A Privacy-Preserving Secure Decentralized Self-Sovereign Identity Authentication Protocol Method
A decentralization, privacy protection technology, applied in the direction of digital data authentication, digital data protection, computer security devices, etc., can solve the problems of privacy leakage, not considering the privacy protection of identity information, and not supporting the fine-grained control of identity information, etc. Satisfy the effect of security, portability, and decentralized verification
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0070] In order to facilitate the understanding and implementation of the present invention by those skilled in the art, the present invention will be described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the embodiments described herein are only used to illustrate and explain the present invention, but not to limit it. this invention.
[0071] The technical solution adopted in the present invention is: by combining the alliance chain and the distributed identifier, the distributed identifier is used as a global identifier to perform registration, authentication and revocation for the user's decentralized domain. Finally, the policy control signature is used to encapsulate the verifiable claim to generate the policy verifiable claim, which realizes the user's access control, authentication and revocation of identity registration in the centralized domain.
[0072] see Figure 1-Figure 7 , a kind of alliance...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


