A zero-knowledge verification method based on blockchain
A verification method, blockchain technology, applied in the field of zero-knowledge verification based on blockchain, can solve the problems of easy tampering of transaction privacy, information leakage, information leakage, etc., and achieve resistance to system structure erosion, high security performance, and improved The effect of modularity
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0037] Embodiment 1: A zero-knowledge verification method based on blockchain, including:
[0038] obtaining, by the blockchain, a receiving identifier from the provider, wherein the receiving identifier corresponds to the visit of the blockchain authentication provider;
[0039] the blockchain obtains a second identifier, the second identifier corresponding to the receiving identifier, the receiving identifier being different from the second identifier;
[0040] access by the blockchain to a secure database containing a stored private identifier, wherein the stored private identifier is a combination of the received received identifier and the retrieved second identifier, the secure database comprising a blockchain search a secure database for searching the secure database to obtain corresponding search results based on input received from the display terminal; the corresponding second identifier is generated by the blockchain based on the received identifier, the region The...
Embodiment 2
[0041] Embodiment 2: A zero-knowledge verification method based on blockchain, including:
[0042] obtaining, by the blockchain, a receiving identifier from the provider, wherein the receiving identifier corresponds to the visit of the blockchain authentication provider;
[0043] the blockchain obtains a second identifier, the second identifier corresponding to the receiving identifier, the receiving identifier being different from the second identifier;
[0044] access by the blockchain to a secure database containing a stored private identifier, wherein the stored private identifier is a combination of the received received identifier and the retrieved second identifier, the secure database comprising a blockchain search a security database, the search security database is based on the input received from the display terminal to obtain corresponding search results;
[0045] The blockchain sends the search results to and displays on the display terminal. Specifically, in this...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com



