Unlock instant, AI-driven research and patent intelligence for your innovation.

Digital identity verification method, device and equipment and storage medium

A digital identity and verification method technology, applied in the computer field, can solve problems such as no client for users to use and manage digital identities, no digital identity verification system, and imperfect system definition, so as to ensure absolute controllability and guarantee Absolute possession, avoiding the effect of leakage

Active Publication Date: 2020-06-12
BEIJING BAIDU NETCOM SCI & TECH CO LTD
View PDF7 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, digital identity verification technologies based on decentralization are still in the exploratory and initial stage, the system definition is not perfect, and there is no client that is convenient for users to use and manage digital identities, so in fact there is no complete set of decentralized avatars digital identity verification system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Digital identity verification method, device and equipment and storage medium
  • Digital identity verification method, device and equipment and storage medium
  • Digital identity verification method, device and equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0117] figure 2 It is a flow chart of a digital identity verification method according to the first embodiment of the application. This embodiment is applicable to the interaction between the DID client and the third-party platform, based on the verification of DID and claim, so that users can use DID to log in In the case of a third-party platform, the method can be executed by a DID client, and can be executed by a digital identity verification device, which is implemented in software and / or hardware, and is preferably configured in an electronic device, such as the DID to which the DID client belongs. holder's terminal equipment. Such as figure 2 As shown, the method specifically includes the following:

[0118] S210. Obtain target login information of the target third-party platform in response to the target user's login operation on the target third-party platform.

[0119] In a specific embodiment of the present application, the target user refers to a user who uses...

no. 2 example

[0136] Figure 5 It is a flow chart of a digital identity verification method according to the second embodiment of the present application. On the basis of the first embodiment above, this embodiment further explains the process of the DID client authorizing the target third-party platform to obtain the specified claim , can authorize the target third-party platform with the assistance of blockchain network, proxy re-encryption technology and personal user center. Such as Figure 5 As shown, the method specifically includes the following:

[0137] S510. In response to the target user's login operation on the target third-party platform, obtain target login information including at least the DID of the target third-party platform.

[0138] S520. According to the target login information, send a login request including the target user DID to the target third-party platform.

[0139] S530. According to the DID of the target third-party platform, obtain the DID document associ...

no. 3 example

[0154] Figure 8 It is a flow chart of applying for a claim according to the third embodiment of the present application. On the basis of the above-mentioned first embodiment, this embodiment further explains the process of the DID client applying for a claim from the authority, which can be issued by the authority. Come and get a claim. Such as Figure 8 As shown, the method specifically includes the following:

[0155] S810. According to the service information of the authority in the authority registration center, search for the target authority issuing the statement.

[0156] In a specific embodiment of the present application, the authority may register with the authority registration center in advance, so as to configure service information in the authority registration center for release. The service information may include service site information, claim types that can be applied for, and materials required by the applicant, etc. Correspondingly, before applying fo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a digital identity verification method and device, equipment and a storage medium, and relates to the technical field of block chains. According to the specific implementation scheme, the method comprises the steps of obtaining target login information of a target third-party platform in response to login operation of a target user on the target third-party platform; according to the target login information, sending a login request comprising a target user DID to a target third-party platform to authorize the target third-party platform to obtain a target declaration of the target user from a personal user data center of the target user, and verifying the target user DID and the target declaration; and if the target user DID and the target declaration pass the verification, logging in a target third-party platform by adopting the target user DID. By adding and defining the architecture of the DID standard formulated by the W3C and based on theinteraction among the DID client, the personal user data center and other existing structures, the working process and the access mode of the whole digital identity verification system are clear, andthe complete digital identity verification system is realized.

Description

technical field [0001] The embodiments of the present application relate to the field of computer technology, in particular to the field of blockchain technology, and specifically to a digital identity verification method, device, device, and storage medium. Background technique [0002] With the rapid development of Internet applications, the convenience and importance of automatic computer verification and application login to connect offline entities to online virtual identities has become increasingly prominent. At present, digital identity verification technologies based on decentralization are still in the exploratory and initial stage, the system definition is not perfect, and there is no client that is convenient for users to use and manage digital identities, so in fact there is no complete set of decentralized avatars Digital identity verification system. Contents of the invention [0003] The embodiment of the present application provides a digital identity ver...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08H04L9/06
CPCH04L63/08H04L63/0428H04L63/0435H04L67/1097H04L9/0631H04L9/50H04L63/126H04L63/045H04L63/04H04L63/0823G06F21/31H04L9/0891H04L9/0894H04L9/3226
Inventor 毛宏斌潘思远袁骏杰陈浩栋王辉
Owner BEIJING BAIDU NETCOM SCI & TECH CO LTD