Unlock instant, AI-driven research and patent intelligence for your innovation.

A storage method, device and equipment for a verifiable claim

A declaration and device technology, applied in the computer field, can solve problems such as identities cannot communicate with each other, users cannot have identities, etc.

Active Publication Date: 2020-08-07
ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] To sum up, the main problems of centralized identity are at least the following two. One is that users cannot have their own identities in the true sense, and the other is that identities cannot communicate with each other.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A storage method, device and equipment for a verifiable claim
  • A storage method, device and equipment for a verifiable claim
  • A storage method, device and equipment for a verifiable claim

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 2

[0151] Figure 5A schematic flowchart of a method for storing verifiable claims provided in Example 2 of this specification. From a program point of view, the subject of execution of the process can be a program or an application client installed on an application server. Specifically, it may be a device for providing proxy services for decentralized identification. In this embodiment, the execution subject may be the first device for providing the proxy storage service of verifiable claims, that is, the DIS.

[0152] Such as Figure 5 As shown, the process may include the following steps:

[0153] Step 502: Obtain a first storage request sent by the holder of the verifiable statement; the first storage request is used to request the first device to provide proxy storage service for the holder's verifiable statement.

[0154] The first device here may be a device corresponding to the DIS. The holder does not directly request the data warehouse to store the verifiable state...

Embodiment 3

[0185] Figure 7 A schematic flowchart of a method for storing verifiable claims provided in Example 3 of this specification. From a program point of view, the subject of execution of the process can be a program or an application client installed on an application server. Specifically, it may be a device for providing proxy services for decentralized identification. In this embodiment, the execution subject may be the first device for providing the proxy storage service of verifiable claims, that is, the DIS.

[0186] Such as Figure 7 As shown, the process may include the following steps:

[0187] Step 702: Obtain a first storage request sent by the issuer of the verifiable statement; the first storage request is used to request the first device to provide proxy storage service for the verifiable statement issued by the issuer.

[0188] The execution subject in this embodiment is the same as the execution subject in Embodiment 2. The first storage request in this embodim...

Embodiment 1

[0274] Corresponding to Embodiment 1, the instruction 1120 may enable the at least one processor 1110 to:

[0275] Controlling the data warehouse used to store verifiable claims obtains verifiable claim storage requests;

[0276] Obtain the distributed digital identity of the sender of the request;

[0277] judging whether the sender has the right to use the data warehouse according to the distributed digital identity, and obtaining a first judging result;

[0278] When the first judgment result indicates that the sender has the right to use the data warehouse, store the verifiable statement requested by the sender in the database of the data warehouse.

[0279] Based on the same idea, the embodiment of this specification also provides equipment corresponding to the method in the above-mentioned embodiment 1. The equipment may include:

[0280] at least one processor; and,

[0281] a memory communicatively coupled to the at least one processor; wherein,

[0282] The memory...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of this specification discloses a storage method, device and equipment for a verifiable statement. The solution includes: the data warehouse used to store the verifiable statement obtains the verifiable statement storage request, and obtains the distributed digital identity of the sender of the request. According to the distributed digital identity of the sender, it can be judged whether the sender has a data warehouse If the sender has the permission to use the data warehouse, the verifiable statement requested by the sender can be stored in the database of the data warehouse.

Description

technical field [0001] The present application relates to the field of computer technology, and in particular to a method, device and equipment for storing verifiable claims. Background technique [0002] Initially, digital identity authentication was centralized. The essence of a centralized identity system is that a centralized authority holds identity data. The authentication, authorization and other processes around the data are determined by the centralized organization. Digital identities are not controlled by users themselves. On the other hand, different centralized websites have their own identity systems, so users need to re-register an account on each website. The identity systems (and data corresponding to accounts) of different websites are not interoperable. [0003] To sum up, the main problems of centralized identity are at least the following two. One is that users cannot have their own identities in the true sense, and the other is that identities canno...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06F21/62H04L29/06
CPCG06F21/604G06F21/6218G06F2221/2141H04L63/0876H04L63/105
Inventor 杨仁慧
Owner ALIPAY (HANGZHOU) INFORMATION TECH CO LTD