Unlock instant, AI-driven research and patent intelligence for your innovation.

A digital identity verification method, device, computer equipment and storage medium

A digital identity and verification method technology, applied in the blockchain field, can solve the problems of low confidentiality of user privacy data and low timeliness of identity verification data sources, and achieve the effects of improving efficiency, ensuring confidentiality, and ensuring timeliness

Active Publication Date: 2021-12-14
北京微芯感知科技有限公司
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The present application provides a digital identity verification method, device, computer equipment, and storage medium to at least solve the technical problems of low timeliness of identity verification data sources and low confidentiality of user privacy data in related technologies

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A digital identity verification method, device, computer equipment and storage medium
  • A digital identity verification method, device, computer equipment and storage medium
  • A digital identity verification method, device, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0058] figure 1 It is a schematic flow diagram of a digital identity verification method provided according to an embodiment of the present application, applied to a blockchain digital identity contract, such as figure 1 As shown, can include:

[0059] Step 101. Obtain a verification request sent by a verifier client.

[0060] Wherein, the verification request may include: the application scenario of the identity certificate of the user to be verified, the identity information of the user to be verified, and the first hash value calculated by the verifier client based on the identity certificate of the user to be verified.

[0061] Wherein, in the embodiment of the present disclosure, the identity certificate of the user to be verified may specifically include the certificate number corresponding to the certificate of the user to be verified, for example, it may be the ID number, degree certificate number, and graduation certificate number of the user to be verified. The id...

Embodiment 2

[0087] figure 2 It is a schematic flow diagram of a digital identity verification method provided according to an embodiment of the present application, which is applied to a target oracle, such as figure 2 As shown, can include:

[0088] Step 201. Obtain the application scenario of the identity credential of the user to be verified sent by the digital identity contract and the identity information of the user to be verified.

[0089] Step 202. Query the identity certificate of the user to be verified based on the application scenario of the user's identity certificate and the identity information of the user to be verified.

[0090] Wherein, in one embodiment of the present disclosure, the target oracle specifically queries the identity certificate of the user to be verified in the application scenario based on the identity information of the user to be verified and the application scenario of the user's identity certificate to be verified.

[0091] For example, assuming ...

Embodiment 3

[0102] image 3 It is a schematic flow diagram of a digital identity verification method provided according to an embodiment of the present application, which is applied to the verifier client, such as image 3 As shown, can include:

[0103] Step 301. Obtain the information to be verified sent by the client of the party to be verified. The information to be verified may include the identity certificate of the user to be verified, the application scenario of the user's identity certificate to be verified, and the identity information of the user to be verified.

[0104] Step 302: Perform hash calculation on the identity certificate of the user to be verified to obtain a first hash value.

[0105] Wherein, in the embodiment of the present disclosure, the method for the verifier client to perform hash calculation on the identity certificate of the user to be verified to obtain the first hash value may include:

[0106] Determine the preset calculation rule based on the applica...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

In the digital identity verification method, device, computer equipment, and storage medium provided by the present disclosure, by obtaining the verification request sent by the verifier client, and based on the application scene of the identity certificate of the user to be verified in the verification request, it is determined that the identity corresponding to the application scene The target oracle machine, and then send the application scenario of the identity certificate of the user to be verified and the identity information of the user to be verified to the target oracle machine, obtain the verification information sent by the target oracle machine, and determine the verification result based on the verification information and the first hash value. And send the verification result to the verifier client. Among them, in the method proposed in the present disclosure, the timeliness of the identity verification data source, the efficiency of the identity verification, and the confidentiality of the user's private data are all high.

Description

technical field [0001] The present application relates to the technical field of blockchain, and in particular to a digital identity verification method, device, computer equipment and storage medium. Background technique [0002] With the development of science and technology, users can perform various services through the network. When performing business, it is usually necessary to verify the user's digital identity based on blockchain technology. After the digital identity verification is passed, the follow-up business can be continued. Among them, in the digital identity verification process, it is usually necessary to provide data support for the verification process based on the identity verification data source. However, in related technologies, data support is provided based on off-chain data, resulting in low timeliness of identity verification data sources. At the same time, in related technologies, in the process of digital identity verification, the confidenti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L29/06
CPCH04L9/3236H04L63/0876H04L9/50
Inventor 不公告发明人
Owner 北京微芯感知科技有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More