Digital identity management method and device, storage medium and electronic equipment

A digital identity and management method technology, applied in the blockchain field, can solve problems such as the unavailability of digital identity

Active Publication Date: 2020-05-19
CLOUDMINDS SHANGHAI ROBOTICS CO LTD
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There is often a one-to-one correspondence between a digital identity and a key pair. Once the key of a digital identity is

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Digital identity management method and device, storage medium and electronic equipment
  • Digital identity management method and device, storage medium and electronic equipment
  • Digital identity management method and device, storage medium and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] Specific embodiments of the present disclosure will be described in detail below in conjunction with the accompanying drawings. It should be understood that the specific embodiments described here are only used to illustrate and explain the present disclosure, and are not intended to limit the present disclosure.

[0030] figure 1 It is a flowchart of a digital identity management method shown according to an exemplary embodiment of the present disclosure. Such as figure 1 As shown, the method is applied to a blockchain system, including steps 101 to 105.

[0031] In step 101, the digital identity creation request sent by the client is received, the digital identity creation request includes multiple sets of asymmetric key pair information, and each set of asymmetric key pair information includes the information of the set of asymmetric key pair A key pair number, a key pair type, and a public key, the key pair type at least including an algorithm type for generating...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a digital identity management method and device, a storage medium and electronic equipment, and the method comprises the steps: receiving a digital identity building request transmitted by a user side, and enabling the digital identity building request to comprise a plurality of groups of asymmetric secret key pair information; under the condition that it is determined that the digital identity creation request is a legal request, using the multiple sets of asymmetric key pair information as digital identity content of the user side to be stored in a block chain system; generating a digital identity identifier according to all data included in the digital identity creation request, and establishing a corresponding relationship between the digital identity identifier and the digital identity content; and sending the digital identity identifier to the user side. The digital identity created by the method can correspond to a plurality of asymmetric key pairs, anda user can verify the digital identity of the user through the plurality of asymmetric key pairs, so that the problem that the digital identity is unavailable or out of control under the condition that a unique key pair corresponding to the digital identity is lost or leaked is avoided.

Description

technical field [0001] The present disclosure relates to the field of blockchain, in particular, to a digital identity management method, device, storage medium and electronic equipment. Background technique [0002] Digital identity (ID) is an indispensable part of the information system. Whether the user or the manager of the information system accesses the information system, the information system will rely on the digital identity of the participant to identify or authenticate it. After passing or certification, the information system party provides services within the scope of authorization. The actor mentioned above could be a person, or a machine or device. There is often a one-to-one correspondence between a digital identity and a key pair. Once the key of a certain digital identity is out of control, such as being forgotten, lost, or stolen, it will directly cause the digital identity to be unusable. Contents of the invention [0003] The purpose of this disclos...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/0442H04L63/08H04L9/50
Inventor 谢辉
Owner CLOUDMINDS SHANGHAI ROBOTICS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products