Supercharge Your Innovation With Domain-Expert AI Agents!

Decentralized identity management method in D2D scene in 5G environment

A decentralized, identity management technology, applied in the field of identity authentication, can solve problems such as privacy leakage, and achieve the effect of ensuring non-infringement

Pending Publication Date: 2020-10-23
CHENGDU SUNSHEEN TECH
View PDF7 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In order to solve the problem of privacy leakage, the present invention provides a method for decentralized identity management in 5G environment D2D scenarios

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Decentralized identity management method in D2D scene in 5G environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0023] Such as figure 1 As shown, in this embodiment, a method for decentralized identity management in a 5G environment D2D scene includes the following steps:

[0024] S1: Users use the 5G device DID program to create their own DID;

[0025] S2: The user obtains the issuer list in the DID program;

[0026] S3: The user submits a verifiable statement application to a designated certificate issuer and provides relevant verification materials;

[0027] S4: After the certificate issuer has reviewed the materials, issue a verifiable statement to the user;

[0028] S5: The user uses DID to log in to the third-party application, and learns that the application requires the user to provide a verifiable statement;

[0029] S6: The user authorizes the third-party application to go to the identity center to obtain verifiable claims;

[0030] S7: the user successfully logs in to the third-party application.

[0031] In the 5G environment, 5G equipment is used to build a blockchain ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a decentralized identity management method in a D2D scene in a 5G environment, and the method comprises the steps that a data holding mechanism logs in a data use mechanism byadopting a DID, and obtains that an application needs the data holding mechanism to provide a certain verifiable declaration; the data holding institution authorizes the data using institution to obtain a verifiable statement from the identity center; and the data holding mechanism successfully logs in the data using mechanism. The method further comprises an identity information registration step: the user uses a 5G device DID program to create own DID; the user obtains an identity authentication mechanism list in the DID program; the user submits a verifiable declaration application to a specified identity authentication mechanism and provides a related verification material; after the identity certification institution audits the material, a verifiable statement is issued to the user, and the user becomes a data holding institution. Within the range covered by the same identity platform, the identity recognition and detection standards of the user are unified, the application permission and the user identity / data are separated from the data permission, and the ownership of the user data is guaranteed.

Description

technical field [0001] The invention relates to an identity authentication method, in particular to a method for decentralized identity management in a 5G environment D2D scene, and belongs to the field of computer technology. Background technique [0002] At present, based on the technology of direct data exchange between adjacent devices in the communication network of D2D (device to device) technology, the D2D communication link is established, and the transmission data does not need to be transferred by core equipment or central equipment, and can be directly passed through point-to-point decentralized The method is data transmission and mass terminal access network. The standardization organization 3GPP has listed D2D technology as the development framework of the new generation mobile communication system and has become one of the key technologies of the fifth generation mobile communication. It is a solution to ensure the trustworthiness and controllability of digital...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W4/70H04W12/06
CPCH04W4/70
Inventor 肖辉江华刘寨
Owner CHENGDU SUNSHEEN TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More