Digital identity verification method, device and equipment and storage medium
A digital identity and verification method technology, applied in the computer field, can solve problems such as no client for users to use and manage digital identities, no digital identity verification system, and imperfect system definition, so as to ensure absolute controllability and guarantee Absolute possession, avoiding the effect of leakage
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 example
[0117] figure 2 It is a flow chart of a digital identity verification method according to the first embodiment of the application. This embodiment is applicable to the interaction between the DID client and the third-party platform, based on the verification of DID and claim, so that users can use DID to log in In the case of a third-party platform, the method can be executed by a DID client, and can be executed by a digital identity verification device, which is implemented in software and / or hardware, and is preferably configured in an electronic device, such as the DID to which the DID client belongs. holder's terminal equipment. Such as figure 2 As shown, the method specifically includes the following:
[0118] S210. Obtain target login information of the target third-party platform in response to the target user's login operation on the target third-party platform.
[0119] In a specific embodiment of the present application, the target user refers to a user who uses...
no. 2 example
[0136] Figure 5 It is a flow chart of a digital identity verification method according to the second embodiment of the present application. On the basis of the first embodiment above, this embodiment further explains the process of the DID client authorizing the target third-party platform to obtain the specified claim , can authorize the target third-party platform with the assistance of blockchain network, proxy re-encryption technology and personal user center. Such as Figure 5 As shown, the method specifically includes the following:
[0137] S510. In response to the target user's login operation on the target third-party platform, obtain target login information including at least the DID of the target third-party platform.
[0138] S520. According to the target login information, send a login request including the target user DID to the target third-party platform.
[0139] S530. According to the DID of the target third-party platform, obtain the DID document associ...
no. 3 example
[0154] Figure 8 It is a flow chart of applying for a claim according to the third embodiment of the present application. On the basis of the above-mentioned first embodiment, this embodiment further explains the process of the DID client applying for a claim from the authority, which can be issued by the authority. Come and get a claim. Such as Figure 8 As shown, the method specifically includes the following:
[0155] S810. According to the service information of the authority in the authority registration center, search for the target authority issuing the statement.
[0156] In a specific embodiment of the present application, the authority may register with the authority registration center in advance, so as to configure service information in the authority registration center for release. The service information may include service site information, claim types that can be applied for, and materials required by the applicant, etc. Correspondingly, before applying fo...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


