CN111787530B - Block chain digital identity management method based on SIM card - Google Patents

Block chain digital identity management method based on SIM card Download PDF

Info

Publication number
CN111787530B
CN111787530B CN202010780874.9A CN202010780874A CN111787530B CN 111787530 B CN111787530 B CN 111787530B CN 202010780874 A CN202010780874 A CN 202010780874A CN 111787530 B CN111787530 B CN 111787530B
Authority
CN
China
Prior art keywords
identity
card
user
verification
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010780874.9A
Other languages
Chinese (zh)
Other versions
CN111787530A (en
Inventor
白鑫
周政军
唐伟东
石磊
刘胜杰
赵国宝
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Unicom Xiongan Industrial Internet Co Ltd
Original Assignee
China Unicom Xiongan Industrial Internet Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Unicom Xiongan Industrial Internet Co Ltd filed Critical China Unicom Xiongan Industrial Internet Co Ltd
Priority to CN202010780874.9A priority Critical patent/CN111787530B/en
Publication of CN111787530A publication Critical patent/CN111787530A/en
Application granted granted Critical
Publication of CN111787530B publication Critical patent/CN111787530B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention discloses a block chain digital identity management method based on a SIM card, which comprises the following steps: the digital identity management App communicates with the BSIM card by calling the SDK; the user uploads user identity information through the digital identity management App, an operator performs audit verification, and identity identification information formed by the authentication node information is uploaded to an identity alliance chain; generating a public-private key pair, and storing the private key in a BSIM card encryption logic unit card; when the identity is identified, the verification party receives an application of an identity identification card, and retrieves the identity identification information from the identity alliance chain according to the identity card transaction number; the user uses the private key in the BSIM card to authorize, and the verification party can acquire the requested verification information after the user confirms the authorization. According to the block chain digital identity management method based on the SIM card, the security of private key information is ensured through the encryption of software and hardware of the SIM card, and convenience is also achieved.

Description

Block chain digital identity management method based on SIM card
Technical Field
The invention relates to the technical field of internet identity authentication management, in particular to a block chain digital identity management method based on a SIM card.
Background
With the development of the internet of everything and the industrial internet, many new problems occur in the fields of data, assets and identity security, and the risk of identity information theft is one of them. Unlike traditional identity issuing mechanism, the Internet has great difficulty in the process of generating and authenticating identity. When the network user handles important business, the network user is required to authenticate the identity by real name, the identity faces a huge risk of being stolen, the number of times of uploading the identity authentication per person is more than 5 times according to statistics of the Chinese Internet users, and the risk of revealing the identity privacy is greatly increased. Based on the problem, to thoroughly solve the problem of identity information security, a blockchain technology is required to be used for constructing an identity management platform which is shared by the whole society based on autonomous authorization of users, so that the problem of private key encryption of an identity management network based on blockchains becomes one of main pain points in the background.
In the industry at present, most of private key protection is realized by encrypting U-shields or cold-hot separation of a plurality of mobile phones, and the modes reduce the usability of identity management authentication and increase the security risks in other aspects. Therefore, a private key encryption and storage technical scheme with higher security, lower hardware cost and better convenience is needed.
Disclosure of Invention
The invention aims to provide a block chain digital identity management method based on an SIM card, which ensures the safety of private key information through the encryption of software and hardware of the SIM card, has more convenience at the same time, is bound with a mobile phone, and can carry the private key information with users to carry out identity authentication.
In order to achieve the above object, the present invention provides the following solutions:
a blockchain digital identity management method based on a SIM card, the method comprising the steps of:
s1, opening an account at a user mobile terminal, wherein the user mobile terminal is provided with a BSIM card for managing a blockchain key and a digital identity management App based on a blockchain, and the digital identity management App communicates with the BSIM card by calling an SDK;
s2, the user uploads the user identity information through the digital identity management App, an operator performs audit verification, and uploads the identity identification information formed by the verification node information to an identity alliance chain and returns an identity card transaction number;
s3, the user carries out decryption operation through the digital identity management App to generate seed, the BSIM card generates a public-private key pair in the card by utilizing a key derivation algorithm according to the seed, the private key is stored in a BSIM card encryption logic unit card, and the BSIM card returns the generated public key to the digital identity management App through the SDK and stores the public key in an identity alliance chain;
s4, when the identity is identified, the verifier receives an application of an identity identification card, retrieves identity identification information from an identity alliance chain according to the identity card transaction number, finds verification node information in the identity identification information, and an operator verification node requests a user to confirm authorization;
s5, the user uses the private key in the BSIM card to authorize, and the verification party can acquire the requested verification information after the user confirms the authorization.
Optionally, in step S2, the user uploads the user identity information through the digital identity management App, the operator performs audit verification, uploads the identity information formed by the verification node information to the identity federation chain, and returns the identity card transaction number, which specifically includes:
the user uploads user identity information through a digital identity management App, an operator receives a signature identity file submitted by the user, and the operator audits a user certificate and a signature and audits the identity information through an operator real-name authentication system;
after the verification of the identity information is passed, the private key of the operator is used for signing the identity file, the background uploads the identity hash of the identity information after the hash algorithm and the identity identification information consisting of the verification node information to the identity alliance chain, and the identity card transaction number is returned.
Optionally, in the step S3, the user performs a decryption operation through the digital identity management App to generate a seed, which specifically includes:
the digital identity management App calls the SDK to communicate with the BSIM card, sends a command for generating a seed through a password or a living body authentication behavior input by a user, and the seed is backed up in the cloud after being encrypted by the user.
Optionally, the step S4 further includes:
the verification party initiates an identity card request, and a user provides identity verification or display for the verification party, wherein verification refers to whether a service condition is met or not, and display refers to displaying specific content attributes;
the user provides a verification entrance for the verification party, and sends a verification party a verification application for identity identification, wherein the verification entrance is a two-dimensional code or an input text.
Optionally, the step S1 further includes filling in a name and remark of an identity tag through the digital identity management App, selecting an identity type, and setting a security policy and security information, where the identity tag refers to different scene identity information.
Optionally, in step S4, when performing identity recognition, the user selects a corresponding identity tag through the digital identity management App according to different application scenarios, and sends a card application for identity recognition to the verifier.
According to the specific embodiment provided by the invention, the invention discloses the following technical effects: the invention provides a block chain digital identity management method based on a SIM card, which aims at the defects of the existing private key storage scheme and provides a management technical scheme for storing private key information into the SIM card, compared with the existing private key management mechanism, the technical scheme has higher safety, the safety of the private key information is ensured through the encryption of software and hardware of the SIM card, and meanwhile, the method has higher convenience, the SIM card is bound with a mobile phone, and a user can carry the private key information with him to carry out identity authentication; the invention accords with the distributed multi-center identity identification protocol of the W3C DID specification, links the identity identification of the user (composed of the user identity hash value and the verification node information) based on the blockchain technology, provides a solution based on the W3C VC specification, and stores the real identity of the main body and the content of the verifiable digital certificate in a chain.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions of the prior art, the drawings that are needed in the embodiments will be briefly described below, it being obvious that the drawings in the following description are only some embodiments of the present invention, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a BSIM card-based digital identity alliance of the present invention;
FIG. 2 is a schematic diagram of identity enablement procedure and BSIM key generation according to the present invention;
FIG. 3 is a flow chart illustrating the identity management and usage process according to the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
The invention aims to provide a block chain digital identity management method based on an SIM card, which ensures the safety of private key information through the encryption of software and hardware of the SIM card, has more convenience at the same time, is bound with a mobile phone, and can carry the private key information with users to carry out identity authentication.
In order that the above-recited objects, features and advantages of the present invention will become more readily apparent, a more particular description of the invention will be rendered by reference to the appended drawings and appended detailed description.
As shown in fig. 1 to 3, the blockchain digital identity management method based on the SIM card provided by the embodiment of the present invention includes the following steps:
s1, opening an account at a user mobile terminal, wherein the user mobile terminal is provided with a BSIM card for managing a blockchain key and a digital identity management App based on a blockchain, and the digital identity management App communicates with the BSIM card by calling an SDK;
s2, the user uploads the user identity information through the digital identity management App, an operator performs audit verification, and uploads the identity identification information formed by the verification node information to an identity alliance chain and returns an identity card transaction number;
s3, the user carries out decryption operation through the digital identity management App to generate seed, the BSIM card generates a public-private key pair in the card by utilizing a key derivation algorithm according to the seed, the private key is stored in a BSIM card encryption logic unit card, and the BSIM card returns the generated public key to the digital identity management App through the SDK and stores the public key in an identity alliance chain;
s4, when the identity is identified, the verifier receives an application of an identity identification card, retrieves identity identification information from an identity alliance chain according to the identity card transaction number, finds verification node information in the identity identification information, and an operator verification node requests a user to confirm authorization;
s5, the user uses the private key in the BSIM card to authorize, and the verification party can acquire the requested verification information after the user confirms the authorization.
In step S2, the user uploads user identity information through the digital identity management App, the operator performs audit verification, uploads identity information formed by the verification node information to the identity federation chain, and returns an identity card transaction number, which specifically includes:
the user uploads user identity information through a digital identity management App, an operator receives a signature identity file submitted by the user, and the operator audits a user certificate and a signature and audits the identity information through an operator real-name authentication system;
after the verification of the identity information is passed, the private key of the operator is used for signing the identity file, the background uploads the identity hash of the identity information after the hash algorithm and the identity identification information consisting of the verification node information to the identity alliance chain, and the identity card transaction number is returned.
In the step S3, the user performs decryption operation through the digital identity management App to generate seed, which specifically includes:
the digital identity management App calls the SDK to communicate with the BSIM card, sends a command for generating a seed through a password or a living body authentication behavior input by a user, and the seed is backed up in the cloud after being encrypted by the user.
The step S4 further includes:
the verification party initiates an identity card request, and a user provides identity verification or display for the verification party, wherein verification refers to whether a service condition is met or not, and display refers to displaying specific content attributes;
the user provides a verification entrance for the verification party, and sends a verification party a verification application for identity identification, wherein the verification entrance is a two-dimensional code or an input text.
The step S1 further includes filling in the name and remark of the identity tag through the digital identity management App, selecting the identity type, and setting the security policy and the security information, wherein the identity tag refers to different scene identity information.
And S4, when the identity is identified, the user selects a corresponding identity tag through the digital identity management App according to different application scenes, and sends an identity identification card application to the verification party.
In the above technical solution of the present invention, a solution for digital identity management through a SIM card is provided, which includes a SIM card (abbreviated as BSIM card) with an intelligent security system guarantee for managing a blockchain key, a blockchain-based digital identity management App (abbreviated as identity App), a set of SDK (abbreviated as SDK) for interaction between the identity App and the BSIM card, and a set of digital identity blockchain alliance network (abbreviated as identity alliance chain).
The identity alliance participators include BSIM card issuer, identity holder (user), identity identification verifier.
The issuer: the identity authentication and issuing operator usually has certain qualification and authority, such as telecom operators authenticated by the real name of the user.
Identity holder: the identity authentication subject may be a person or an object or an organization.
Identity authentication party: the identification of the desiring party of the scene refers to specific service requirements, such as a scene requiring an admission mechanism or a scene requiring distinguishing service subjects. The identification party usually needs the procedures of pre-identification, authentication and the like when providing access or service.
The issuer prepares the federation node operating environment and generates the CA certificate. The identity holder generates a blockchain key pair. The blockchain alliance management system registers issuer and identity holder information and configures CA certificates, public keys of the issuer and the holder can be queried from the public information, and authority of the issuer digital signature can be verified by the public keys in future.
The user installs the BSIM card on a smart device (e.g., a cell phone). The identity private key cannot be output from the card, encryption, decryption and signature operation are all executed in the card, and the security level of the hardware wallet level is achieved. The seed belongs to high risk level data, and an operator provides a seed ciphertext storage management service to better serve clients so as to prevent the users from losing the BSIM card and then being unable to retrieve the assets. Therefore, it is necessary to ensure that the carrier cannot recover the seed unilaterally by multiple encryption means. In the future, the customer needs to restore the seed plaintext, the operator can only provide the seed ciphertext of the entrusted storage tube, and then the user restores the seed ciphertext by himself; if the user does not enable the operator seed ciphertext storage service, the operator will ensure that the risk is informed of the proper position and sign the corresponding disclaimer terms.
The user can log in the identity App and select an identity tag (different scene identity information); the identification verification party retrieves and acquires transaction ciphertext (or cache) from the digital identity alliance chain according to the selected identity tag; the App uses the private key in the SIM card to carry out identity authorization; and the App generates a two-dimensional code from the verification entrance and provides the two-dimensional code for the identification party to read and verify.
The invention provides a block chain digital identity management method based on a SIM card, which aims at the defects of the existing private key storage scheme and provides a management technical scheme for storing private key information into the SIM card, compared with the existing private key management mechanism, the technical scheme has higher safety, the safety of the private key information is ensured through the encryption of software and hardware of the SIM card, and meanwhile, the method has higher convenience, the SIM card is bound with a mobile phone, and a user can carry the private key information with him to carry out identity authentication; the invention accords with the distributed multi-center identity identification protocol of the W3C DID specification, links the identity identification of the user (composed of the user identity hash value and the verification node information) based on the blockchain technology, provides a solution based on the W3C VC specification, and stores the real identity of the main body and the content of the verifiable digital certificate in a chain.
The principles and embodiments of the present invention have been described herein with reference to specific examples, the description of which is intended only to assist in understanding the methods of the present invention and the core ideas thereof; also, it is within the scope of the present invention to be modified by those of ordinary skill in the art in light of the present teachings. In view of the foregoing, this description should not be construed as limiting the invention.

Claims (5)

1. The block chain digital identity management method based on the SIM card is characterized by comprising the following steps of:
s1, opening an account at a user mobile terminal, wherein the user mobile terminal is provided with a BSIM card for managing a blockchain key and a digital identity management App based on a blockchain, and the digital identity management App communicates with the BSIM card by calling an SDK;
s2, the user uploads the user identity information through the digital identity management App, an operator performs audit verification, and uploads the identity identification information formed by the verification node information to an identity alliance chain and returns an identity card transaction number;
s3, the user carries out decryption operation through the digital identity management App to generate seed, the BSIM card generates a public-private key pair in the card by utilizing a key derivation algorithm according to the seed, the private key is stored in a BSIM card encryption logic unit card, and the BSIM card returns the generated public key to the digital identity management App through the SDK and stores the public key in an identity alliance chain;
s4, when the identity is identified, the verifier receives an application of an identity identification card, retrieves identity identification information from an identity alliance chain according to the identity card transaction number, finds verification node information in the identity identification information, and an operator verification node requests a user to confirm authorization;
s5, the user uses a private key in the BSIM card to authorize, and the verification party can acquire the requested verification information after the user confirms the authorization;
in the step S3, the user performs decryption operation through the digital identity management App to generate seed, which specifically includes:
the digital identity management App calls the SDK to communicate with the BSIM card, sends a command for generating a seed through a password or a living body authentication behavior input by a user, and the seed is backed up in the cloud after being encrypted by the user;
the user installs the BSIM card on the intelligent device, the identity private key cannot go out of the card, encryption, decryption and signature operation are all executed in the card, and the security level of the hardware wallet level is achieved.
2. The SIM card-based blockchain digital identity management method of claim 1, wherein in step S2, the user uploads the user identity information through the digital identity management App, the operator performs audit verification, uploads the identity information formed by the verification node information to the identity alliance chain, and returns the identity card transaction number, and specifically includes:
the user uploads user identity information through a digital identity management App, an operator receives a signature identity file submitted by the user, and the operator audits a user certificate and a signature and audits the identity information through an operator real-name authentication system;
after the verification of the identity information is passed, the private key of the operator is used for signing the identity file, the background uploads the identity hash of the identity information after the hash algorithm and the identity identification information consisting of the verification node information to the identity alliance chain, and the identity card transaction number is returned.
3. The SIM card based blockchain digital identity management method of claim 1, wherein step S4 further comprises:
the verification party initiates an identity card request, and a user provides identity verification or display for the verification party, wherein verification refers to whether a service condition is met or not, and display refers to displaying specific content attributes;
the user provides a verification entrance for the verification party, and sends a verification party a verification application for identity identification, wherein the verification entrance is a two-dimensional code or an input text.
4. The SIM card-based blockchain digital identity management method of claim 1, wherein the step S1 further includes filling in a name and a remark of an identity tag through the digital identity management App, selecting an identity type, and setting a security policy and security information, wherein the identity tag refers to different scene identity information.
5. The method for managing blockchain digital identity based on the SIM card according to claim 4, wherein in step S4, when performing identity recognition, the user selects a corresponding identity tag through the digital identity management App according to different application scenarios, and sends a request for an identity recognition card to the verifier.
CN202010780874.9A 2020-08-06 2020-08-06 Block chain digital identity management method based on SIM card Active CN111787530B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010780874.9A CN111787530B (en) 2020-08-06 2020-08-06 Block chain digital identity management method based on SIM card

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010780874.9A CN111787530B (en) 2020-08-06 2020-08-06 Block chain digital identity management method based on SIM card

Publications (2)

Publication Number Publication Date
CN111787530A CN111787530A (en) 2020-10-16
CN111787530B true CN111787530B (en) 2024-01-09

Family

ID=72765867

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010780874.9A Active CN111787530B (en) 2020-08-06 2020-08-06 Block chain digital identity management method based on SIM card

Country Status (1)

Country Link
CN (1) CN111787530B (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112199448A (en) * 2020-12-04 2021-01-08 南京星链高科技发展有限公司 Industrial and commercial registration method and system based on block chain
CN112637855B (en) * 2020-12-15 2022-11-29 中国联合网络通信集团有限公司 Machine-card binding method based on block chain and server
CN112862481B (en) * 2021-01-25 2024-05-14 联通雄安产业互联网有限公司 Block chain digital asset key management method and system based on SIM card
CN112989381B (en) * 2021-03-24 2022-03-22 中国电子科技集团公司第三十研究所 Block chain anti-association-based uniform heterogeneous identity identification method
CN115860763A (en) * 2021-04-07 2023-03-28 支付宝(杭州)信息技术有限公司 Identity authentication processing method and device
CN113014676B (en) * 2021-04-21 2023-11-03 联通雄安产业互联网有限公司 System and method for storing data of Internet of things into blockchain based on SIM card
CN113163013B (en) * 2021-04-27 2022-09-27 中国工商银行股份有限公司 Block chain digital identity customizable generation method and device
CN115002761B (en) * 2021-04-27 2023-09-05 中移互联网有限公司 Data processing method and device and electronic equipment
CN114268511A (en) * 2022-03-03 2022-04-01 北京溪塔科技有限公司 Multi-communication network charging method and device based on block chain
CN114567881B (en) * 2022-04-24 2022-07-19 江苏益捷思信息科技有限公司 SIM card information security protection method and system

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1437375A (en) * 2002-02-08 2003-08-20 泰康亚洲(北京)科技有限公司 Confirmation method for safe mobile e-business platform digital certificate
CN103747443A (en) * 2013-11-29 2014-04-23 厦门盛华电子科技有限公司 Multi-security domain device based on mobile phone user identification card and authentication method thereof
CN107820238A (en) * 2016-09-12 2018-03-20 国民技术股份有限公司 SIM card, block chain application security module, client and its method for safely carrying out
CN108012268A (en) * 2017-12-08 2018-05-08 北京虎符信息技术有限公司 A kind of mobile phone terminal SIM card and the method for safe handling App, medium
CN109767215A (en) * 2018-12-29 2019-05-17 杭州趣链科技有限公司 A kind of online block chain identity identifying method based on a variety of private key storage modes
CN109936569A (en) * 2019-02-21 2019-06-25 领信智链(北京)科技有限公司 A kind of decentralization digital identity login management system based on ether mill block chain
WO2020061923A1 (en) * 2018-09-27 2020-04-02 区链通网络有限公司 Blockchain-based account management system and management method, and storage medium
US10637665B1 (en) * 2016-07-29 2020-04-28 Workday, Inc. Blockchain-based digital identity management (DIM) system
CN111182525A (en) * 2019-12-25 2020-05-19 中国联合网络通信集团有限公司 Method and device for storing data
CN111859348A (en) * 2020-07-31 2020-10-30 上海微位网络科技有限公司 Identity authentication method and device based on user identification module and block chain technology

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102802036B (en) * 2012-07-26 2015-04-29 深圳创维-Rgb电子有限公司 System and method for identifying digital television
US10826704B2 (en) * 2018-08-31 2020-11-03 Hewlett Packard Enterprise Development Lp Blockchain key storage on SIM devices

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1437375A (en) * 2002-02-08 2003-08-20 泰康亚洲(北京)科技有限公司 Confirmation method for safe mobile e-business platform digital certificate
CN103747443A (en) * 2013-11-29 2014-04-23 厦门盛华电子科技有限公司 Multi-security domain device based on mobile phone user identification card and authentication method thereof
US10637665B1 (en) * 2016-07-29 2020-04-28 Workday, Inc. Blockchain-based digital identity management (DIM) system
CN107820238A (en) * 2016-09-12 2018-03-20 国民技术股份有限公司 SIM card, block chain application security module, client and its method for safely carrying out
CN108012268A (en) * 2017-12-08 2018-05-08 北京虎符信息技术有限公司 A kind of mobile phone terminal SIM card and the method for safe handling App, medium
WO2020061923A1 (en) * 2018-09-27 2020-04-02 区链通网络有限公司 Blockchain-based account management system and management method, and storage medium
CN109767215A (en) * 2018-12-29 2019-05-17 杭州趣链科技有限公司 A kind of online block chain identity identifying method based on a variety of private key storage modes
CN109936569A (en) * 2019-02-21 2019-06-25 领信智链(北京)科技有限公司 A kind of decentralization digital identity login management system based on ether mill block chain
CN111182525A (en) * 2019-12-25 2020-05-19 中国联合网络通信集团有限公司 Method and device for storing data
CN111859348A (en) * 2020-07-31 2020-10-30 上海微位网络科技有限公司 Identity authentication method and device based on user identification module and block chain technology

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
区块链业务创新:数字身份认证;梁峥;刘豪;;通信企业管理(第11期);全文 *
基于区块链的数字身份应用与研究;刘千仞;薛淼;任梦璇;王光全;;邮电设计技术(第04期);全文 *
远程办公中基于区块链技术的身份认证方法;王柏华;孙长杰;李照川;王伟兵;;信息安全研究(第04期);全文 *

Also Published As

Publication number Publication date
CN111787530A (en) 2020-10-16

Similar Documents

Publication Publication Date Title
CN111787530B (en) Block chain digital identity management method based on SIM card
US10595201B2 (en) Secure short message service (SMS) communications
US8335925B2 (en) Method and arrangement for secure authentication
JP4866863B2 (en) Security code generation method and user device
CN111275419B (en) Block chain wallet signature right confirming method, device and system
CN101815091A (en) Cipher providing equipment, cipher authentication system and cipher authentication method
JP2000357156A (en) System and method for authentication sheet distribution
CN111294203B (en) Information transmission method
CN106936588A (en) A kind of trustship method, the apparatus and system of hardware controls lock
CN104951939A (en) Electronic bank card system and application method thereof as well as electronic method of bank card
CN201717885U (en) Code providing equipment and code identification system
CN110086627B (en) Quantum communication service station key negotiation method and system based on asymmetric key pool pair and time stamp
Fourar-Laidi A smart card based framework for securing e-business transactions in distributed systems
WO2020263938A1 (en) Document signing system for mobile devices
Köse et al. Design of a Secure Key Management System for SIM Cards: SIM-GAYS
US8621231B2 (en) Method and server for accessing an electronic safe via a plurality of entities
CN106055966B (en) A kind of authentication method and system
KR101705293B1 (en) Authentication System and method without secretary Password
CN110138547A (en) Based on unsymmetrical key pond to and sequence number quantum communications service station cryptographic key negotiation method and system
CN113162766B (en) Key management method and system for key component
EP2658203A1 (en) Method and computer communication system for the authentication of a client system
CN115987597A (en) Key updating method and system based on software, terminal equipment and virtual server
GB2450537A (en) Identity verification using a subset of identification symbols

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant