Digital identity verification method, apparatus, device and storage medium
A verification method and technology of digital identity, applied in the computer field, can solve the problems of no client terminal that is convenient for users to use and manage digital identity, incomplete system definition, no digital identity verification system, etc., to ensure interactive security, avoid The effect of embezzlement or forgery, security guarantee
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 example
[0117] figure 2 It is a flow chart of a digital identity verification method according to the first embodiment of the present application. This embodiment can be applied to the interaction between the DID client and the third-party platform, based on the verification of the DID and claim, so that the user can use the DID to log in. In the case of a third-party platform, the method can be executed by a DID client, and can be executed by a digital identity verification device. The device is implemented in software and / or hardware, preferably configured in an electronic device, such as the DID client to which the DID client belongs. The holder's terminal device. like figure 2 As shown, the method specifically includes the following:
[0118] S210, in response to the target user's login operation on the target third-party platform, obtain the target login information of the target third-party platform.
[0119] In the specific embodiment of the present application, th...
no. 2 example
[0136] Figure 5 This is a flow chart of a digital identity verification method according to the second embodiment of the present application. On the basis of the above-mentioned first embodiment, this embodiment further explains the process of the DID client authorizing the target third-party platform to obtain the specified claim. , can authorize the target third-party platform with the assistance of blockchain network, proxy re-encryption technology and personal user center. like Figure 5 As shown, the method specifically includes the following:
[0137] S510, in response to the target user's login operation on the target third-party platform, obtain target login information including at least the DID of the target third-party platform.
[0138] S520. According to the target login information, send a login request including the target user DID to the target third-party platform.
[0139] S530 , according to the target third-party platform DID, obtain a DID doc...
no. 3 example
[0154] Figure 8 It is a flowchart of applying for a claim according to the third embodiment of the present application. On the basis of the above-mentioned first embodiment, this embodiment further explains the process of applying for a claim by a DID client to an authority, which can be issued by an authority. to get a claim. like Figure 8 As shown, the method specifically includes the following:
[0155] S810. Search for the target authority that issued the statement according to the service information of the authority in the authority registration center.
[0156] In the specific embodiment of the present application, the authority may register with the authority registration center in advance, so as to configure the service information in the authority registration center for publication. Service information may include service site information, claim types that can be applied for, and information required by the applicant. Correspondingly, before applying f...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


