Unlock instant, AI-driven research and patent intelligence for your innovation.

A digital identity recovery method based on smart contracts and self-social media

A technology of digital identity and social media, applied in the field of information security, can solve problems such as complicated process and unavoidable cooperation of multiple third-party users to commit evil

Active Publication Date: 2020-10-30
安徽中科晶格技术有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This retrieval method requires the cooperation of multiple third-party users, the process is complicated and the possibility of multiple third-party users cooperating to commit evil cannot be ruled out

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A digital identity recovery method based on smart contracts and self-social media
  • A digital identity recovery method based on smart contracts and self-social media

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] In this embodiment, a digital identity recovery method based on smart contracts and self-social media is that the user already has a digital identity in the blockchain, and the digital identity is associated with a unique public key, which is stored in the block In the chain, the user holds the private key corresponding to the public key; the user's real identity is associated with the digital identity through the public key and the private key; the user retrieves the digital identity through the WeChat authorization mechanism as follows: identity, such as figure 1 Shown:

[0034] Step 1. The user first sends a contract transaction to the Ethereum blockchain, and deploys in the Ethereum blockchain through his own digital identity to generate a digital identity recovery contract belonging to the user;

[0035] Step 2. In the preparatory stage, the user obtains information in n self-social media according to the authorization mechanism of the n self-social media (includi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a digital identity retrieval method based on smart contract and self-social media. A user relies on the smart contract on a block chain through his social media account in thecase that a private key associated with the digital identity is lost to retrieve the original digital identity. In the digital identity retrieval method, in the case that the private key is lost, theuser can still retrieve his original identity through his social media account, and can continue to have control over his original identity, thereby achieving the purpose of digital identity retrieval.

Description

technical field [0001] The invention relates to the field of information security, in particular to a method for retrieving digital identities based on smart contracts and social media. Background technique [0002] As a globally distributed database system, the blockchain has the characteristics of unforgeable tampering and data sharing across the network. Because of these good characteristics, the application of blockchain technology in identity management has attracted unanimous attention from both academia and industry. However, there are the following defects in the existing methods for retrieving digital identity accounts: [0003] 1. Retrieve the digital identity account by backing up the public and private keys, that is, generate the backup public and private keys at the same time as the main public and private keys are generated. control. Most backup keys and master keys are stored on the end device, and there is a high possibility of losing them together. If the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/08
CPCH04L9/0891H04L9/3215
Inventor 赵赫周桐李芳李晓风谭海波张中贤王卫东吕波
Owner 安徽中科晶格技术有限公司