Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identity authentication data modeling method, device and system based on privacy protection

An identity authentication and data modeling technology, applied in the field of identity authentication data modeling based on privacy protection, can solve the problem that the authentication information does not have the endorsement ability of an authoritative organization, the authentication method does not have the privacy data constraint verification extension ability, and the authentication method does not have the Privacy and data protection capabilities and other issues

Active Publication Date: 2021-10-15
北京优品三悦科技发展有限公司
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] 1. The certification information does not have the endorsement ability of an authoritative organization
[0005] 2. The authentication method does not have the ability to protect private data
[0006] 3. The authentication method does not have the expansion capability of private data constraint verification

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication data modeling method, device and system based on privacy protection
  • Identity authentication data modeling method, device and system based on privacy protection
  • Identity authentication data modeling method, device and system based on privacy protection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] In order to more clearly understand the above objects, features and advantages of the present disclosure, the solutions of the present disclosure will be further described below. It should be noted that, in the case of no conflict, the embodiments of the present disclosure and the features in the embodiments can be combined with each other.

[0057] In the following description, many specific details are set forth in order to fully understand the present disclosure, but the present disclosure can also be implemented in other ways than described here; obviously, the embodiments in the description are only some of the embodiments of the present disclosure, and Not all examples.

[0058] figure 1 It is an example flow diagram of a privacy protection-based identity authentication data modeling method described in an embodiment of the present disclosure.

[0059] Wherein, the identity authentication data modeling method based on privacy protection is applied to the authori...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an identity authentication data modeling method, device and system based on privacy protection, and the method applied to an authority end comprises the steps: building a Merkel tree model of identity authentication information, obtaining all end public keys of an identity and a root Hash value of the Merkel tree model, and obtaining the public keys of all ends of the identity and the root Hash value of the Merkel tree model; establishing a privacy information constraint according to the privacy information constraint verification logic, the identity authentication information, all identity end public keys and the privacy information constraint verification logic corresponding to the root hash value of the Merkel tree model; processing the plurality of privacy information constraints to obtain a public parameter of a proving party and a public parameter of a verifying party; and respectively performing signature calculation on each privacy information constraint, the proving party public parameter and the verifying party public parameter to generate a privacy information constraint set comprising signature items, and publishing the proving party public parameter and the verifying party public parameter as public information. Therefore, the identity authentication information has the endorsement capability of an authority, and corresponding constraint verification is carried out on different privacy data according to the requirements of application scenes.

Description

technical field [0001] The present disclosure relates to the technical field of identity authentication, and in particular to a privacy protection-based identity authentication data modeling method, device and system. Background technique [0002] The current identity authentication method leaks too much private information, so the current application system proposes different zero-knowledge proof methods to protect the security of private data in identity authentication. [0003] In the current relevant identity authentication technology, there are the following technical problems: [0004] 1. The certification information does not have the endorsement ability of an authoritative organization [0005] 2. The authentication method does not have the ability to protect private data [0006] 3. The authentication method does not have the expansion capability of private data constraint verification Contents of the invention [0007] In order to solve the above technical pro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
CPCH04L9/3236H04L9/3247H04L9/50Y02D30/50
Inventor 胡靖宇
Owner 北京优品三悦科技发展有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products