CN113553621A - Self-ownership identity system and method - Google Patents

Self-ownership identity system and method Download PDF

Info

Publication number
CN113553621A
CN113553621A CN202110859169.2A CN202110859169A CN113553621A CN 113553621 A CN113553621 A CN 113553621A CN 202110859169 A CN202110859169 A CN 202110859169A CN 113553621 A CN113553621 A CN 113553621A
Authority
CN
China
Prior art keywords
module
definition
data
data stream
identity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110859169.2A
Other languages
Chinese (zh)
Inventor
居敏
徐丹梅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202110859169.2A priority Critical patent/CN113553621A/en
Publication of CN113553621A publication Critical patent/CN113553621A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6272Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database by registering files or documents with a third party
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Data Mining & Analysis (AREA)
  • Computing Systems (AREA)
  • Medical Informatics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a self-ownership identity system and a self-ownership identity method, which comprise an identity protocol interface, wherein the identity protocol interface comprises a data module, a definition module, a recording module and an index module; the data module is used for creating a DID controlled data stream; the definition module is used for creating a corresponding definition ID according to the data stream and mapping the definition ID to the index module, wherein the definition ID comprises a data structure corresponding to the data stream; the recording module is used for storing the data stream specified by the definition module and forming a corresponding recording ID to be mapped into the index module; the index module is used for inquiring or retrieving the data stream corresponding to the record ID according to the DID and the definition ID. The invention solves various problems faced by the current autoownership identity at the present stage.

Description

Self-ownership identity system and method
Technical Field
The invention relates to the technical field of block chains, in particular to a system and a method for self-ownership identity.
Background
The main purpose of the self-ownership identity is to make the user become a master for controlling own data, and the personal data of the user can be shared with others only under the condition of self-approval. Although the concept of autonomous identity has long been known, until the block chain technology has matured, there has been no very effective solution. Even though the international world wide web consortium (w3c) is now setting up a series of technical standards for autonomy, the actual solutions in use are flexible and countable on a global scale, since the technical standards are not fully developed.
The existing autonomous identity service has the following disadvantages: 1) the operation threshold is high: today, the mainstream autonomous identity service (such as Sovrin) or technical framework (such as superhedger) is mostly based on a federation chain (federation) which is a relatively closed ecosystem, and there is a threshold for general enterprises to apply for joining. Even if autonomy identity organizations like Sovrin Foundation are added, enterprises still face technical subjects such as building and maintaining block chain environments, and the like, so that the operation cost of the enterprises is undoubtedly and greatly increased; 2) the development difficulty is large: if a general enterprise wants to introduce a solution of the self-ownership identity, enterprise technicians are required to fully know the block chain technology and have a series of related knowledge of building a framework, developing mobile phone applications and the like, which can be called as a high requirement for developers; 3) data issuer and verifier resources are difficult to integrate: the current data distribution and verification of autonomy is limited to very limited fields worldwide, such as new crown vaccination in europe. In addition, services that accept and provide autonomy authentication are also subject to acceptance. As an enterprise, it is very difficult to find an ideal data issuer and data verifier so as to realize the whole business application scenario. This is partly due to the fact that the industry standards for autonomous identities are still in an immature stage, resulting in no interoperability between the solutions for autonomous identities; 4) data interaction cannot be realized: although various solutions for autonomy exist in the industry at present, no mature technology for realizing data interaction exists among the solutions. This has resulted in the fact that to date there has not been a widely recognized and applied solution. Although the popularity of W3C has accelerated the standard of autonomy, in the present situation, individual autonomy is in the confusion of the "social tie"; 5) applications to individual users are quite limited: at present, the application and development of the autonomy are mainly promoted by governments, organizations and large internet companies, the application scene is often limited to public services (such as the above-mentioned new crown vaccination certification) and enterprise services (such as the autonomy Network oriented to job hunting), and the like, and at the present, the community oriented to developers like an App store is not available, so that the application of the autonomy-based identity oriented to individual users is very limited.
Disclosure of Invention
The present invention provides a system and method for self-ownership status, which solves the above-mentioned problems encountered in the current self-ownership status.
In order to solve the technical problem, the invention provides a self-ownership identity system, which comprises an identity protocol interface, wherein the identity protocol interface comprises a data module, a definition module, a recording module and an index module;
the data module is used for creating a DID controlled data stream;
the definition module is used for creating a corresponding definition ID according to the data stream and mapping the definition ID to the index module, wherein the definition ID comprises a data structure corresponding to the data stream;
the recording module is used for storing the data stream specified by the definition module and forming a corresponding recording ID to be mapped into the index module;
the index module is used for inquiring or retrieving the data stream corresponding to the record ID according to the DID and the definition ID.
As a further improvement of the invention, the data of the data stream is stored in the recording module in a plaintext mode or in an encrypted mode.
As a further improvement of the present invention, when the data module creates a new data stream, the data stream is automatically registered in the index module through the definition module and the recording module.
As a further refinement of the present invention, the definition module creates a key string definition when the data module creates a DID-controlled data stream that stores encrypted authentication secrets that allow for the authentication of DID using various blockchain wallets.
As a further refinement of the invention, the definition module creates the AKA definition when the data module creates a DID-controlled data stream that stores a list of Web2 accounts controlled by the same user that owns the DID, and a verifiable statement to prove this ownership.
As a further refinement of the present invention, the definition module creates the encrypted account definition when the data module creates a DID-controlled data stream that stores a list of user account data stream IDs that publicly prove that the owner of this DID also owns various accounts on the Web3 or blockchain platform.
As a further refinement of the invention, the data structure includes a URL identification.
As a further refinement of the invention, the identity protocol interface is further adapted to interface the blockchains using the same data according to the data structure and the metadata.
As a further improvement of the present invention, the identity protocol interface supports DID linking to each blockchain account for identity verification.
The data docking method for the self-ownership identity adopts the self-ownership identity system, and comprises the following steps:
s1: the data module creates DID controlled data stream;
s2: the definition module creates a corresponding definition ID according to the data stream and maps the definition ID to the index module, wherein the definition ID comprises a data structure corresponding to the data stream;
s3: the recording module stores the data stream specified by the definition module and forms a corresponding recording ID to be mapped to the index module;
s4: and the indexing module inquires or retrieves the data stream corresponding to the record ID according to the DID and the definition ID.
The invention has the beneficial effects that: the invention can enable developers to easily construct an application program with user control flow to store data and discover and utilize user data created on a third-party application program; the use of an identity protocol interface can be constructed to allow users to control their identity and data independently of any single application, while allowing developers to construct data rich applications without the need to keep user data on a central server, and through the sharing of user identity and data; the identity protocol interface solves the problem that when a user logs in different applications, an account needs to be established for each application, so that brand new and smooth user experience is provided while account safety is guaranteed.
Drawings
FIG. 1 is a schematic diagram of the system of the present invention.
Detailed Description
The present invention is further described below in conjunction with the following figures and specific examples so that those skilled in the art may better understand the present invention and practice it, but the examples are not intended to limit the present invention.
Example one
Referring to fig. 1, an embodiment of the present invention provides an autonomous identity system, including an identity protocol interface, where the identity protocol interface includes a data module, a definition module, a recording module, and an index module;
the data module is used for creating a DID controlled data stream;
the definition module is used for creating a corresponding definition ID according to the data stream and mapping the definition ID to the index module, wherein the definition ID comprises a data structure corresponding to the data stream;
the recording module is used for storing the data stream specified by the definition module and forming a corresponding recording ID to be mapped into the index module;
the index module is used for inquiring or retrieving the data stream corresponding to the record ID according to the DID and the definition ID.
Specifically, the identity protocol interface includes: indexing: the index is a key-value stream (key value stream) that stores a mapping list of definition IDs to record IDs; definition (Definition): the definition is a stream describing the record, including definition ID identification; data format (Schema): the data format is a stream containing a JSON schema, specifies the data format in the record, and is identified by the schema url contained in the definition; a record is a stream containing data specified by a definition, identified by a record ID. Writing a record process by utilizing an autonomous identity system: a developer creates a data structure (schema); creating a Definition (Definition) and containing the schema URL; the user creates a Record (Record) that conforms to the definition; users add definitioniD and recordID to their Index (Index). And (3) reading and recording processes: the developer queries the index using DID and definitionsID or alias; the record corresponding to the definitionID is retrieved.
The application has the following characteristics: 1) DID compatibility: the identity protocol interface does not provide DID itself, but relies on them to obtain decentralized, platform independent identifiers. Any DID method that the identity protocol interface can support so that the identity protocol interface can link to and authenticate different blockchain accounts, which allows the DID to be a universal, cross-chain, and platform-independent identifier for the user. 2) Stream-based storage (Stream): the identity protocol interface stores user or application data in a user-controlled data stream. The data in the data stream may be stored in the clear or encrypted. The data stream created by the identity protocol interface has all the characteristics of variability, durability, reproducibility and availability provided by the self-ownership identity platform network. 3) An identity center: whenever a user stores data in a new data stream through the identity protocol interface, their data stream ID will automatically register in their index, which keeps all the user's data associations in the same data store, which in turn enables any application to discover all the data about the user by simply querying the user's index. 4) Common semantic data description: all data stored through the identity protocol interface are semantically described and organized in a user index, allowing multiple applications to use the same data according to a data structure (Schema) and Metadata (Metadata); 5) cross-application data (Cross-application) portability: through the combination of DID, data flow, identity centric and semantic data descriptions, the identity protocol interface allows user data to be stored in an application-independent manner and can be used across different applications or interfaces, with no application maintaining "special permissions" because the user is in full control.
The present application implements an IPOA (Identity Protocol for Open Applications-Open application) interface that provides a decentralized Index (Index) that allows structured data to be associated with a blockchain platform Decentralized Identifier (DID). The data may be defined (Definition) and stored in a Record (Record). The identity protocol interface is a decentralized identity protocol and JavaScript SDK that provides an API that allows developers to easily build applications with user control flow to store data and discover and utilize user data created on third party applications. The identity protocol interface can be used for constructing an application program which allows a user to control the identity and data of the user in a mode independent of any single application program, and simultaneously allows developers to construct the application program with rich data without storing the user data on a central server.
Example two
Referring to fig. 1, an embodiment of the present invention provides a data docking method for an owner identity, which employs an owner identity system as described in the first embodiment, and the docking method includes the following steps:
s1: the data module creates DID controlled data stream;
s2: the definition module creates a corresponding definition ID according to the data stream and maps the definition ID to the index module, wherein the definition ID comprises a data structure corresponding to the data stream;
s3: the recording module stores the data stream specified by the definition module and forms a corresponding recording ID to be mapped to the index module;
s4: and the indexing module inquires or retrieves the data stream corresponding to the record ID according to the DID and the definition ID.
The identity protocol interface may be used for (but is not limited to) the following use cases:
1) authentication secret (Astra Auth): the Astra Auth uses the identity protocol interface to create a DID-controlled data stream that stores encrypted authentication secrets that allow authentication of the DID using various blockchain wallets. To accomplish this, Astra Auth creates a docking application or platform key string definition (Keychain definition).
2) Web2 social account link (Astra Self Identity): the Astra Self Identity creates a DID controlled data stream using the Identity protocol interface, which stores a list of Web2 accounts controlled by the same user that owns the DID, and a verifiable claim to prove this ownership. To accomplish this, Astra Self Identity creates the AKA (Also Known As) definition.
3) Web3 encrypted account link (aster Connect) aster Connect creates a DID controlled data stream using the identity protocol interface that stores a list of user account data stream IDs that publicly proves that the owner of this DID also owns various accounts on the Web 3/blockchain platform. To achieve this goal, AstraConnect creates a cryptographic account definition.
EXAMPLE III
Referring to fig. 1, an embodiment of the present invention provides an autonomous identity system, and on the basis of the first embodiment, an ecosystem for autonomous identity applications is provided, which is intended to solve the problems encountered in the prior art mentioned above:
1) the development difficulty is large: the development process of the application of the self-ownership identity can be greatly simplified through the identity protocol interface, namely, simple interface codes are provided, so that a developer can concentrate on developing the business process without needing to spend much time to know the working principle and the knowledge related to the block chain in the self-ownership identity. In addition, the interface provides richer functions for a mobile phone application developer, so that the developer can develop an application based on the self-ownership identity like a general mobile phone application and can submit the application to a special App store for downloading by other users;
2) personal user oriented applications: the self-ownership identity is an App platform ecosystem dominated by a developer, the developer can develop MONiD mobile phone applications like general iOS and Android applications, the MONiD mobile phone applications can be submitted to an iOS or Android application store, and a self-owned personal application store is provided, all personal applications can perform data interaction through a self-ownership identity port (on the premise that the consent of a data holder needs to be obtained), so that the self-ownership identity system can become a platform for sharing various self-ownership identity data among apps. The data keeper can obtain certain incentive from the platform and the party needing the data by sharing the data of the data keeper (certainly, the data keeper can completely choose not to share the information to achieve the purpose of protecting personal data, which is also a great characteristic of self-ownership identity). Just because the autonomy identity system is a technical architecture based on a public chain without permission, developers can submit various applications of autonomy identities without any threshold, and therefore application scenes of the autonomy identities are greatly enriched.
3) The operation threshold is high: an enterprise or individual developer joining the self-ownership identity system can realize a series of operations through a management interface of the system, wherein the operations comprise issuing verification, requesting verification, viewing records, requesting data sharing with other users and the like. The system does not require enterprises and developers to participate in the building and maintenance of the nodes of the blockchain, and therefore the system can provide a very understandable user experience even for users who are not experienced enough with the blockchain.
4) Data issuer (issuers) and verifier (verifier) resources are difficult to integrate: the user joining the system can set visible state, at the same time, it can search the data issuer and verifier meeting the condition in the platform and send cooperation request by means of the system platform, the other party can process the request by the operation interface after receiving the cooperation request, if the two parties agree to cooperate, the system can provide the key of data interaction between the two parties. As the scale of system platforms expands, it is anticipated that more and more qualified data providers and verifiers will join the platform and provide data services for a variety of different applications.
The above-mentioned embodiments are merely preferred embodiments for fully illustrating the present invention, and the scope of the present invention is not limited thereto. The equivalent substitution or change made by the technical personnel in the technical field on the basis of the invention is all within the protection scope of the invention. The protection scope of the invention is subject to the claims.

Claims (10)

1. An autonomous identity system, comprising: the system comprises an identity protocol interface, wherein the identity protocol interface comprises a data module, a definition module, a recording module and an index module;
the data module is used for creating a DID controlled data stream;
the definition module is used for creating a corresponding definition ID according to the data stream and mapping the definition ID to the index module, wherein the definition ID comprises a data structure corresponding to the data stream;
the recording module is used for storing the data stream specified by the definition module and forming a corresponding recording ID to be mapped into the index module;
the index module is used for inquiring or retrieving the data stream corresponding to the record ID according to the DID and the definition ID.
2. The system of claim 1, wherein: and storing the data of the data stream into a recording module by adopting plaintext storage or encryption.
3. The system of claim 1, wherein: when the data module creates a new data stream, the data stream is automatically registered in the index module through the definition module and the recording module.
4. The system of claim 1, wherein: the definition module creates a key string definition when the data module creates a DID-controlled data stream that stores encrypted authentication secrets that allow for the authentication of DID using various blockchain wallets.
5. The system of claim 1, wherein: when the data module creates a DID-controlled data stream that stores a list of Web2 accounts controlled by the same user that owns the DID, and a verifiable statement to prove this ownership, the definition module creates an AKA definition.
6. The system of claim 1, wherein: the definition module creates an encrypted account definition when the data module creates a DID-controlled data stream that stores a list of user account data stream IDs that publicly prove that the owner of this DID also owns various accounts on the Web3 or blockchain platform.
7. The system of claim 1, wherein: the data structure includes a URL identification.
8. The system of claim 1, wherein: the identity protocol interface is further configured to interface the blockchains using the same data according to the data structure and the metadata.
9. An autonomous identity system as claimed in any one of claims 1 to 8 wherein: the identity protocol interface supports DID linking to each blockchain account for identity verification.
10. A data docking method for self-ownership identity is characterized in that: using an autonomy identity system according to any one of claims 1 to 9, the docking method comprising the steps of:
s1: the data module creates DID controlled data stream;
s2: the definition module creates a corresponding definition ID according to the data stream and maps the definition ID to the index module, wherein the definition ID comprises a data structure corresponding to the data stream;
s3: the recording module stores the data stream specified by the definition module and forms a corresponding recording ID to be mapped to the index module;
s4: and the indexing module inquires or retrieves the data stream corresponding to the record ID according to the DID and the definition ID.
CN202110859169.2A 2021-07-28 2021-07-28 Self-ownership identity system and method Pending CN113553621A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110859169.2A CN113553621A (en) 2021-07-28 2021-07-28 Self-ownership identity system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110859169.2A CN113553621A (en) 2021-07-28 2021-07-28 Self-ownership identity system and method

Publications (1)

Publication Number Publication Date
CN113553621A true CN113553621A (en) 2021-10-26

Family

ID=78104775

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110859169.2A Pending CN113553621A (en) 2021-07-28 2021-07-28 Self-ownership identity system and method

Country Status (1)

Country Link
CN (1) CN113553621A (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9740538B1 (en) * 2013-08-27 2017-08-22 Ca, Inc. Mapping data-flows in a workflow
CN110889120A (en) * 2019-10-10 2020-03-17 深圳创链数据科技有限公司 System and method for big health data based on block chain technology
CN111178880A (en) * 2019-12-07 2020-05-19 江苏通付盾数字化技术有限公司 Secure data circulation method for zero trust and protecting data privacy
US20200250203A1 (en) * 2019-02-04 2020-08-06 Apex Data Solutions, Llc COMPUTING SYSTEM PROVIDING BLOCKCHAIN-FACILITATED SEMANTIC INTEROPERABILITY BETWEEN MULTIPLE DISPARATE SYSTEMS OF RECORD (SORs) AND RELATED METHODS
KR102173426B1 (en) * 2020-07-08 2020-11-03 주식회사 아이오트러스트 Privacy preserving public key infrastructure based self sign and verification system and method in decentralized identity
CN112368699A (en) * 2018-08-18 2021-02-12 甲骨文国际公司 Address management system
CN112613889A (en) * 2020-12-25 2021-04-06 上海万向区块链股份公司 Privacy protection method and system for enterprise DID identity system
CN112653553A (en) * 2020-12-29 2021-04-13 上海交通大学 Internet of things equipment identity management system
US20210182882A1 (en) * 2020-02-27 2021-06-17 Intercontinental Exchange Holdings, Inc. Integrated weather graphical user interface

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9740538B1 (en) * 2013-08-27 2017-08-22 Ca, Inc. Mapping data-flows in a workflow
CN112368699A (en) * 2018-08-18 2021-02-12 甲骨文国际公司 Address management system
US20200250203A1 (en) * 2019-02-04 2020-08-06 Apex Data Solutions, Llc COMPUTING SYSTEM PROVIDING BLOCKCHAIN-FACILITATED SEMANTIC INTEROPERABILITY BETWEEN MULTIPLE DISPARATE SYSTEMS OF RECORD (SORs) AND RELATED METHODS
CN110889120A (en) * 2019-10-10 2020-03-17 深圳创链数据科技有限公司 System and method for big health data based on block chain technology
CN111178880A (en) * 2019-12-07 2020-05-19 江苏通付盾数字化技术有限公司 Secure data circulation method for zero trust and protecting data privacy
US20210182882A1 (en) * 2020-02-27 2021-06-17 Intercontinental Exchange Holdings, Inc. Integrated weather graphical user interface
KR102173426B1 (en) * 2020-07-08 2020-11-03 주식회사 아이오트러스트 Privacy preserving public key infrastructure based self sign and verification system and method in decentralized identity
CN112613889A (en) * 2020-12-25 2021-04-06 上海万向区块链股份公司 Privacy protection method and system for enterprise DID identity system
CN112653553A (en) * 2020-12-29 2021-04-13 上海交通大学 Internet of things equipment identity management system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
FENNIE WANG 等: "Self-Sovereign Identity in a Globalized World: Credentials-Based Identity Systems as a Driver for Economic Inclusion", 《HYPOTHESIS AND THEORY》, pages 1 - 22 *
李美华: "分布式身份认证在保险业区块链中的应用", 《北方经济》, pages 108 - 110 *

Similar Documents

Publication Publication Date Title
CN109522735B (en) Data permission verification method and device based on intelligent contract
CN110060162B (en) Data authorization and query method and device based on block chain
CN110147994B (en) Instant execution method of block chain based on homomorphic encryption
US10790975B2 (en) Attestation management
CN110602050B (en) Authentication method and device for block chain access, storage medium and electronic device
US10841094B2 (en) Private and public media data in a decentralized system
CN113711536A (en) Extracting data from a blockchain network
US11176282B2 (en) Encrypting data associated with decentralized identifier
Ghani et al. Issues and challenges in cloud storage architecture: a survey
US20210271765A1 (en) Delegation using pairwise decentralized identifier
US11212263B2 (en) Dynamic generation of pseudonymous names
US20200394206A1 (en) Channeling data with decentralized identity stores
EP4026291B1 (en) Control of the delegated use of did-related data
US11394542B2 (en) Deauthorization of private key of decentralized identity
US11138341B2 (en) Quick actions for did attestation user interface elements
EP3942449B1 (en) Callback pattern for did attestations
Yildiz et al. A tutorial on the interoperability of self-sovereign identities
Peng et al. A blockchain‐based mobile crowdsensing scheme with enhanced privacy
CN115130075A (en) Digital signature method and device, electronic equipment and storage medium
Yildiz et al. Towards Interoperable Self-sovereign Identities
EP4018614B1 (en) Did delegation/revocation to another did
Chauhan Iot network identity management using smart contract and blockchain technology
US11522858B2 (en) Event based transfer of did delegated authority
CN117009988A (en) Encryption data storage and query method based on blockchain
CN113553621A (en) Self-ownership identity system and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination