Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Privacy protection method and system for enterprise DID identity system

A privacy protection system and privacy protection technology, applied in digital data protection, business, data processing applications, etc., can solve problems such as affecting enterprise efficiency, lengthy review process, and non-transparent business processes.

Pending Publication Date: 2021-04-06
SHANGHAI WANXIANG BLOCK CHAIN CO LTD
View PDF6 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The usual method is to introduce third-party trusted institutions or guarantees to ensure the credibility of enterprise information, but similar systems exist: 1) the system has a single point of risk; 2) the review process is lengthy, which affects the efficiency of the enterprise; 3) the enterprise The autonomy of identity information is uncontrollable
[0003] Specifically, due to the introduction of a third-party organization, the overall business process will depend on the third party, and the business process of the third party is often not open and transparent, so it will bring efficiency and security risks to the business of the enterprise
At the same time, in some business scenarios, there is a risk that the sensitive information of the enterprise will be obtained by a third party, resulting in privacy leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy protection method and system for enterprise DID identity system
  • Privacy protection method and system for enterprise DID identity system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0044] This is a distributed enterprise digital identity system, which helps enterprises securely and verifiably associate real identity information under the chain with digital identities on the chain, and independently control digital identities and data related to the identity. The present invention applies the DID technology to the enterprise identity scene to realize the self-control of the enterprise identity data. The authenticity of the corporate identity depends on the review of the audit organization under the chain. Enterprises can provide their own DID information to the querying party, and authorize the querying party to query the mapping relationship between the DID identity on the chain and the real identity off the chain at the audit agency.

[0045] The difficulties of the present invention include: 1) Generation and management of enterprise DID 2) Binding of enterprise DID and entity identity under the enterprise chain, while the mapping relationship is invis...

Embodiment 2

[0073] Embodiment 2 is a modification of embodiment 1

[0074] An application scenario is listed here, which is the credit penetration scenario in blockchain supply chain finance.

[0075] The commercial core of blockchain supply chain finance is to transfer the credit of a large downstream core enterprise to the upstream supplier through credit penetration, so as to reduce the financing cost of the upstream supplier, shorten the account period, and revitalize the enterprise. Liquid assets, increased efficiency.

[0076] In the process of credit penetration, it is assumed that the core enterprise A transfers the company's X share of digital credit to its first-tier supplier B through the blockchain, and B then splits it and transfers it to the second-tier suppliers C and D. A and C, A and D have no direct supply relationship, and sometimes in real business scenarios, B does not want A to know the detailed information of secondary suppliers C and D. At this time, the second-t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a privacy protection method and system for an enterprise DID identity system. The privacy protection method comprises the steps that M1, an enterprise applies for an enterprise DID and an enterprise account key from an auditing institution by providing an enterprise real identity information material; M2, the auditing institution audits the enterprise real identity information and grants the enterprise DID and the enterprise account secret key, and corresponding relation data of the enterprise real identity and the DID is precipitated in the auditing institution; M3, after the auditing agency passes auditing, an instruction is sent to the service system, and the service system establishes DIDDoc corresponding to the DID based on the enterprise digital identity and stores the DIDDoc on the blockchain; M4, multiple types of secret keys of the DID are created according to service requirements, and the multiple types of secret keys of the current DID are recorded in DIDDoc; and M5, the enterprise provides own DID information for the query party, and the query party is authorized to query the mapping relationship between the DID and the real identity of the enterprise at the auditing institution based on the record of multiple types of keys in DIDDoc.

Description

technical field [0001] The present invention relates to the technical field of blockchain, in particular, to a privacy protection method and system for an enterprise DID identity system, and more specifically, to a privacy protection mechanism for an enterprise DID identity system. Background technique [0002] In traditional enterprise applications, such as enterprise financing, supply chain management, etc., it is often necessary to authenticate and authorize the identity or information of related enterprises involved in the business. The usual method is to introduce third-party trusted institutions or guarantees to ensure the credibility of enterprise information, but similar systems exist: 1) the system has a single point of risk; 2) the review process is lengthy, which affects the efficiency of the enterprise; 3) the enterprise The autonomy of identity information is uncontrollable. [0003] Specifically, due to the introduction of a third-party organization, the overa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06Q30/00G06Q10/10G06F21/60G06F21/62G06F21/64
CPCG06Q30/018G06Q10/103G06F21/602G06F21/6245G06F21/64
Inventor 张西芳潘晨
Owner SHANGHAI WANXIANG BLOCK CHAIN CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products