A storage method, device and equipment for a verifiable claim
A declaration and device technology, applied in the computer field, can solve problems such as identities cannot communicate with each other, users cannot have identities, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 2
[0151] Figure 5A schematic flowchart of a method for storing verifiable claims provided in Example 2 of this specification. From a program point of view, the subject of execution of the process can be a program or an application client installed on an application server. Specifically, it may be a device for providing proxy services for decentralized identification. In this embodiment, the execution subject may be the first device for providing the proxy storage service of verifiable claims, that is, the DIS.
[0152] Such as Figure 5 As shown, the process may include the following steps:
[0153] Step 502: Obtain a first storage request sent by the holder of the verifiable statement; the first storage request is used to request the first device to provide proxy storage service for the holder's verifiable statement.
[0154] The first device here may be a device corresponding to the DIS. The holder does not directly request the data warehouse to store the verifiable state...
Embodiment 3
[0185] Figure 7 A schematic flowchart of a method for storing verifiable claims provided in Example 3 of this specification. From a program point of view, the subject of execution of the process can be a program or an application client installed on an application server. Specifically, it may be a device for providing proxy services for decentralized identification. In this embodiment, the execution subject may be the first device for providing the proxy storage service of verifiable claims, that is, the DIS.
[0186] Such as Figure 7 As shown, the process may include the following steps:
[0187] Step 702: Obtain a first storage request sent by the issuer of the verifiable statement; the first storage request is used to request the first device to provide proxy storage service for the verifiable statement issued by the issuer.
[0188] The execution subject in this embodiment is the same as the execution subject in Embodiment 2. The first storage request in this embodim...
Embodiment 1
[0274] Corresponding to Embodiment 1, the instruction 1120 may enable the at least one processor 1110 to:
[0275] Controlling the data warehouse used to store verifiable claims obtains verifiable claim storage requests;
[0276] Obtain the distributed digital identity of the sender of the request;
[0277] judging whether the sender has the right to use the data warehouse according to the distributed digital identity, and obtaining a first judging result;
[0278] When the first judgment result indicates that the sender has the right to use the data warehouse, store the verifiable statement requested by the sender in the database of the data warehouse.
[0279] Based on the same idea, the embodiment of this specification also provides equipment corresponding to the method in the above-mentioned embodiment 1. The equipment may include:
[0280] at least one processor; and,
[0281] a memory communicatively coupled to the at least one processor; wherein,
[0282] The memory...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


