SG10202000215RA - Methods and devices for providing decentralized identity verification - Google Patents

Methods and devices for providing decentralized identity verification

Info

Publication number
SG10202000215RA
SG10202000215RA SG10202000215RA SG10202000215RA SG10202000215RA SG 10202000215R A SG10202000215R A SG 10202000215RA SG 10202000215R A SG10202000215R A SG 10202000215RA SG 10202000215R A SG10202000215R A SG 10202000215RA SG 10202000215R A SG10202000215R A SG 10202000215RA
Authority
SG
Singapore
Prior art keywords
methods
devices
identity verification
decentralized identity
providing decentralized
Prior art date
Application number
SG10202000215RA
Inventor
Yuan Yuan
Shengjiao Cao
Renhui Yang
Hui Fang
Jiawei Liu
Weitao Yang
Original Assignee
Alipay Labs Singapore Pte Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alipay Labs Singapore Pte Ltd filed Critical Alipay Labs Singapore Pte Ltd
Priority to SG10202000215RA priority Critical patent/SG10202000215RA/en
Publication of SG10202000215RA publication Critical patent/SG10202000215RA/en
Priority to CN202080085675.4A priority patent/CN114846765B/en
Priority to PCT/CN2020/142499 priority patent/WO2021139605A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • G06F21/645Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/102Entity profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3218Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • Storage Device Security (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
SG10202000215RA 2020-01-09 2020-01-09 Methods and devices for providing decentralized identity verification SG10202000215RA (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
SG10202000215RA SG10202000215RA (en) 2020-01-09 2020-01-09 Methods and devices for providing decentralized identity verification
CN202080085675.4A CN114846765B (en) 2020-01-09 2020-12-31 Method and apparatus for providing decentralised identity verification
PCT/CN2020/142499 WO2021139605A1 (en) 2020-01-09 2020-12-31 Methods and devices for providing decentralized identity verification

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
SG10202000215RA SG10202000215RA (en) 2020-01-09 2020-01-09 Methods and devices for providing decentralized identity verification

Publications (1)

Publication Number Publication Date
SG10202000215RA true SG10202000215RA (en) 2020-07-29

Family

ID=72355649

Family Applications (1)

Application Number Title Priority Date Filing Date
SG10202000215RA SG10202000215RA (en) 2020-01-09 2020-01-09 Methods and devices for providing decentralized identity verification

Country Status (3)

Country Link
CN (1) CN114846765B (en)
SG (1) SG10202000215RA (en)
WO (1) WO2021139605A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115664861B (en) * 2022-12-27 2023-02-28 中国信息通信研究院 Identity information verification method and device based on block chain, equipment and medium

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107958371A (en) * 2017-11-13 2018-04-24 深圳超级区块链信息技术有限公司 A kind of distributed block chain identity card
US11552795B2 (en) * 2018-01-22 2023-01-10 Microsoft Technology Licensing, Llc Key recovery
EP3550792A1 (en) * 2018-04-05 2019-10-09 Banco Bilbao Vizcaya Argentaria, S.A. Method for validating a node
CN108833114A (en) * 2018-06-13 2018-11-16 上海交通大学 A kind of decentralization identity authorization system and method based on block chain
CN110224837B (en) * 2019-06-06 2021-11-19 西安纸贵互联网科技有限公司 Zero-knowledge proof method and terminal based on distributed identity

Also Published As

Publication number Publication date
CN114846765A (en) 2022-08-02
CN114846765B (en) 2024-01-09
WO2021139605A1 (en) 2021-07-15

Similar Documents

Publication Publication Date Title
SG11202100832TA (en) Method and device for identity verification
SG11202006026XA (en) Identity verification method and apparatus
ZA202001439B (en) Document verification and identity verification method and device
EP3723399A4 (en) Identity verification method and apparatus
SG11202005964QA (en) Identity verification methods, systems, apparatuses, and devices
ZA201807220B (en) Method and device for registering biometric identity and authenticating biometric identity
PL3547604T3 (en) Method and apparatus for security question generation and identity verification
ZA201902943B (en) Identity authentication method, device and system
SG11201807605UA (en) Identity authentication method and system
SG11202006204TA (en) Identity verification method and device and electronic device
PL3468134T3 (en) Method and device for identity authentication
SG10202003972PA (en) Identity validation system and method
EP3995976C0 (en) Identity authentication system
IL285819A (en) Identity verifying device and methods
GB2594392B (en) A system for generation and verification of identity and a method thereof
EP3879753A4 (en) Identity verification method and device
EP3547605A4 (en) Identity verification method and apparatus
SG10202000215RA (en) Methods and devices for providing decentralized identity verification
EP3879418A4 (en) Identity verification method and device
GB2610241B (en) Identity Verification Method and System
SG10202007376VA (en) Methods and devices for providing decentralized identity verification
GB201706650D0 (en) System and method for authenticating a non-transferrable access token
EP3467693A4 (en) Identity verification method and apparatus
SG11202101281SA (en) Identity authentication system and methods
GB201915258D0 (en) Baggage-based user identity verification system and method