Unlock instant, AI-driven research and patent intelligence for your innovation.

A Privacy-Preserving Secure Decentralized Self-Sovereign Identity Authentication Protocol Method

A decentralization, privacy protection technology, applied in the direction of digital data authentication, digital data protection, computer security devices, etc., can solve the problems of privacy leakage, not considering the privacy protection of identity information, and not supporting the fine-grained control of identity information, etc. Satisfy the effect of security, portability, and decentralized verification

Active Publication Date: 2022-07-05
SOUTH CENTRAL UNIVERSITY FOR NATIONALITIES
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The current SSI identity authentication protocol not only does not support the fine-grained control of identity information authorization, but also does not consider the privacy protection of identity information
The traditional policy control signature can achieve fine-grained sharing, but the public access policy will be subject to different degrees of privacy disclosure during authentication.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Privacy-Preserving Secure Decentralized Self-Sovereign Identity Authentication Protocol Method
  • A Privacy-Preserving Secure Decentralized Self-Sovereign Identity Authentication Protocol Method
  • A Privacy-Preserving Secure Decentralized Self-Sovereign Identity Authentication Protocol Method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0070] In order to facilitate the understanding and implementation of the present invention by those skilled in the art, the present invention will be described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the embodiments described herein are only used to illustrate and explain the present invention, but not to limit it. this invention.

[0071] The technical solution adopted in the present invention is: by combining the alliance chain and the distributed identifier, the distributed identifier is used as a global identifier to perform registration, authentication and revocation for the user's decentralized domain. Finally, the policy control signature is used to encapsulate the verifiable claim to generate the policy verifiable claim, which realizes the user's access control, authentication and revocation of identity registration in the centralized domain.

[0072] see Figure 1-Figure 7 , a kind of alliance...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a privacy-protected, secure and decentralized self-sovereign identity authentication protocol method. Based on the characteristics of self-sovereignty, the invention uses the distributed identifier planned by W3C as a unified identifier to implement identity platforms in distributed domains and central domains. Common to each other to meet portability. Using the policy control signature scheme that supports policy hiding and the verifiable claim standard to assert user identity information to achieve fine-grained authorization and privacy protection of identity data. The verifiable statement that does not expose privacy is stored in the underlying blockchain as a trust endorsement to realize data access without the same identity domain, and to satisfy security and decentralized verification. The present invention satisfies and realizes the concept of self-sovereignty, and also enriches the development of self-sovereign identity authentication methods.

Description

technical field [0001] The invention belongs to the technical field of identity management in information security, and in particular relates to a privacy protection security decentralization self-sovereign identity authentication protocol method. Background technique [0002] A secure identity authentication protocol is a necessary prerequisite for the secure and stable development of cyberspace. In today's Internet environment such as big data search, face recognition, cloud computing and centralized authentication, huge data and intelligent algorithms bring convenience to the society, but also bring huge hidden dangers to the leakage of users' digital identity privacy. [0003] The early identity information management developed from a single sign-on identity model to a federated identity authentication model, and then evolved into a user-centric authentication model based on OpenID. None of these schemes can get rid of the privacy leakage caused by the authentication pr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/62G06F21/64G06F21/33
CPCG06F21/6245G06F21/645G06F21/33G06F2221/2141
Inventor 孟博郑绪睿王德军朱容波
Owner SOUTH CENTRAL UNIVERSITY FOR NATIONALITIES