CN108282339A - A kind of digital identity method for retrieving based on intelligent contract and from social media - Google Patents
A kind of digital identity method for retrieving based on intelligent contract and from social media Download PDFInfo
- Publication number
- CN108282339A CN108282339A CN201810074554.4A CN201810074554A CN108282339A CN 108282339 A CN108282339 A CN 108282339A CN 201810074554 A CN201810074554 A CN 201810074554A CN 108282339 A CN108282339 A CN 108282339A
- Authority
- CN
- China
- Prior art keywords
- change
- digital identity
- user
- media
- identity
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3215—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a plurality of channels
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0891—Revocation or update of secret information, e.g. encryption key update or rekeying
Abstract
The digital identity method for retrieving that the invention discloses a kind of based on intelligent contract and from social media, in the case that private cipher key of the user associated by digital identity is lost, by the social media account of oneself, the intelligent contract on block chain is relied on, giving for change for original digital identity is completed.The present invention can be in the case where private cipher key be lost, and user still can give its original identity for change by the social media account of oneself, and can continue to possess the control to its former identity, to achieve the purpose that digital identity is given for change.
Description
Technical field
The present invention relates to information security fields, and in particular to a kind of based on intelligent contract and from the digital identity of social media
Method for retrieving.
Background technology
Block chain as global distributed Database Systems, have can not forge distort, the characteristics such as the whole network shared data, just
Due to these good characteristics, application of the block chain technology in Identity Management obtains academia's concern consistent with industrial circle.
However there are following defects in existing numerous digital identity account method for retrieving at present:
1, digital identity account is given for change by backup public and private key, i.e., generates backup while generating Your Majesty's private key
Public and private key gives the control of digital identity for change by the private cipher key of backup in the case where main private cipher key is lost.Big prepare more
Part key and master key are stored on terminal device, and the possibility lost together is very big.If individually remembering backup keys
Words, first, increase the difficulty of memory, and there is also the possibilities lost as master key for backup keys.
2, it gives digital identity for change by the way that agent object is arranged, i.e., some agent objects is set in digital identity embryonic stage,
In the case where main private cipher key is lost, new public-key cryptography can be declared jointly by pre-set agent object, it is open to declare
The key of title is identical and is more than half, then resets the public-key cryptography of user.This mode of giving for change needs to use by multiple third parties
Family cooperates jointly, and process is complicated and can not rule out the possibility that multiple third party's user collaboratives are done evil.
Invention content
The present invention is provided a kind of based on intelligent contract and Zi She to solve above-mentioned the shortcomings of the prior art place
The digital identity method for retrieving for handing over media, to merely with the social media account of intelligent contract and user oneself, it will be able to pacify
Effectively give digital identity for change entirely, to improve the efficiency that digital identity is given for change, the means that abundant digital identity is given for change, and really
Warranty family, which may not need, independently completes giving for change for itself digital identity by other objects.
The present invention is to solve technical problem to adopt the following technical scheme that:
A kind of present invention based on intelligent contract and from the characteristics of digital identity method for retrieving of social media is that user is in area
Digital identity is possessed in block chain, and the digital identity is associated with unique public-key cryptography, the public-key cryptography is stored in institute
It states in block chain, and the user itself holds the corresponding private cipher key of the public-key cryptography;The true identity of the user is logical
It crosses the public-key cryptography and the private cipher key is associated with the digital identity;The user be give for change as follows it is described
Digital identity:
Step 1, the user generate digital identity in the block chain by the digital identity of itself and give contract for change;
Step 2, the user obtain according to the n possessed the licensing schemes from social media in the n certainly social matchmakers
One-to-one unique identity in body;
Step 3, the user store the digital identity, n from social media in the digital identity gives contract for change
Title and the n from the correspondence between the Hash hashed value three of the unique identity of social media;
Step 4, when the private cipher key of the user is lost, defined variable m, and initialize m=1;
Step 5, the user select any one to give media for change as the m times social activity at the n from social media;
The user gives the licensing scheme of media for change using described the m times social activity, and the social activity for obtaining the user at described the m times is looked for
Return the unique identity in media;
The unique identity that step 6, the user give media for change according to described the m times social activity obtains its Hash hash
Value, and submit the m times new public-key cryptography;
The digital identity, the m times social activity are given for change the title, the m times described of media by step 7, the user
Social activity give for change media unique identity Hash hashed value and it is described the m times submission new public-key cryptography be sent to
The digital identity, which is given for change in contract, to be verified;If being proved to be successful, the digital identity gives contract for change and carries described the m times
Public-key cryptography of the new public-key cryptography handed over as the digital identity unique association, to complete giving for change for the digital identity;
If m+1 is assigned to m by authentication failed;And return to step 5 executes, until being proved to be successful or until m=n.
The characteristics of digital identity method for retrieving of the present invention, lies also in:It is by as follows that the digital identity, which gives contract for change,
Process is verified:
Step 7.1, the digital identity give contract for change and give matchmaker for change according to the digital identity and the m times social activity
The title of body, to give the title of media for change with described the m times social activity corresponding only for inquiry in the digital identity gives contract for change
The Hash hashed value of one identity is used as with reference to value;
Step 7.2, the digital identity give contract for change and judge the m times social activity that the reference value is sent with the user
Whether the Hash hashed value for giving the unique identity of media for change is consistent, if when consistent, giving described the m times social activity for change matchmaker
The title of body and the new public-key cryptography of the m times submission are stored in the digital identity after being associated and give for change in contract;Otherwise, table
Show described the m times social activity give for change the unique identity of media Hash hashed value it is invalid, the user resubmits the m times
Social activity give for change media unique identity Hash hashed value;
Number identical with the new public-key cryptography that the m times is submitted in the new public-key cryptography of m submission before step 7.3, statistics
Whether n/2 is more than or equal to;If it is greater than or equal to then return is proved to be successful, and otherwise returns to authentication failed.
A kind of present invention based on intelligent contract and from the characteristics of digital identity method for retrieving of social media is that user is in area
Digital identity is possessed in block chain, and the digital identity is associated with unique public-key cryptography, the public-key cryptography is stored in institute
It states in block chain, and the user itself holds the corresponding private cipher key of the public-key cryptography;The true identity of the user is logical
It crosses the public-key cryptography and the private cipher key is associated with the digital identity;Assuming that k can issue disclosure from social media
Notice, then the user is to give the digital identity for change as follows:
Step 1, the user generate digital identity in the block chain by the digital identity of itself and give contract for change;
K social matchmaker is arranged according to the digital identity of itself in the digital identity gives contract for change by step 2, the user
The title of body;
Step 3, when the private cipher key of the user is lost, defined variable w, and initialize w=1;
Step 4, the user select any one to give media for change as the w times social activity in k social media;It is described
User, which using described the w times social activity gives media for change and issues the w time open to the public, to be noticed, and described the w time disclosure is noticed
Declare the w times public-key cryptography;
Step 5, the user give the digital identity, the w times social activity for change the title of media and the w times public affairs
The URL for opening announcement is sent to the digital identity and gives for change in contract and verified, if being proved to be successful, the digital identity is given for change
The new public-key cryptography that contract declares described the w times is as the public-key cryptography of the digital identity unique association, to complete
State giving for change for digital identity;If w+1 is assigned to w by authentication failed;And return to step 4 executes, until being proved to be successful or w=k
Until.
The characteristics of digital identity method for retrieving of the present invention, lies also in, and it is by as follows that the digital identity, which gives contract for change,
Process is verified:
It is logical by prophesy machine Oracle the w times disclosure of access of intelligent contract that step 5.1, the digital identity give contract for change
The URL of announcement, obtains the public-key cryptography declared in the w time open notice, and by described the w times social activity give for change media title and
The digital identity is stored in after the w times the public-key cryptography declared is associated to give for change in contract;
Number identical with the new public-key cryptography that the w times is declared in the w new public-key cryptography declared before step 5.2, statistics
Whether k/2 is more than or equal to;If it is greater than or equal to then return is proved to be successful, and otherwise returns to authentication failed.
Compared with prior art, beneficial effects of the present invention embodiment is:
1, the digital identity method for retrieving based on intelligent contract and from social media that the present invention establishes, first, identity are whole
End pre-sets the social media type and the user corresponding identity in social account for participating in that account is given for change;Then,
In the case where private cipher key is lost, user subject obtains corresponding identity by the licensing scheme of social media account,
And ballot resetting is carried out using social account identity, ensure that user subject still can possess the control of original digital identity
System power, so that without backup public and private key, without agent object, just merely with the social media account of itself
It gives for change with can completing digital identity.
2, the digital identity method for retrieving based on intelligent contract and from social media that the present invention establishes, first, identity are whole
End, which is pre-set, participates in the social media type that account is given for change;Then, in the case where private cipher key is lost, user subject passes through
Social media releases news notice, and it is close that newly disclosing of being declared in information announcement is obtained using the Oracle prophesy machines of intelligent contract
Key;It equally can be complete merely with the social media account of itself without agent object without backup public and private key
At digital identity give for change.
Description of the drawings
Fig. 1 is the flow diagram that new public-key cryptography is arranged in the present invention by taking wechat as an example;
Fig. 2 is the flow diagram that the present invention declares new public-key cryptography by taking Sina weibo as an example.
Specific implementation mode
In the present embodiment, a kind of digital identity method for retrieving based on intelligent contract and from social media is user in area
Possessing digital identity in block chain, and digital identity is associated with unique public-key cryptography, public-key cryptography is stored in block chain, and
User itself holds the corresponding private cipher key of public-key cryptography;The true identity of user passes through public-key cryptography and private cipher key and number
Identity is associated;The user gives the digital identity for change as follows by the licensing scheme of wechat, as shown in Figure 1:
Step 1, user send contract transaction to ether mill block chain first, by the digital identity of itself in ether mill area
Deployment, which generates, in block chain belongs to the digital identity of the user and gives contract for change;
Step 2, in the preparation stage, user (including wechat, QQ, Sina weibo, rises according to the n possessed from social media
Interrogate microblogging, the mainstreams such as Facebook, Twitter social media) licensing scheme, obtained respectively at n from social media
One-to-one unique identity;By taking wechat as an example, which obtains it in wechat platform according to the licensing scheme of wechat
Unique identity, and Hash hashed value is carried out to the identity and calculates acquisition HopenId
The digital identity of step 3, user corresponding to its digital identity, which is given for change, stores digital identity, social media in contract
Title " WeChat ", and in the social media corresponding unique identity Hash hashed value HopenIdThis three it
Between correspondence;The digital identity of user and other n-1 are a a from social media from the title of social media and this n-1
In unique identity Hash hashed value three between correspondence, also stored by similarly mode;
Step 4, when user private cipher key lose when, in most cases refer to preserve the private cipher key terminal set
It is standby to lose, or the private cipher key is deleted for various reasons on the terminal device for preserving user's private cipher key;Definition becomes
M is measured, and initializes m=1;
Step 5, user select any one to give media for change as the m times social activity at n from social media;User utilizes
The licensing scheme of media is given in the m times social activity for change, obtains unique identity of the user in media are given in the m times social activity for change;
Such as wechat is selected to give media for change as the m times social activity, in the case where the private cipher key of user is lost, user still can be with
Wechat application is downloaded, using itself wechat account and password login wechat, and using the licensing scheme of wechat, it is micro- to obtain user
Believe unique identity in platform;
The unique identity that step 6, user give media for change according to the m times social activity obtains its Hash hashed value, here
Hash is carried out to the unique identity that user obtains in wechat platform to hash to obtain HopenId', and submit the m times new public affairs
Open key Kproposed;
Step 7, user give digital identity, the m times social activity the title " WeChat " of media for change, the m times social activity is looked for
Return the Hash hashed value H of the unique identity of mediaopenId' and the m times new public-key cryptography K submittedproposedIt is sent to
Digital identity is given for change in contract and is verified;If being proved to be successful, digital identity gives contract for change, and newly disclosing for the m times submission is close
Key KproposedAs the public-key cryptography of digital identity unique association, to complete giving for change for digital identity;It, will if authentication failed
M+1 is assigned to m;And return to step 5 executes, until being proved to be successful or until m=n.
Wherein, it is to be verified according to the following procedure that digital identity, which gives contract for change,:
Step 7.1, digital identity give the title that contract gives media for change according to digital identity and the m times social activity for change
" WeChat ", in digital identity gives contract for change inquiry give the corresponding unique identities mark of the title of media for change with the m times social activity
The Hash hashed value H of knowledgeopenIdAs with reference to being worth, this reference value be the preparation stage in digital identity gives contract for change it is pre-
First store;
Step 7.2, digital identity give contract for change and judge reference value HopenIdMatchmaker is given in the m times social activity sent with user for change
The Hash hashed value H of the unique identity of bodyopenId' whether consistent, if when consistent, giving the m times social activity for change media
The new public-key cryptography K of title " WeChat " and the m times submissionproposedIt is stored in the digital identity after being associated and gives contract for change
In;Otherwise, indicate that the Hash hashed value H of the unique identity of media is given in the m times social activity for changeopenId' invalid, user is again
The m times social activity is submitted to give the Hash hashed value of the unique identity of media for change;
The new public-key cryptography K submitted with the m times in the new public-key cryptography of m submission before step 7.3, statisticsproposedIt is identical
Number whether be more than or equal to n/2;If it is greater than or equal to then return is proved to be successful, and otherwise returns to authentication failed.
In the present embodiment, a kind of digital identity method for retrieving based on intelligent contract and from social media is user in area
Possessing digital identity in block chain, and digital identity is associated with unique public-key cryptography, public-key cryptography is stored in block chain, and
User itself holds the corresponding private cipher key of public-key cryptography;The true identity of user passes through public-key cryptography and private cipher key and number
Identity is associated;Assuming that k can issue open notice from social media, then user is to give the digital body for change as follows
Part, as shown in Figure 2:
Step 1, user send contract transaction to ether mill block chain first, by the digital identity of itself in ether mill area
Deployment, which generates, in block chain belongs to the digital identity of the user and gives contract for change;
Step 2, in the preparation stage, k society is arranged according to the digital identity of itself in user in digital identity gives contract for change
The title for handing over media, includes the social media of the mainstreams such as Sina weibo, Tencent's microblogging, Facebook, Twitter, these media
Disclosed notice can be issued to the public;By taking Sina weibo as an example, any user can check in the microblogging of its user of interest
Hold;
Step 3, when user private cipher key lose when, in most cases refer to preserve the private cipher key terminal set
It is standby to lose, or the private cipher key is deleted for various reasons on the terminal device for preserving user's private cipher key;Definition becomes
W is measured, and initializes w=1;
Step 4, in the stage of giving for change, user selects any one to give matchmaker for change as the w times social activity in k social media
Body;User, which using the w times social activity gives media for change and issues the w time open to the public, to be noticed, and the w time disclosure, which is noticed, declares the
W public-key cryptography;If user selects microblogging to give media for change as the w times social activity, it is " my new disclosure that user, which sends content,
Key is the microblogging of 0x ... ... ... .. ", and records the URL of this microblogging;
Step 5, user by the digital identity of itself, the w times social activity give for change media title " WeiBo " and the w times
The URL of open notice be sent to digital identity and give for change in contract and verified, if being proved to be successful, digital identity gives contract for change
The new public-key cryptography that the w times is declared is as the public-key cryptography of digital identity unique association, to complete the digital identity
It gives for change;If w+1 is assigned to w by authentication failed;And return to step 4 executes, until being proved to be successful or until w=k.
Wherein, it is to be verified according to the following procedure that digital identity, which gives contract for change,:
Step 5.1, digital identity give contract for change and access the w times open notice by the prophesy machine Oracle of intelligent contract
URL can obtain this microblogging according to URL and parse its content, obtain the public-key cryptography declared in the w times open notice
Kproposed, and give the w times social activity for change the titles " WeiBo " of media and the w times public-key cryptography K declaredproposedIt is closed
Digital identity is stored in after connection to give for change in contract;
The new public-key cryptography K declared with the w times in the w new public-key cryptography declared before step 5.2, statisticsproposedIt is identical
Number whether be more than or equal to k/2;If it is greater than or equal to then return is proved to be successful, and otherwise returns to authentication failed.
Claims (4)
1. a kind of digital identity method for retrieving based on intelligent contract and from social media, characterized in that user is in block chain
Digital identity is possessed, and the digital identity is associated with unique public-key cryptography, the public-key cryptography is stored in the block
In chain, and the user itself holds the corresponding private cipher key of the public-key cryptography;The true identity of the user passes through described
Public-key cryptography and the private cipher key are associated with the digital identity;The user is to give the digital body for change as follows
Part:
Step 1, the user generate digital identity in the block chain by the digital identity of itself and give contract for change;
Step 2, the user obtain at the n according to the n possessed the licensing schemes from social media from social media
One-to-one unique identity;
Step 3, the user store the digital identity, the n names from social media in the digital identity gives contract for change
Claim and the n is a from the correspondence between the Hash hashed value three of the unique identity of social media;
Step 4, when the private cipher key of the user is lost, defined variable m, and initialize m=1;
Step 5, the user select any one to give media for change as the m times social activity at the n from social media;It is described
User gives the licensing scheme of media for change using described the m times social activity, and matchmaker is given in the social activity for obtaining the user at described the m times for change
Unique identity in body;
The unique identity that step 6, the user give media for change according to described the m times social activity obtains its Hash hashed value,
And submit the m times new public-key cryptography;
Step 7, the user give the digital identity, the m times social activity for change the title of media, the m times society
The new public-key cryptography of the Hash hashed value and the m times submission of handing over the unique identity for giving media for change is sent to described
Digital identity is given for change in contract and is verified;If being proved to be successful, the digital identity gives what contract submitted described the m times for change
New public-key cryptography of the public-key cryptography as the digital identity unique association, to complete giving for change for the digital identity;If testing
Card failure, then be assigned to m by m+1;And return to step 5 executes, until being proved to be successful or until m=n.
2. digital identity method for retrieving according to claim 1, it is characterized in that:It is by such as that the digital identity, which gives contract for change,
Lower process is verified:
Step 7.1, the digital identity give contract for change and give media for change according to the digital identity and the m times social activity
Title, in the digital identity gives contract for change inquiry give the corresponding unique body of the title of media for change with described the m times social activity
The Hash hashed value of part mark is used as with reference to value;
Step 7.2, the digital identity are given the m times social activity that contract judges that the reference value is sent with the user for change and are given for change
Whether the Hash hashed value of the unique identity of media is consistent, if when consistent, giving described the m times social activity for change media
Title and the new public-key cryptography of the m times submission are stored in the digital identity after being associated and give for change in contract;Otherwise, institute is indicated
The Hash hashed value for the unique identity that media are given in the social activity for stating the m times for change is invalid, and the user resubmits the m times society
Hand over the Hash hashed value for the unique identity for giving media for change;
Whether number identical with the new public-key cryptography that the m times is submitted in the new public-key cryptography of the preceding m submission of step 7.3, statistics
More than or equal to n/2;If it is greater than or equal to then return is proved to be successful, and otherwise returns to authentication failed.
3. a kind of digital identity method for retrieving based on intelligent contract and from social media, characterized in that user is in block chain
Digital identity is possessed, and the digital identity is associated with unique public-key cryptography, the public-key cryptography is stored in the block
In chain, and the user itself holds the corresponding private cipher key of the public-key cryptography;The true identity of the user passes through described
Public-key cryptography and the private cipher key are associated with the digital identity;Assuming that k can issue open notice from social media, then
The user is to give the digital identity for change as follows:
Step 1, the user generate digital identity in the block chain by the digital identity of itself and give contract for change;
K social media is arranged in the digital identity gives contract for change according to the digital identity of itself by step 2, the user
Title;
Step 3, when the private cipher key of the user is lost, defined variable w, and initialize w=1;
Step 4, the user select any one to give media for change as the w times social activity in k social media;The user
The open notice that media issue to the public the w time is given for change using described the w times social activity, and described the w time disclosure, which is noticed, to be declared
The w times public-key cryptography;
Step 5, the user gives the digital identity, the w times social activity the title of media for change and the w times disclosure is led to
The URL of announcement, which is sent to the digital identity and gives for change in contract, to be verified, if being proved to be successful, the digital identity gives contract for change
The new public-key cryptography that described the w times is declared is as the public-key cryptography of the digital identity unique association, to complete the number
Body part is given for change;If w+1 is assigned to w by authentication failed;And return to step 4 executes, until being proved to be successful or w=k is
Only.
4. digital identity method for retrieving according to claim 3, characterized in that it is by such as that the digital identity, which gives contract for change,
Lower process is verified:
Step 5.1, the digital identity give contract for change and access the w times open notice by the prophesy machine Oracle of intelligent contract
URL obtains the public-key cryptography declared in the w times open notice, and described the w times social activity is given for change to the title and w of media
The secondary public-key cryptography declared is stored in the digital identity after being associated and gives for change in contract;
Whether number identical with the new public-key cryptography that the w times is declared in the preceding w new public-key cryptography declared of step 5.2, statistics
More than or equal to k/2;If it is greater than or equal to then return is proved to be successful, and otherwise returns to authentication failed.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810074554.4A CN108282339B (en) | 2018-01-25 | 2018-01-25 | Digital identity retrieving method based on intelligent contracts and self-social media |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810074554.4A CN108282339B (en) | 2018-01-25 | 2018-01-25 | Digital identity retrieving method based on intelligent contracts and self-social media |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108282339A true CN108282339A (en) | 2018-07-13 |
CN108282339B CN108282339B (en) | 2020-10-30 |
Family
ID=62805214
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810074554.4A Active CN108282339B (en) | 2018-01-25 | 2018-01-25 | Digital identity retrieving method based on intelligent contracts and self-social media |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108282339B (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109983466A (en) * | 2018-09-27 | 2019-07-05 | 区链通网络有限公司 | A kind of account management system and management method, storage medium based on block chain |
CN109978551A (en) * | 2019-03-29 | 2019-07-05 | 北京投肯科技有限公司 | A kind of account information confirmation and method for retrieving and device based on block chain |
WO2020062668A1 (en) * | 2018-09-29 | 2020-04-02 | 平安科技(深圳)有限公司 | Identity authentication method, identity authentication device, and computer readable medium |
CN111091380A (en) * | 2019-10-25 | 2020-05-01 | 趣派(海南)信息科技有限公司 | Block chain asset management method based on friend covert verification |
ES2774397A1 (en) * | 2019-01-18 | 2020-07-20 | Telefonica Digital Espana Slu | METHOD AND SYSTEM FOR RECOVERY OF CRYPTOGRAPHIC KEYS FROM A BLOCK CHAIN NETWORK (Machine-translation by Google Translate, not legally binding) |
CN111654476A (en) * | 2020-05-20 | 2020-09-11 | 中国工商银行股份有限公司 | User authorized access processing method and device |
CN111666545A (en) * | 2020-07-23 | 2020-09-15 | 光载互联(杭州)科技有限公司 | Block chain-based digital identity information retrieving system and method |
WO2021073202A1 (en) * | 2019-10-15 | 2021-04-22 | 深圳壹账通智能科技有限公司 | Intelligent contract processing method, computer device and storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106779708A (en) * | 2016-12-23 | 2017-05-31 | 中钞信用卡产业发展有限公司北京智能卡技术研究院 | Participant identity management method and system on block chain based on intelligent contract |
WO2017213719A1 (en) * | 2016-06-06 | 2017-12-14 | Thomson Reuters Global Resources | Systems and methods for providing identity scores |
CN107579998A (en) * | 2017-10-17 | 2018-01-12 | 光载无限(北京)科技有限公司 | Personal data center and digital identification authentication method based on block chain, digital identity and intelligent contract |
CN107609876A (en) * | 2017-08-18 | 2018-01-19 | 北京云知科技有限公司 | A kind of method and system for recovering block chain assets |
-
2018
- 2018-01-25 CN CN201810074554.4A patent/CN108282339B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2017213719A1 (en) * | 2016-06-06 | 2017-12-14 | Thomson Reuters Global Resources | Systems and methods for providing identity scores |
CN106779708A (en) * | 2016-12-23 | 2017-05-31 | 中钞信用卡产业发展有限公司北京智能卡技术研究院 | Participant identity management method and system on block chain based on intelligent contract |
CN107609876A (en) * | 2017-08-18 | 2018-01-19 | 北京云知科技有限公司 | A kind of method and system for recovering block chain assets |
CN107579998A (en) * | 2017-10-17 | 2018-01-12 | 光载无限(北京)科技有限公司 | Personal data center and digital identification authentication method based on block chain, digital identity and intelligent contract |
Non-Patent Citations (1)
Title |
---|
周桐: "基于区块链技术的可信数据通证化方法的研究与应用", 《中国博士学位论文全文数据库 信息科技辑》 * |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109983466A (en) * | 2018-09-27 | 2019-07-05 | 区链通网络有限公司 | A kind of account management system and management method, storage medium based on block chain |
WO2020061923A1 (en) * | 2018-09-27 | 2020-04-02 | 区链通网络有限公司 | Blockchain-based account management system and management method, and storage medium |
WO2020062668A1 (en) * | 2018-09-29 | 2020-04-02 | 平安科技(深圳)有限公司 | Identity authentication method, identity authentication device, and computer readable medium |
ES2774397A1 (en) * | 2019-01-18 | 2020-07-20 | Telefonica Digital Espana Slu | METHOD AND SYSTEM FOR RECOVERY OF CRYPTOGRAPHIC KEYS FROM A BLOCK CHAIN NETWORK (Machine-translation by Google Translate, not legally binding) |
CN109978551A (en) * | 2019-03-29 | 2019-07-05 | 北京投肯科技有限公司 | A kind of account information confirmation and method for retrieving and device based on block chain |
WO2021073202A1 (en) * | 2019-10-15 | 2021-04-22 | 深圳壹账通智能科技有限公司 | Intelligent contract processing method, computer device and storage medium |
CN111091380A (en) * | 2019-10-25 | 2020-05-01 | 趣派(海南)信息科技有限公司 | Block chain asset management method based on friend covert verification |
CN111091380B (en) * | 2019-10-25 | 2023-05-09 | 趣派(海南)信息科技有限公司 | Block chain asset management method based on friend hidden verification |
CN111654476A (en) * | 2020-05-20 | 2020-09-11 | 中国工商银行股份有限公司 | User authorized access processing method and device |
CN111654476B (en) * | 2020-05-20 | 2022-07-29 | 中国工商银行股份有限公司 | User authorized access processing method and device |
CN111666545A (en) * | 2020-07-23 | 2020-09-15 | 光载互联(杭州)科技有限公司 | Block chain-based digital identity information retrieving system and method |
Also Published As
Publication number | Publication date |
---|---|
CN108282339B (en) | 2020-10-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108282339A (en) | A kind of digital identity method for retrieving based on intelligent contract and from social media | |
Dai et al. | A low storage room requirement framework for distributed ledger in blockchain | |
Yu et al. | A blockchain-based shamir’s threshold cryptography scheme for data protection in industrial internet of things settings | |
US11425108B2 (en) | Blockchain-based service data encryption methods and apparatuses | |
US10356094B2 (en) | Uniqueness and auditing of a data resource through an immutable record of transactions in a hash history | |
US10880072B2 (en) | Systems and methods for controlled random endorsement in a blockchain network | |
CN102158468B (en) | Method for sharing and acquiring data in social network service (SNS) | |
Ulukus et al. | Private retrieval, computing, and learning: Recent progress and future challenges | |
Zhang et al. | Cryptographic solutions for cloud storage: Challenges and research opportunities | |
US11625718B2 (en) | Blockchain-based data verification system and method, computing device and storage medium | |
CN111130770B (en) | Information certification method and system based on blockchain, user terminal, electronic equipment and storage medium | |
CN105164971A (en) | Verification system and method with extra security for lower-entropy input records | |
US20220263660A1 (en) | Authentication through use of an unforgable hash function based credential | |
CN113438084A (en) | Green power source tracing method and system based on R-PBFT consensus algorithm and timestamp | |
CN107948192A (en) | A kind of block chain account customization identification and login method and system | |
CN105847853A (en) | Video content distribution method and device | |
Li et al. | SPFM: Scalable and privacy-preserving friend matching in mobile cloud | |
WO2019179625A1 (en) | Distributed data storage network nodes and methods | |
CN105183402B (en) | Date storage method | |
US9824227B2 (en) | Simulated control of a third-party database | |
Yoon et al. | Blockchain-based object name service with tokenized authority | |
Zhao et al. | Digital education transaction object authentication service based on blockchain technology | |
CN111444265A (en) | Government affair information sharing system based on block chain | |
CN110661634B (en) | User information processing method and device | |
CN115934832A (en) | Metering test detection data credible sharing method based on block chain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20220421 Address after: 230022 Room 501, block B, Anhui Institute of industrial technology innovation, No. 2221, Changjiang West Road, high tech Zone, Hefei, Anhui Province Patentee after: Anhui Zhongke lattice Technology Co.,Ltd. Address before: 230031 no.350 shushanhu Road, Science Island, Shushan District, Hefei City, Anhui Province Patentee before: HEFEI INSTITUTES OF PHYSICAL SCIENCE, CHINESE ACADEMY OF SCIENCES |