CN111818491A - Decentralized identity management method under 5G environment D2D scene - Google Patents

Decentralized identity management method under 5G environment D2D scene Download PDF

Info

Publication number
CN111818491A
CN111818491A CN202010663628.5A CN202010663628A CN111818491A CN 111818491 A CN111818491 A CN 111818491A CN 202010663628 A CN202010663628 A CN 202010663628A CN 111818491 A CN111818491 A CN 111818491A
Authority
CN
China
Prior art keywords
data
identity
user
authority
data holding
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010663628.5A
Other languages
Chinese (zh)
Inventor
肖辉
江华
刘寨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Sunsheen Technology Co ltd
Original Assignee
Chengdu Sunsheen Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Sunsheen Technology Co ltd filed Critical Chengdu Sunsheen Technology Co ltd
Priority to CN202010663628.5A priority Critical patent/CN111818491A/en
Publication of CN111818491A publication Critical patent/CN111818491A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/70Services for machine-to-machine communication [M2M] or machine type communication [MTC]

Abstract

The invention discloses a decentralized identity management method under the scene of a 5G environment D2D, which comprises the following steps: the data holding mechanism uses DID to log in the data using mechanism and learns that the application needs the data holding mechanism to provide a certain verifiable statement; the data holding organization authorizes the data using organization to go to the identity center to obtain the verifiable statement; the data holding organization successfully logs in the data using organization. Further comprising the step of identity information registration: a user uses a DID program of the 5G equipment to create own DID; a user acquires an identity certification authority list in a DID program; the user submits a verifiable claim application to a designated identity certification authority and provides related verification materials; and after the identity certification authority audits the materials, issuing a verifiable statement to the user, and enabling the user to become a data holding authority. In the range which can be covered by the same identity platform, the identity identification and detection standards of the users are unified, and the application authority and the user identity/data are separated in the data authority, so that the ownership of the user data is guaranteed.

Description

Decentralized identity management method under 5G environment D2D scene
Technical Field
The invention relates to an identity authentication method, in particular to a decentralized identity management method in a 5G environment D2D scene, and belongs to the technical field of computers.
Background
At present, based on a technology of directly exchanging data between adjacent devices in a communication network of a D2D (device to device) technology, a D2D communication link is established, transferring data does not need core equipment or central equipment switching, and the data can be directly transmitted through a point-to-point decentralized mode as a data transmission and access network of a massive number of terminals, and the D2D technology has been listed as a development framework of a new generation mobile communication system by the standardization organization 3GPP and becomes one of key technologies of fifth generation mobile communication, but at present, there is no scheme that a method ensures that a digital identity is credibly and controllable in a decentralized 5G environment and can still solve the problem of privacy disclosure in a D2D scene.
Disclosure of Invention
In order to solve the problem of privacy disclosure, the invention provides a method for decentralized identity management in a 5G environment D2D scene.
The technical scheme adopted by the decentralized identity management method under the scene of the 5G environment D2D comprises the following steps:
s1: a user uses a DID program of the 5G equipment to create own DID;
s2: a user acquires an identity certification authority list in a DID program;
s3: the user submits a verifiable claim application to a designated identity certification authority and provides related verification materials;
s4: after the identity certification authority audits the materials, a verifiable statement is issued to the user, and the user becomes a data holding authority;
s5: the data holding mechanism uses DID to log in the data using mechanism and learns that the application needs the data holding mechanism to provide a certain verifiable statement;
s6: the data holding organization authorizes the data using organization to go to the identity center to obtain the verifiable statement;
s7: the data holding organization successfully logs in the data using organization.
And under the 5G environment, 5G equipment is used for building a block chain network among an identity authentication mechanism, a data holding mechanism and a data using mechanism, and the mechanism is used as a node to access and register DID.
The data use mechanism generates an authorization certificate, marks attributes such as an authorization object, a data owner, a validity period and authorization content, and uses a mechanism private key to sign; the data using mechanism can select to generate the abstract of the authorization certificate and write the abstract into the block chain, so that the purpose of increasing the credit is achieved.
The data using mechanism presents the authorization certificate to the data holding mechanism, the data holding mechanism verifies the authorization certificate through the certificate verification interface, and the data holding mechanism sends the data to the data using mechanism after the verification is passed.
The invention achieves the following beneficial effects:
1. the invention provides a decentralized identity management method under the scene of a 5G environment D2D, which is characterized in that in the coverage range of the same identity platform, the identity recognition and detection standards of users are unified, the application authority and the user identity/data are separated in the data authority, and the ownership of the user data is ensured.
2. The invention provides a globally unique distributed entity identity and a trusted data exchange protocol, and promotes cross-department and cross-region identity authentication and data cooperation. Getting rid of the dependence on single center ID registration in the traditional mode. The physical identity of the entity and the contents of the verifiable digital voucher can be stored down-link. The support entity minimizes or selectively exposes information to other agencies, which may make the claim more secure and trusted and further protect user privacy from infringement.
Drawings
Other features and advantages of the invention will be apparent from the following description of the preferred embodiments of the invention, taken in conjunction with the accompanying drawings and from the claims. Individual features of the different embodiments shown in the figures may be combined in any desired manner in this case without going beyond the scope of the invention. In the drawings:
FIG. 1 is a block diagram of the process flow of the present invention.
The implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is further described below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
Example (b):
as shown in fig. 1, in this embodiment, a method for decentralized identity management in a 5G environment D2D scenario includes the following steps:
s1: a user uses a DID program of the 5G equipment to create own DID;
s2: a user acquires a list of issuing parties in a DID program;
s3: the user submits a verifiable statement application to a designated issuing party and provides related verification materials;
s4: after the issuer audits the material, issuing a verifiable statement to the user;
s5: the user logs in the third-party application by using the DID and learns that the application needs the user to provide a certain verifiable statement;
s6: the user authorizes the third party application to obtain the verifiable statement by the identity-removing center;
s7: the user successfully logs into the third party application.
And under the 5G environment, 5G equipment is used for building a block chain network among a certificate issuer, a user and third-party applications, and a mechanism is used as a node to access and register DID.
The third party application generates an authorization certificate, marks attributes such as an authorization object, a data owner, a validity period and authorization content, and uses an organization private key for signature; the third party application can select to generate the abstract of the authorization certificate and write the abstract into the block chain, so that the purpose of increasing the credit is achieved.
The third party application presents the authorization certificate to the user, the user verifies the authorization certificate through the certificate verification interface, and the user sends the data to the third party application after the verification is passed.
In the embodiment, the user isolates the data authority through the app domain name without worrying about the safety of the full data; multiple identities may be used to manage the same application data; the scope of authority to apply is clear prior to use of the application; data may be migrated between different applications. The developer does not need to independently realize services such as account registration, user management and the like; and complicated encryption and decryption check logic is not required to be processed. The service provider uses a set of DID identity and user data management standards; providing more application infrastructure services.
In the method for decentralized identity management in the 5G environment D2D scenario, in the range that can be covered by the same identity platform, the identity recognition and detection standards of users are unified, and the application authority and the user identity/data are separated in the data authority, thereby ensuring the ownership of user data.
The embodiment provides globally unique distributed entity identity identification and a trusted data exchange protocol, and promotes cross-department and cross-region identity authentication and data cooperation. Getting rid of the dependence on single center ID registration in the traditional mode. The physical identity of the entity and the contents of the verifiable digital voucher can be stored down-link. The support entity minimizes or selectively exposes information to other agencies, which may make the claim more secure and trusted and further protect user privacy from infringement.
The above description is only a preferred embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.

Claims (5)

1. A method for decentralized identity management in a 5G environment D2D scene comprises a data holding mechanism, a data using mechanism and an identity certification mechanism, and is characterized by comprising the following steps:
f1: the data holding mechanism uses DID to log in the data using mechanism and learns that the application needs the data holding mechanism to provide a certain verifiable statement;
f2: the data holding organization authorizes the data using organization to go to the identity center to obtain the verifiable statement;
f3: the data holding organization successfully logs in the data using organization.
2. The method for decentralized identity management in the context of a 5G environment D2D according to claim 1, wherein the identity authentication method further includes an identity information registration step:
s1: a user uses a DID program of the 5G equipment to create own DID;
s2: a user acquires an identity certification authority list in a DID program;
s3: the user submits a verifiable claim application to a designated identity certification authority and provides related verification materials;
s4: and after the identity certification authority audits the materials, issuing a verifiable statement to the user, and enabling the user to become a data holding authority.
3. The method for decentralized identity management in D2D scenario under 5G environment according to claim 1, wherein 5G device is used in 5G environment to build block chain network among identity authority, data holding authority, and data using authority, and the authority accesses and registers DID as node.
4. The method for decentralized identity management in the scenario of 5G environment D2D according to claim 1, wherein the data using entity generates an authorization credential indicating attributes of an authorized object, a data owner, a validity period, and an authorization content, and uses an entity private key to sign the authorization credential; the data using mechanism can select to generate the abstract of the authorization certificate and write the abstract into the block chain, so that the purpose of increasing the credit is achieved.
5. The method for decentralized identity management in D2D scenario of claim 1, wherein the data using entity presents an authorization credential to the data holding entity, the data holding entity verifies the authorization credential through the credential verification interface, and the data holding entity sends the data to the data using entity after verification.
CN202010663628.5A 2020-07-10 2020-07-10 Decentralized identity management method under 5G environment D2D scene Pending CN111818491A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010663628.5A CN111818491A (en) 2020-07-10 2020-07-10 Decentralized identity management method under 5G environment D2D scene

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010663628.5A CN111818491A (en) 2020-07-10 2020-07-10 Decentralized identity management method under 5G environment D2D scene

Publications (1)

Publication Number Publication Date
CN111818491A true CN111818491A (en) 2020-10-23

Family

ID=72843019

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010663628.5A Pending CN111818491A (en) 2020-07-10 2020-07-10 Decentralized identity management method under 5G environment D2D scene

Country Status (1)

Country Link
CN (1) CN111818491A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112564920A (en) * 2020-12-08 2021-03-26 爱信诺征信有限公司 Enterprise identity verification method, system, electronic equipment and storage medium
CN113438088A (en) * 2021-06-28 2021-09-24 湖南天河国云科技有限公司 Social network credit monitoring method and device based on block chain distributed identity
CN113452704A (en) * 2021-06-28 2021-09-28 湖南天河国云科技有限公司 Distributed identity identification-based credible interconnection method and device for heterogeneous industrial equipment

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109614818A (en) * 2018-11-30 2019-04-12 西南石油大学 The band keyword search encryption method of delegatable identity-based
CN110795501A (en) * 2019-10-11 2020-02-14 支付宝(杭州)信息技术有限公司 Method, device, equipment and system for creating verifiable statement based on block chain
CN111095327A (en) * 2019-07-02 2020-05-01 阿里巴巴集团控股有限公司 System and method for verifying verifiable claims
CN111164594A (en) * 2019-07-02 2020-05-15 阿里巴巴集团控股有限公司 System and method for mapping decentralized identity to real entity
CN111213147A (en) * 2019-07-02 2020-05-29 阿里巴巴集团控股有限公司 System and method for block chain based cross entity authentication
CN111262843A (en) * 2020-01-10 2020-06-09 腾讯科技(深圳)有限公司 Data acquisition method, authentication method and related product
CN111277577A (en) * 2020-01-14 2020-06-12 北京百度网讯科技有限公司 Digital identity verification method, device, equipment and storage medium

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109614818A (en) * 2018-11-30 2019-04-12 西南石油大学 The band keyword search encryption method of delegatable identity-based
CN111095327A (en) * 2019-07-02 2020-05-01 阿里巴巴集团控股有限公司 System and method for verifying verifiable claims
CN111164594A (en) * 2019-07-02 2020-05-15 阿里巴巴集团控股有限公司 System and method for mapping decentralized identity to real entity
CN111213147A (en) * 2019-07-02 2020-05-29 阿里巴巴集团控股有限公司 System and method for block chain based cross entity authentication
CN110795501A (en) * 2019-10-11 2020-02-14 支付宝(杭州)信息技术有限公司 Method, device, equipment and system for creating verifiable statement based on block chain
CN111262843A (en) * 2020-01-10 2020-06-09 腾讯科技(深圳)有限公司 Data acquisition method, authentication method and related product
CN111277577A (en) * 2020-01-14 2020-06-12 北京百度网讯科技有限公司 Digital identity verification method, device, equipment and storage medium

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112564920A (en) * 2020-12-08 2021-03-26 爱信诺征信有限公司 Enterprise identity verification method, system, electronic equipment and storage medium
CN112564920B (en) * 2020-12-08 2023-07-21 爱信诺征信有限公司 Enterprise identity verification method, system, electronic equipment and storage medium
CN113438088A (en) * 2021-06-28 2021-09-24 湖南天河国云科技有限公司 Social network credit monitoring method and device based on block chain distributed identity
CN113452704A (en) * 2021-06-28 2021-09-28 湖南天河国云科技有限公司 Distributed identity identification-based credible interconnection method and device for heterogeneous industrial equipment
CN113452704B (en) * 2021-06-28 2022-08-09 湖南天河国云科技有限公司 Distributed identity identification-based credible interconnection method and device for heterogeneous industrial equipment

Similar Documents

Publication Publication Date Title
CN109918878B (en) Industrial Internet of things equipment identity authentication and safe interaction method based on block chain
CN1224213C (en) Method for issuing an electronic identity
CN112583802B (en) Data sharing platform system and equipment based on block chain and data sharing method
CN111818491A (en) Decentralized identity management method under 5G environment D2D scene
CN100502307C (en) Integrated user safety management method and device
CN110322940B (en) Access authorization method and system for medical data sharing
CN109088857B (en) Distributed authorization management method in scene of Internet of things
JP2014531163A (en) Centralized secure management method, system, and corresponding communication system for third party applications
CN111049835B (en) Unified identity management system of distributed public certificate service network
EP2957064B1 (en) Method of privacy-preserving proof of reliability between three communicating parties
CN104767731A (en) Identity authentication protection method of Restful mobile transaction system
CN109361753A (en) A kind of Internet of things system framework and encryption method
CN104683107B (en) Digital certificate keeping method and device, digital signature method and device
CN106911627A (en) A kind of true identity method of controlling security and its system based on eID
GB2384069A (en) Transferring user authentication for first to second web site
CN112565294B (en) Identity authentication method based on block chain electronic signature
CN111880919A (en) Data scheduling method, system and computer equipment
CN114205112B (en) Cloud MQTT access authority control method
CN115883154A (en) Access certificate issuing method, block chain-based data access method and device
CN101789973A (en) Method and system for constructing Mashup application
US20240039707A1 (en) Mobile authenticator for performing a role in user authentication
Kerttula A novel federated strong mobile signature service—the finnish case
Park et al. Open location-based service using secure middleware infrastructure in web services
KR100349888B1 (en) PKI system for and method of using micro explorer on mobile terminals
US11595215B1 (en) Transparently using macaroons with caveats to delegate authorization for access

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20201023