Digital identity authentication method, equipment, device and system and storage medium

A digital identity and authentication method technology, applied in the blockchain field, can solve the problems of single form of digital identity authentication and low security performance

Active Publication Date: 2019-06-28
SHENZHEN THUNDER NETWORK TECH
View PDF10 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The main purpose of the present invention is to provide a digital identity authentication method, equipment, device, system and computer-readab

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Digital identity authentication method, equipment, device and system and storage medium
  • Digital identity authentication method, equipment, device and system and storage medium
  • Digital identity authentication method, equipment, device and system and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0073] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0074] The terms "first", "second", "third", "fourth", etc. (if any) in the specification and claims of the present application and the above drawings are used to distinguish similar objects, and not necessarily Used to describe a specific sequence or sequence. It is to be understood that the terms so used are interchangeable under appropriate circumstances such that the embodiments describ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a digital identity authentication method which is applied to a blockchain platform and comprises the following steps: responding to a digital identity information acquisition request sent by a user terminal, and sending a digital identity information ciphertext of a target user to the user terminal, so that the user terminal decrypts the digital identity information ciphertext to generate a digital identity information plaintext; responding to a digital identity information acquisition request sent by the verification terminal, and sending the digital identity information ciphertext of the target user and the security level to a verification terminal, so that the verification terminal judges whether the digital identity information ciphertext is matched with the digital identity information plaintext submitted by the user terminal or not, and if yes, performing security verification corresponding to the security level on the user terminal. The invention furtherdiscloses a digital identity authentication device, device and system and a computer readable storage medium. According to the invention, customized demands for various authentication modes can be met, and the security and reliability of digital identity authentication are improved.

Description

technical field [0001] The present invention relates to the technical field of block chains, in particular to a digital identity authentication method, device, device, system and computer-readable storage medium. Background technique [0002] With the development of information technology and network technology, digital identity verification has become a common scene in today's society. However, the digital identity verification in the prior art is generally relatively simple and single, and there is no distinction between verification scenarios of different importance, which are only provided by the verifier using the digital identity information provided by the approver who issues the digital identity and the user. The proof materials are compared and verified. Therefore, for some application scenarios that require a high level of security, such as banking business scenarios, the security reliability of the existing technology obviously needs to be improved. In view of t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32H04L9/08
CPCH04L9/32H04L9/08H04L9/40
Inventor 张骁
Owner SHENZHEN THUNDER NETWORK TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products