Unlock instant, AI-driven research and patent intelligence for your innovation.

Digital identity verification method, apparatus, device and storage medium

A verification method and technology of digital identity, applied in the computer field, can solve the problems of no client terminal that is convenient for users to use and manage digital identity, incomplete system definition, no digital identity verification system, etc., to ensure interactive security, avoid The effect of embezzlement or forgery, security guarantee

Active Publication Date: 2022-06-07
BEIJING BAIDU NETCOM SCI & TECH CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, digital identity verification technologies based on decentralization are still in the exploratory and initial stage, the system definition is not perfect, and there is no client that is convenient for users to use and manage digital identities, so in fact there is no complete set of decentralized avatars digital identity verification system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Digital identity verification method, apparatus, device and storage medium
  • Digital identity verification method, apparatus, device and storage medium
  • Digital identity verification method, apparatus, device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0117] figure 2 It is a flow chart of a digital identity verification method according to the first embodiment of the present application. This embodiment can be applied to the interaction between the DID client and the third-party platform, based on the verification of the DID and claim, so that the user can use the DID to log in. In the case of a third-party platform, the method can be executed by a DID client, and can be executed by a digital identity verification device. The device is implemented in software and / or hardware, preferably configured in an electronic device, such as the DID client to which the DID client belongs. The holder's terminal device. like figure 2 As shown, the method specifically includes the following:

[0118] S210, in response to the target user's login operation on the target third-party platform, obtain the target login information of the target third-party platform.

[0119] In the specific embodiment of the present application, th...

no. 2 example

[0136] Figure 5 This is a flow chart of a digital identity verification method according to the second embodiment of the present application. On the basis of the above-mentioned first embodiment, this embodiment further explains the process of the DID client authorizing the target third-party platform to obtain the specified claim. , can authorize the target third-party platform with the assistance of blockchain network, proxy re-encryption technology and personal user center. like Figure 5 As shown, the method specifically includes the following:

[0137] S510, in response to the target user's login operation on the target third-party platform, obtain target login information including at least the DID of the target third-party platform.

[0138] S520. According to the target login information, send a login request including the target user DID to the target third-party platform.

[0139] S530 , according to the target third-party platform DID, obtain a DID doc...

no. 3 example

[0154] Figure 8 It is a flowchart of applying for a claim according to the third embodiment of the present application. On the basis of the above-mentioned first embodiment, this embodiment further explains the process of applying for a claim by a DID client to an authority, which can be issued by an authority. to get a claim. like Figure 8 As shown, the method specifically includes the following:

[0155] S810. Search for the target authority that issued the statement according to the service information of the authority in the authority registration center.

[0156] In the specific embodiment of the present application, the authority may register with the authority registration center in advance, so as to configure the service information in the authority registration center for publication. Service information may include service site information, claim types that can be applied for, and information required by the applicant. Correspondingly, before applying f...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the present application discloses a digital identity verification method, device, equipment and storage medium, which relate to the technical field of blockchain. The specific implementation plan is: in response to the target user's login operation on the target third-party platform, obtain the target login information of the target third-party platform; according to the target login information, send a login request including the target user DID to the target third-party platform to authorize the target The third-party platform obtains the target user's target statement from the target user's personal user data center, and verifies the target user's DID and target statement; if the target user's DID and target statement are verified, the target user's DID is used to log in to the target third-party platform. By adding and defining the architecture of the DID standard formulated by W3C, based on the interaction between DID clients, personal user data centers and other existing structures, the workflow and access methods of the entire digital identity verification system are clarified to achieve a complete Digital identity verification system.

Description

technical field [0001] The embodiments of the present application relate to the field of computer technology, in particular to the field of blockchain technology, and in particular to a digital identity verification method, apparatus, device, and storage medium. Background technique [0002] With the rapid development of Internet applications, the convenience and importance of automatic verification and application login by computer to connect offline entities to online virtual identities have become increasingly prominent. At present, the digital identity verification technology based on decentralization is in the exploratory and infancy stage, the system definition is not perfect, and there is no client that is convenient for users to use and manage digital identity. Digital authentication system. SUMMARY OF THE INVENTION [0003] The embodiments of the present application provide a digital identity verification method, apparatus, device and storage medium, which can im...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L67/1097H04L9/06
CPCH04L63/08H04L63/0428H04L63/0435H04L67/1097H04L9/0631H04L9/50H04L63/126H04L63/045H04L63/04H04L63/0823G06F21/31H04L9/0891H04L9/0894H04L9/3226
Inventor 毛宏斌潘思远袁骏杰陈浩栋王辉
Owner BEIJING BAIDU NETCOM SCI & TECH CO LTD