel, and the request message includes the identity information of the data user 10 .
[0032] S2. Identity key generation: The identity management center 30 generates an identity key uniquely representing its identity for the data user 10 according to the identity information of the data user 10, and stores the identity information of the data user 10 into the locally maintained data In the user information table, the identity key of the data user 10 is sent to the data user 10 through a secure channel.
[0033] S3. Public parameter setting: setting public parameters of the data user 10 and the big data publish...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com