WO2020038366A1 - 一种信任系统及其构建方法、设备及存储介质 - Google Patents

一种信任系统及其构建方法、设备及存储介质 Download PDF

Info

Publication number
WO2020038366A1
WO2020038366A1 PCT/CN2019/101603 CN2019101603W WO2020038366A1 WO 2020038366 A1 WO2020038366 A1 WO 2020038366A1 CN 2019101603 W CN2019101603 W CN 2019101603W WO 2020038366 A1 WO2020038366 A1 WO 2020038366A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
application
information
identity
account
Prior art date
Application number
PCT/CN2019/101603
Other languages
English (en)
French (fr)
Inventor
马登极
王志文
吴思进
Original Assignee
杭州复杂美科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 杭州复杂美科技有限公司 filed Critical 杭州复杂美科技有限公司
Publication of WO2020038366A1 publication Critical patent/WO2020038366A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Definitions

  • the present invention relates to the field of blockchain technology, and in particular, to a trust system, a method for constructing the same, a device, and a storage medium.
  • Chinese invention patent application Publication number: CN107196966A; Publication date: 2017.09.22;
  • the patent discloses a multi-party trusted identity authentication method and system based on the blockchain, which belongs to the field of Internet identity authentication.
  • the technical problem to be solved is how to implement based on the blockchain
  • the user authenticates to multiple application systems, and securely stores user information through the blockchain during the authentication process and verifies the user's identity truly and completely; the method is that the application system generates user attribute card information according to the received registration request, and The user attribute card information is encrypted and released to the blockchain.
  • the application system has multiple parties.
  • the encrypted user attribute card information corresponding to each application system is stored in the blockchain; each application system uses the blockchain to verify the user's identity.
  • Its structure includes a blockchain network, a client authentication module configured on the client, and an application server authentication module configured and applied to the system.
  • the invention realizes that the real-name information of the user is stored in the blockchain securely and reliably, and the user identity verification is performed through the blockchain truly and completely.
  • the user's identity authentication information in this patent is known by multiple application systems, resulting in a greater risk of leakage of user privacy information, which is not conducive to the protection of user privacy information.
  • the application systems of all parties still bear the responsibility of trust, but they are not given. A clear commitment makes it difficult to characterize and hold accountability when things go wrong.
  • the present invention provides a trust system and a method for constructing the same, a device, and a storage medium. It extracts the trust layer and relies on the decentralized and immutable features of blockchain data storage to provide trust services. Applications are only responsible for operating services and can provide a multi-angle portrait of trust for the application's operating platform.
  • the technical solution provided by the present invention is:
  • a trust system includes an identity registration module for user identity registration, generating public and private keys on the blockchain, and generating multiple account IDs; an identity verification module that verifies information by signing the account ID and private key Verify whether this account ID belongs to the user and whether it is used; the identity storage submodule stores the user's behavior information on the application.
  • it further includes an identity management module for providing dynamic authorization management on the information of the identity storage sub-module.
  • the identity storage sub-module includes identity storage sub-modules of multiple applications, and each application is configured with an application chain to connect with the identity storage sub-module of the trust system.
  • the identity authorization module provides access rights to the identity storage submodule.
  • the application sets the service level and trust level of the user according to the completeness degree provided by the user's identity information.
  • the trust of the user's trust level originates from other users of the application or third-party authoritative business organizations.
  • the application chain issues its own token to incentivize users or third-party authoritative business organizations.
  • a method for constructing a trust system comprising the following steps:
  • the user generates public and private keys through the blockchain
  • the user's public key and user identity information are stored in the blockchain
  • the blockchain generates multiple different account IDs for the same user
  • the blockchain stores user activity information on the application.
  • the registration in S4 includes the following steps:
  • the user sends a verification transaction to the blockchain, selects an account ID and private key signature information to send to the blockchain;
  • the blockchain node verifies the account ID and user signature information. If the verification is passed, it proves that the account ID belongs to the user and is not used, and continues to be registered and used on the application. If the verification fails, the account ID is not The user owns or the account ID has been used and cannot be registered for use on the app;
  • the user authorizes other applications to access the user's behavior and activity information on the application; preferably, the user authorizes other parties to write the user's evaluation information on the application; preferably, each application is configured with one
  • the application chain is connected to the trust system; preferably, the application sets the service level and trust level of the user according to the completeness of the user's identity information; preferably, the trust of the user's trust level originates from other users of the application or third parties Authoritative business organizations; Preferably, the application chain issues its own tokens to incentivize users or third-party authoritative business organizations.
  • a device includes a processor, an input device, an output device, and a memory, and the processor, the input device, the output device, and the memory are interconnected.
  • the memory is used to store a computer program, and the computer program includes program instructions.
  • the processor is configured to call the program instructions to perform the method according to any one of claims 8-10.
  • a computer-readable storage medium wherein the computer storage medium stores a computer program, the computer program includes program instructions, and the program instructions, when executed by a processor, cause the processor to execute any one of claims 8-10 One said method.
  • the blockchain platform of the present invention can not be modified through information records, can be traced back, and is distributed and distributed to build a trust foundation;
  • the user when applying for a service or registration service from a commercial platform, the user only needs to provide his account ID on the blockchain platform, and does not need to provide identification information. Users can sign the provided account ID and send a transaction to the blockchain platform to verify the account ID with the commercial platform. In this way, the commercial platform cannot obtain the user's real identity information, which protects the user's privacy information;
  • the commercial platform in the present invention is only responsible for operation.
  • the historical precipitation data of the blockchain platform can be used directly, reducing the time for credit accumulation;
  • the present invention maintains multi-account information of a trusted user.
  • Commercial applications can only obtain account information without the need for identity card sensitive information, shielding user privacy, and verifying that the account belongs to the user using his own signature;
  • the present invention is based on the blockchain technology, and proposes a design of a third-party trust system that extracts trust from the commercial operation system and operates independently; builds a trust ecosystem based on the blockchain trust system and serves various applications . Not only does the application save the construction of trust responsibilities, but also reduces the time for emerging applications to build trust data;
  • the present invention separates the responsibility of trust as a trusted third party and provides trust services.
  • the application platform is only responsible for operating services, and the responsibility is clear.
  • the trust platform will integrate the trust of the entire society on one platform, which can provide the operation platform Multi angle portrait of trust.
  • FIG. 1 is a schematic diagram of a user's multiple account IDs corresponding to multiple applications
  • Embodiment 1 is a schematic diagram of Embodiment 1;
  • Embodiment 2 is a schematic diagram of Embodiment 2;
  • Embodiment 4 is a schematic diagram of Embodiment 3.
  • FIG. 5 is a schematic diagram of an implementation manner of Embodiment 4.
  • FIG. 6 is a schematic diagram of a second implementation manner of Embodiment 4.
  • FIG. 7 is a schematic diagram of a third implementation manner of Embodiment 4.
  • Embodiment 8 is a schematic diagram of one of the implementation manners of Embodiment 8.
  • Embodiment 9 is a schematic diagram of a second implementation manner of Embodiment 8.
  • Embodiment 10 is a schematic diagram of Embodiment 9;
  • Embodiment 10 is a schematic diagram of Embodiment 10.
  • FIG. 12 is a schematic diagram of Embodiment 13.
  • a trust system includes an identity registration module for user identity registration, generating public and private keys on the blockchain, and generating multiple account IDs; an identity verification module that passes accounts ID and private key signature verification information verify whether this account ID belongs to the user and whether it is used; the identity storage submodule stores the user's behavioral activity information on the application.
  • the application interfaces with the trust system of the present invention.
  • the user uses the account ID generated by the trust system to register with the application.
  • the identity verification module first verifies whether the account ID belongs to the user and whether the account ID belongs to the user through the user's account ID and private key signature verification information. Registered and used by other applications. If the account ID belongs to the user and is not registered and used by other applications, then the account ID will be registered and used on the application. At the same time, an identity storage submodule will be assigned to the application in the trust system to store the user's Behavioral activity information on the app.
  • the blockchain-based trust system maintains the account ID and account information of a trusted user.
  • the application can only get the account ID account information of the corresponding user, without the need for sensitive information of the ID card, which shields the user's privacy, and the user uses his own signature to verify that the account belongs to him.
  • Different sub-modules are distinguished according to different applications, supporting dynamic expansion and supporting authentication access.
  • his real identity information such as mobile phone number, email address, name, driver's license information, and home address
  • the identity registration module also provides users with a unique area.
  • Blockchain account identity private ID and multiple account IDs Users use the account ID to register and use in different applications, and verify whether the account ID belongs to the user or is used by the identity verification module. If not, you can register on the application. Use to assign an identity storage submodule to the application to store user behavior information on the application.
  • Users include individuals, companies, institutions, and organizations; user information, for individuals, includes but is not limited to personal photos, birth certificates, ID numbers, email addresses, mobile phone numbers, login accounts for a website, QQ numbers, Data such as contact address; user information, for enterprises, institutions or group organizations, including but not limited to social unified credit code, organization code, business content, external mailbox, office phone and other data.
  • a network application can send a verification transaction to the blockchain, and send this account ID to the blockchain with its private key signature.
  • the blockchain node will The user's signature information is verified, and the account ID can be proved to belong to this user. No, it means that this account ID is not owned by this user.
  • the account ID can be trusted by the user. In this way, users do not need to provide sensitive information such as personal ID cards to network applications.
  • An individual user randomly generates a private key based on the blockchain and obtains the corresponding public key at the same time; the blockchain company can also generate a unique private key based on the user's ID card, so that when the user's private key is lost, the user can send the The chain operator retrieves it.
  • Blockchains such as private chains and alliance chains are permission chains. Each node participating in the blockchain system is licensed, and unauthorized nodes cannot access the system. However, if a limited number of authentication nodes in the permission chain are combined, it will also pose a certain threat to the leakage of the user's identity information. Therefore, if the blockchain is a permission chain, the user's public key and user identity information are hashed, and then Upload to the blockchain; if the blockchain is a public chain, user identity information can be selectively hashed.
  • a trust system As shown in FIG. 3, a trust system, this embodiment is further improved on the basis of Embodiment 1, and includes an identity registration module for user identity registration, generating a public key and a private key on a blockchain, and generating Multiple account IDs; an identity verification module that verifies whether the account ID belongs to the user and whether it is used by the account ID and private key signature verification information; the identity storage submodule stores user behavior information on the application. Further, it further includes an identity management module for providing dynamic authorization management on the information of the identity storage sub-module.
  • the identity information of the identity storage sub-module is exposed by default.
  • whether to allow other parties (other than users) to write information on the identity storage sub-module corresponding to the application such as business reviews Information, etc .; allowing users to control their identity information in the application.
  • Other parties can judge whether the user is credible based on the public information, so as to transfer the responsibility of trust from the application.
  • the user's identity information is encrypted by Hash and stored on the blockchain.
  • the multiple account IDs correspond to the user's identity information, which effectively isolates the user's identity.
  • Information to protect the user ’s privacy and prevent the risk of being leaked; user behavior information on the application, such as business behavior information, evaluations from other users, etc. are also stored on the blockchain, but this part of the information, the user Can authorize operators and users of other applications to access and view permissions, and authorize other users on this application to evaluate, access, and view permissions.
  • a trust system As shown in FIG. 4, a trust system.
  • This embodiment is further improved on the basis of Embodiments 1 and 2. It includes an identity registration module for user identity registration, and generates public and private keys on the blockchain. To generate multiple account IDs; the identity verification module verifies whether the account ID belongs to the user and whether it is used by the account ID and the private key signature verification information; the identity storage submodule stores the user's behavioral activity information on the application. Further, it further includes an identity management module for providing dynamic authorization management on the information of the identity storage sub-module.
  • the identity storage sub-module includes multiple applications' identity storage sub-modules, and each application is configured with an application chain to connect with the identity storage sub-module of the trust system.
  • the trust system of this embodiment supports querying and authorization of information records of different applications.
  • Each of these different applications is configured with an application chain, and information of different chains can be opened to the application by the user through the identity authorization module.
  • Information between users cannot be shared directly, but it can be shared with the application through user authorization, so that the application can not only obtain user information in this business, but also user information of other applications, and the user portrait is richer.
  • a trust system As shown in Figures 5, 6, and 7, a trust system.
  • This embodiment is further improved on the basis of Embodiments 1, 2, and 3, and includes an identity registration module for user identity registration on the blockchain. Generate public and private keys, generate multiple account IDs; identity verification module, verify whether the account ID belongs to the user and whether it is used by the account ID and private key signature verification information; identity storage submodule, which stores users on the application Behavioral activity information. Further, it further includes an identity authorization module, which provides access rights to the identity storage submodule.
  • the authorization method can be that the user sends a time-limited password to allow access to the user data in the identity storage submodule.
  • the trust system provides a variety of different applications. These applications are not necessarily built on the blockchain. They can be software applications developed by the operator or block-based applications, but each application is related to the block.
  • the chain has a connection interface, and there is a certain trust foundation for the blockchain, so that when users register on the corresponding application, it is convenient to obtain the account ID representing the user's private information, thereby isolating the user's private information from the application.
  • Information between applications cannot be shared directly, but users can authorize sharing to applications through the identity authorization module, so that applications can not only get user information in this business, but also user information in other applications, and user portraits are richer.
  • the application platform When the application user uses the application platform to provide application services, the application platform will provide trusted data provided by the identity storage submodule in the blockchain trust system for the user's reference.
  • the identity authorization module for example, only Whether the authorization can disclose all the information of an identity storage sub-module or not at all, and cannot selectively disclose the good and the bad ones, or set a reminder module in the trust system, and the third-party user can be notified through the reminder module.
  • the percentage of users' public information is determined by third-party users.
  • a taxi platform some owners have a lot of bad reviews, or some driving habits reviews, or other applications of this owner such as driving school scores, or other business credit, users can use it as a reference, especially for women, to avoid when it is late Poor owners of bad reviews.
  • the commercial platform is only responsible for operations.
  • the historical precipitation data of the trust system can be used directly, which reduces the time of credit accumulation; for example, a new ride-hailing or sharing economy application can be used directly.
  • Credit system registered users' credit data accumulated over the years to give users a portrait, without the need to accumulate data from 0 on the new application platform, eliminating the construction of trust responsibility and reducing the time for emerging applications to build trust data .
  • a trust system is further improved on the basis of Embodiments 1, 2, 3, and 4 and includes an identity registration module for user identity registration, generating a public key and a private key on a blockchain, and generating Multiple account IDs; an identity verification module that verifies whether the account ID belongs to the user and whether it is used by the account ID and private key signature verification information; the identity storage submodule stores user behavior information on the application. Further, the application sets the service level and the trust level of the user according to the completeness degree provided by the user's identity information.
  • a trust system This embodiment is further improved on the basis of Embodiments 1, 2, 3, 4, and 5.
  • the embodiment includes an identity registration module for user identity registration, and generates public and private keys on the blockchain.
  • the identity verification module verifies whether the account ID belongs to the user and whether it is used by the account ID and the private key signature verification information; the identity storage submodule stores the user's behavioral activity information on the application. Further, the trust of the user's trust level originates from other users of the application or third-party authoritative business organizations.
  • a trust system is further improved on the basis of embodiments 1, 2, 3, 4, 5, 6, and includes an identity registration module for user identity registration, generating a public key on the blockchain and The private key generates multiple account IDs; the identity verification module verifies whether the account ID belongs to the user and whether it is used by the account ID and the private key signature verification information; the identity storage submodule stores the user's behavior activities on the application . Further, the application chain issues its own token to incentivize users or third-party authoritative business organizations.
  • a method for constructing a trust system includes the following steps:
  • the user generates public and private keys through the blockchain
  • the user's public key and user identity information are stored in the blockchain
  • the user's identity information needs to be saved to the blockchain after being signed and authenticated by a third-party certification body.
  • third-party certification bodies for different types of identity information.
  • ID information needs government public security bureau certification
  • academic information needs university certification
  • banks Card asset information may require bank authentication
  • vehicle information is authenticated by vehicle management, and is stored on the blockchain according to classification. Since it is only signature information, it is a string of numbers.
  • This certificate signature information includes the certification authority and the block of the authenticated user.
  • the chain account ID and the encrypted signature information of the real information can be verified by the third-party certification agency's website without revealing specific information, such as ID number, face information, etc., and also prove the authenticity of the identity information It can hide the user's private information and protect the user's privacy, so that the user's private information cannot be stolen or abused. At the same time, it is also possible to obtain real information through a third-party certification body with user consent.
  • the user's public key and user identity information can also be stored in the private database of the blockchain operator. As shown in Figure 9, user information is more centralized, rather than open and diffuse, and does not require authentication for every business application.
  • the blockchain generates multiple different account IDs for the same user
  • a user has only one account ID, then by tracing the transaction or activity behavior of the account ID on the blockchain, the risk of attacking the user's account ID will be increased, which will easily lead to the theft of user privacy information;
  • a user has multiple account IDs and cannot trace the user ’s behavior, which in turn plays a role in protecting the user ’s private information, making it impossible for an attacker to identify the user through the behavior of a certain account ID.
  • the number of account IDs can be set to be randomly generated by the blockchain, or it can be set to be generated by the user's request, and the account ID can be generated by hashing the user's public key different times to generate multiple different Account ID.
  • the user does not need to provide sensitive information such as user ID to the application.
  • the account ID represents the user ’s private information has been backed up and authenticated by the blockchain.
  • the user ’s private information is stored on the blockchain.
  • the blockchain provides the user ’s private information.
  • the backup and authenticated account ID is registered on the application.
  • These applications are not necessarily built on the blockchain. They can be software applications independently developed by the operator, or they can be applications based on block construction.
  • the blockchain has a connection interface, and there is a certain basis of trust in the blockchain, so that when users register on the corresponding application, it is convenient to obtain the account ID representing the user's private information, thereby isolating the user's private information from the application.
  • the operator of an application only knows an account ID of the user, and determines that the account ID has been backed up and authenticated by the blockchain. It can be used for its own business use, but cannot obtain the user's private information, so it cannot be Using the user's private information in other places cannot reveal the user's private information, which solves the problem of privacy leakage when users use different applications.
  • the blockchain stores user activity information on the application.
  • User behavior information on different applications is stored on the u blockchain as part of the user's trust portrait.
  • the registration in S4 includes the following steps:
  • the user sends a verification transaction to the blockchain, selects an account ID and private key signature information to send to the blockchain;
  • the blockchain node verifies the account ID and user signature information. If the verification is passed, it proves that the account ID belongs to the user and is not used, and continues to be registered and used on the application. If the verification fails, the account ID is not The user owns or the account ID has been used and cannot be registered for use on the app;
  • a method for constructing a trust system which is further improved on the basis of Embodiments 8 and 9.
  • the user authorizes other applications to access the user's behavior and activity information on the application; preferably, the user authorizes other parties to write on the application Access to the user ’s evaluation information; preferably, each application is configured with an application chain to connect with the trust system; preferably, the application sets the user's service level and trust level based on the completeness of the user's identity information; preferably Specifically, the trust of the user's trust level originates from other users of the application or third-party authoritative business organizations; preferably, the application chain issues its own token to motivate users or third-party authoritative business organizations.
  • the user authorizes other applications to access the user's behavioral activity information on the application, that is, for example, if the user has registered and used in the four applications A, B, C, and D based on the trust system of the present invention, the user can authorize B, Operators of the three applications C and D or other users have access to and view the user's behavior and activity information on the application A.
  • the user authorizes other parties to write the user's evaluation information on the application, that is, the user's behavior activity information on the A application can authorize other users to evaluate, access, and view their own behavior activity information.
  • Each application is configured with an application chain, which is connected to the identity storage sub-module of the trust system, and is used to store user behavior information, such as business behavior information, evaluations from other users, etc.
  • user behavior information such as business behavior information, evaluations from other users, etc.
  • the application sets the service level and trust level of the user according to the completeness of the user's identity information. That is, each application can see which user information the user provides through the user's account ID, but cannot know the specific content. Determines the richness or completeness of user information, which is used to set the user's service level and trust level.
  • the trust of the user's trust level comes from other users of the application or third-party authoritative business organizations; that is, the user's trust level is related to other users' evaluation of themselves and also to third-party authoritative business organizations, such as the scores of vehicle management agencies aspect.
  • Application chains issue their own tokens to incentivize users or third-party authoritative business organizations. Encourage multiple parties to actively participate in the use of the application and build a user base to facilitate operating profitability.
  • a device includes a processor, an input device, an output device, and a memory, and the processor, the input device, the output device, and the memory are connected to each other.
  • the memory is used to store a computer program.
  • the computer program includes program instructions, and the processor is configured to call the program instructions to execute the method according to any one of technical solutions of Embodiments 8-10.
  • a computer-readable storage medium stores a computer program, where the computer program includes program instructions, and when the program instructions are executed by a processor, cause the processor to perform any of the operations described in Embodiments 8-10.
  • a method described in a technical solution is described in a technical solution.
  • a trust system in this embodiment includes the following functional modules, identity registration module, identity verification module, identity authorization module, identity management module, and identity storage sub-module.
  • the identity storage sub-module can be expanded as needed to meet and differentiate different application needs.
  • Identity registration module Provides user identity registration function, providing unique blockchain account identity private ID and multiple account IDs.
  • the identity verification module is that the user provides his own public ID and provides his own signature verification information to verify that the public ID belongs to the user or the user himself through the identity verification module.
  • Identity authorization module Provides authorization to access the identity storage sub-module. This authorization must be authorized by the user himself.
  • the authorization method can be that the user sends a time-limited password to allow access to the user data in the storage submodule.
  • Identity management module implement a smart contract to provide dynamic authorization management for user storage submodule information. For example, the identity information of the sub-module is exposed by default, allowing other parties to write information to the user, such as business review information.
  • Identity storage sub-module which distinguishes different sub-modules according to different applications, supports dynamic expansion, and supports authentication access.
  • the blockchain platform collects information through multi-dimensional collection of information records, which cannot be modified, can be traced back, distributed deployment features, and trusted certification agencies provide trusted data to build a trust foundation.
  • the blockchain platform provides a variety of different applications. Information between applications cannot be shared directly, but can be shared with the application through user authorization. In this way, the application can not only obtain user information in this business, but also users of other applications. Information, user portraits are more abundant, but applications generally do not get real identity information that belongs to the privacy of authorized users, and can only obtain as rich user portraits as possible through different identity submodules, which not only protects user privacy, but also opens user information. This was not possible before the emergence of trust platforms.
  • the blockchain platform provides different application accounts for a user for different applications, such as car owner applications and Taobao shop applications. Users need to register with their real identity, such as their ID cards, to obtain the required application account ID. Just go to the account ID of the corresponding user provided by the blockchain platform, and no information such as identity card is required.
  • users When applying for services or registering services with a commercial platform, users only need to provide their account ID on the blockchain platform, and do not need to provide ID information. Users can sign the provided account ID and send a transaction to the blockchain platform to verify the account ID with the commercial platform. In this way, the commercial platform cannot obtain the user's real identity information, which protects the user's privacy information.
  • the commercial platform can apply to the blockchain platform for authorization to obtain portrait information of other applications based on the user's own account provided by the user. Users can also set which application information is open to the public.
  • the commercial platform When the application user uses the commercial platform to provide the application, the commercial platform will provide the trusted data provided by the blockchain trust platform for the user's reference.
  • the user authorizes for example, he can only authorize whether he can disclose all the information of a submodule or not Public, can not be selective public good and bad close, or the platform can inform the third party user of the percentage of this user's public information, the third party user will determine.
  • a taxi platform some owners have a lot of bad reviews, or some driving habits reviews, or other applications of this owner such as driving school scores, or other business credit, users can use it as a reference, especially for women, to avoid when it is late Poor owners of bad reviews.
  • This embodiment is based on a third-party trust system of a blockchain.
  • the system supports query and authorization of information records of different applications. These different applications can be called application chains, and information of different chains can be opened to applications by users' authorization.
  • the blockchain trust system maintains multi-account information of a trusted user.
  • Commercial applications can only get account information, without the need for sensitive ID information. It shields user privacy. Users use their own signatures to verify that the account belongs to them.
  • the present invention proposes a design of a third-party trust system, which extracts trust from the commercial operation system and operates independently; it builds a trust ecosystem based on the blockchain trust system and serves various applications. Not only does the application eliminate the need to build trust, it also reduces the time it takes for emerging applications to build trust data.

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Theoretical Computer Science (AREA)
  • Finance (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Strategic Management (AREA)
  • Economics (AREA)
  • Technology Law (AREA)
  • Marketing (AREA)
  • Development Economics (AREA)
  • Databases & Information Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

本发明公开了一种信任系统及其构建方法、设备及存储介质,属于区块链技术领域。系统包括身份注册模块,用于用户的身份注册,在区块链上产生公钥和私钥,产生多个账户ID;身份校验模块,通过账户ID和私钥签名校验信息校验此账户ID是否属于用户以及是否使用;身份存储子模块,存储用户在应用上的行为活动信息;还包括对应的构建方法、设备及存储介质。它把信任这一层抽取出来,依靠区块链数据存储去中心化、不可篡改的特性,可以提供信任服务,应用只负责运营服务,可以为应用的运营平台提供多角度的信任画像。

Description

一种信任系统及其构建方法、设备及存储介质 技术领域
本发明涉及区块链技术领域,尤其涉及一种信任系统及其构建方法、设备及存储介质。
背景技术
当前互联网时代,共享经济应用层出不穷,打车软件,淘宝小卖家,百度搜索商业平台等;这些应用平台不但承担了运营的责任,同时也隐形的承担了信任的责任。拿打车软件平台顺风车为例,平台其实提供了一个中介的服务,便捷的撮合车主和打车方,但是打车方之所以信任车主,也是基于对打车平台的信任,相信打车平台对车主做了一定的审核和准入,设想在路上随便一辆车停下来说愿意带你去你的目的地,你会信任他吗?显然不会。但是通过打车平台约的车,你就愿意,这就是一种信任。但是这个信任很多时候应用平台并没有承诺的,或者说是隐形的;平台更多提供了运营的责任,并没有很到位的承担信任的责任。在出了事情的时候,对于信任的责任很难去定性和追究。
中国发明专利申请。公开号:CN107196966A;公开日:2017.09.22;该专利公开了一种基于区块链的多方信任的身份认证方法和系统,属于互联网身份认证领域,要解决的技术问题为如何基于区块链实现用户面向多个应用系统的身份认证、且在身份认证过程中通过区块链安全存储用户信息并真实完整的验证用户身份的;其方法为应用系统根据接收的注册请求生成用户属性卡信息,对用户属性卡信息加密后发布至区块链,应用系统共多方,每方应用系统对应的加密的用户属性卡信息均存储于区块链;每方应用系统借助区块链验证用户身份。其结构包括区块链网络、配置于客户端的客户端认证模块以及配置与应用系统的应用服务器认证模块。该发明实现了将用户的实名信息安全可靠的存储于区块链,并通过区块链真实完整的进行用户身份验证。该专利中用户的身份认证信息被多个应用系统获知,致使用户隐私信息泄露风险较大,不利于用户隐私信息的保护,各方应用系统无形中仍然承担着信任的责任,但并没有给出明确的承诺,在出事情的时候致使信任的责任难以定性和追究。
发明内容
1.发明要解决的技术问题
为了克服以上技术问题,本发明提供了一种信任系统及其构建方法、设备及存储介质。它把信任这一层抽取出来,依靠区块链数据存储去中心化、不可篡改的特性,可以提供信任服务,应用只负责运营服务,可以为应用的运营平台提供多角度的信任画像。
2.技术方案
为解决上述问题,本发明提供的技术方案为:
一种信任系统,包括身份注册模块,用于用户的身份注册,在区块链上产生公钥和私钥,产生多个账户ID;身份校验模块,通过账户ID和私钥签名校验信息校验此账户ID是否属于用户以及是否使用;身份存储子模块,存储用户在应用上的行为活动信息。
优选地,还包括身份管理模块,用于对身份存储子模块的信息提供动态的授权管理。
优选地,身份存储子模块包括多个应用的身份存储子模块,每个应用均配置一条应用链,与信任系统的身份存储子模块连接。
优选地,身份授权模块,提供对身份存储子模块访问的权限。
优选地,应用根据用户的身份信息提供的完整程度来设定用户的服务等级和信任等级。
优选地,用户的信任等级的信任来源于应用的其他用户或第三方权威商业机构。
优选地,应用链发行自己的通证来激励用户或第三方权威商业机构。
一种信任系统的构建方法,根据以上任一项所述的一种信任系统,包括以下步骤:
S1、用户通过区块链产生公钥和私钥;
S2、用户的公钥和用户身份信息保存在区块链中;
S3、区块链对同一用户产生多个不同的账户ID;
S4、用户通过账户ID在应用上进行注册使用;
S5、区块链存储用户在应用上的行为活动信息。
优选地,S4中的注册包括以下步骤:
S401、用户向区块链发送一笔验证交易,选择一个账户ID和私钥签名信息发送给区块链;
S402、区块链节点会对账户ID和用户签名信息进行验证,验证通过,证明此账户ID属于该用户,且未被使用,在应用上继续注册使用;验证不通过,证明该账户ID不是该用户所有或该账户ID已被使用,不能在应用上注册使用;
S403、验证通过,并注册成功后,区块链记录该账户ID状态为已经被使用。
优选地,S5之后,用户授权其他应用访问用户在应用上的行为活动信息的权限;优选地,用户授权其他方在应用上写入用户的评价信息的权限;优选地,每个应用均配置一条应用链,与信任系统连接;优选地,应用根据用户的身份信息提供的完整程度来设定用户的服务等级和信任等级;优选地,用户的信任等级的信任来源于应用的其他用户或第三方权威商业机构;优选地,应用链发行自己的通证来激励用户或第三方权威商业机构。
一种设备,包括处理器、输入设备、输出设备和存储器,所述处理器、输入设备、输出设备和存储器互相连接,其中,所述存储器用于存储计算机程序,所述计算机程序包括程序指令,所述处理器被配置用于调用所述程序指令,执行如权利要求8-10任一项所述方法。
一种计算机可读存储介质,所述计算机存储介质存储有计算机程序,所述计算机程序包 括程序指令,所述程序指令当被处理器执行时,使所述处理器执行如权利要求8-10任一项所述方法。
3.有益效果
采用本发明提供的技术方案,与现有技术相比,具有如下有益效果:
(1)本发明的区块链平台通过信息记录不可删改,可以追溯,分布式部署特点,构筑信任基础;
(2)本发明中用户在向商业平台申请服务或注册服务时候,只需提供自己在区块链平台的账户ID即可,不需要提供身份证信息。用户可以对提供的账户ID签名,向区块链平台发一笔交易来向商业平台验证账户ID为其本人。这样商业平台拿不到用户的真实身份证信息,这样对用户隐私信息有所保护;
(3)本发明中的商业平台只负责运营,对一些新兴的商业平台,可以直接使用区块链平台的历史沉淀数据,减少了信用累积的时间;
(4)本发明维护一个可信用户的多账户信息,商业应用只能拿到账户信息,而不需要身份证敏感信息,屏蔽用户隐私,用户使用自己签名验证账户属于自己;
(5)本发明基于区块链技术,提出了一种第三方信任系统的设计,把信任从商业运营系统抽离出来独立运营;基于区块链信任系统构建信任生态圈,为各种应用服务。不但应用省去了信任责任的构建,也减少了新兴应用构建信任数据的时间;
(6)本发明把信任的责任独立出来作为一个信任第三方,提供信任服务,应用平台只负责运营服务,责任清晰,同时信任平台将整合整个社会的信任在一个平台上,可以为运营平台提供多角度的信任画像。
附图说明
图1为用户多个账户ID对应多个应用的示意图;
图2为实施例1的示意图;
图3为实施例2的示意图;
图4为实施例3的示意图;
图5为实施例4的实现方式之一的示意图;
图6为实施例4的实现方式之二的示意图;
图7为实施例4的实现方式之三的示意图;
图8为实施例8的实现方式之一的示意图;
图9为实施例8的实现方式之二的示意图;
图10为实施例9的示意图;
图11为实施例10的示意图;
图12为实施例13的示意图。
具体实施方式
为进一步了解本发明的内容,结合附图及实施例对本发明作详细描述。
实施例1
如图1、2所示,一种信任系统,包括身份注册模块,用于用户的身份注册,在区块链上产生公钥和私钥,产生多个账户ID;身份校验模块,通过账户ID和私钥签名校验信息校验此账户ID是否属于用户以及是否使用;身份存储子模块,存储用户在应用上的行为活动信息。
应用与本发明的信任系统对接,用户使用本信任系统产生的账户ID在应用上注册,身份校验模块首先通过用户的账户ID和私钥签名校验信息校验账户ID是否属于用户,以及是否被其他应用注册使用,如果账户ID属于用户,且未被其他应用注册使用;那么就会使用该账户ID在应用上注册使用,同时在信任系统中为该应用分配身份存储子模块,存储用户在应用上的行为活动信息。
基于区块链的信任系统维护一个可信用户的账户ID账户信息。应用只能拿到对应用户的账户ID账户信息,而不需要身份证敏感信息,屏蔽了用户隐私,用户使用自己签名验证账户属于自己。
根据不同应用区分不同子模块,支持动态扩展,支持鉴权访问。用户在区块链上注册后,将自己的真实身份信息,比如手机号码、邮箱、姓名、驾驶证信息,家庭住址等隐私信息,存储在区块链上,身份注册模块同时为用户提供唯一区块链账户身份私有ID和多个账户ID,用户使用账户ID在不同的应用上注册使用,并通过身份校验模块验证此账户ID是否属于用户或者是否使用,如果没有使用则可以在应用上注册使用,为该应用分配身份存储子模块,存储用户在应用上的行为活动信息。
用户包括个人、企业、事业单位、团体组织等形式;用户信息,对于个人而言,包括但不限于个人照片、出生证明、身份证号码、邮箱、手机号码、某网站的登录账号、QQ号码、联系地址等数据;用户信息,对于企业、事业单位或团体组织等机构而言,包括但不限于社会统一信用代码、组织机构代码、经营内容、对外邮箱、办公电话等数据。
某网络应用为了证明某账户ID是某特定用户所有,用户可以向区块链发送一笔验证交易,把此账户ID用自己私钥签名发送给区块链,区块链节点会对账户ID和用户签名信息进行验证,通过就可以证明此账户ID属于这个用户。不通过,说明这个账户ID非此用户所有。通过后网络应用就可以信任这个账户ID为此用户所有。这样用户就不需要提供个人身份证等敏感信息给网络应用。
个人用户基于区块链随机产生一个自己的私钥,同时得到相应的公钥;也可以由区块链公司根据用户身份证ID产生一个唯一私钥,这样用户私钥丢失时,可以向区块链运营方找回。
区块链中如私有链、联盟链均为许可链,参与到区块链系统中的每个节点都是经过许可的,未经许可的节点不可接入系统中。但是如果许可链内数量有限的多个认证节点联合起来也是会对用户的身份信息泄露造成一定威胁的,所以如果区块链为许可链,用户的公钥和用户身份信息进行Hash加密后,再上传至区块链;如果区块链为公有链,则可以对用户身份信息选择性的进行Hash加密。
实施例2
如图3所示,一种信任系统,本实施例在实施例1的基础上作进一步改进,包括身份注册模块,用于用户的身份注册,在区块链上产生公钥和私钥,产生多个账户ID;身份校验模块,通过账户ID和私钥签名校验信息校验此账户ID是否属于用户以及是否使用;身份存储子模块,存储用户在应用上的行为活动信息。进一步地,还包括身份管理模块,用于对身份存储子模块的信息提供动态的授权管理。
比如默认公开身份存储子模块身份信息,针对用户在一个应用上的行为活动信息,是否允许其他方(除用户以外的其他用户)在该应用对应的身份存储子模块上写入信息,比如商业评论信息等;使得用户对自己在应用的身份信息具有控制权。其他方可以根据公开的信息判断用户是否可信,以实现将信任的责任从应用上转移掉。
用户的身份信息被Hash加密后保存在区块链上,用户在注册或使用应用时,仅对外提供多个账户ID,多个账户ID与用户的身份信息是对应的,有效隔离了用户的身份信息,保护用户的隐私防止被泄露所带来的风险;用户在应用上的行为活动信息,比如商业行为信息,来自其他用户的评价等也被存储在区块链上,但这部分信息,用户可以授权其他应用的运营方和用户访问和查看的权限,授权本应用上的其他用户评价、访问和查看的权限。
实施例3
如图4所示,一种信任系统,本实施例在实施例1、2的基础上作进一步改进,包括身份注册模块,用于用户的身份注册,在区块链上产生公钥和私钥,产生多个账户ID;身份校验模块,通过账户ID和私钥签名校验信息校验此账户ID是否属于用户以及是否使用;身份存储子模块,存储用户在应用上的行为活动信息。进一步地,还包括身份管理模块,用于对身份存储子模块的信息提供动态的授权管理。另外,身份存储子模块包括多个应用的身份存储子模块,每个应用均配置一条应用链,与信任系统的身份存储子模块连接。
针对用户在一个应用上的行为活动信息,当用户允许其他方在该应用对应的身份存储子 模块上写入信息时,写入的信息将被记录在应用链上,不可篡改,以为其他方提供信任判断的基础数据,将应用与信任隔离开来。
本实施例的信任系统支持不同应用的信息记录查询和授权,这些不同的应用均配置一条应用链,不同链的信息均可经用户通过身份授权模块对应用开放。用户之间的信息不可直接共享,但是可以通过用户授权共享给应用,这样应用不但可以拿到本商业内的用户信息,还可以拿到其他应用的用户信息,用户画像更丰富。
实施例4
如图5、6和7所示,一种信任系统,本实施例在实施例1、2、3的基础上作进一步改进,包括身份注册模块,用于用户的身份注册,在区块链上产生公钥和私钥,产生多个账户ID;身份校验模块,通过账户ID和私钥签名校验信息校验此账户ID是否属于用户以及是否使用;身份存储子模块,存储用户在应用上的行为活动信息。进一步地,还包括身份授权模块,提供对身份存储子模块访问的权限。
此权限必须经用户本人授权,授权的方法可以是用户发送一个限时口令来允许访问身份存储子模块里面的本用户数据。
信任系统提供多种不同的应用,这些应用不一定是在区块链上搭建的,可以是运营方自主开发的软件应用,也可以是基于区块搭建的应用,但每个应用均与区块链有连接接口,对区块链存在一定的信任基础,以便用户在对应的应用上注册时,方便获取代表用户隐私信息的账户ID,从而将用户的隐私信息与应用隔离开来。应用之间的信息不可直接共享,但是用户通过身份授权模块,可以授权共享给应用,这样应用不但可以拿到本商业内的用户信息,还可以拿到其他应用的用户信息,用户画像更丰富,但是应用一般拿不到属于授权用户隐私的真实身份信息(对于个人用户而言,比如手机号、邮箱、身份证号码,家庭住址等;对于企业用户而言,比如统一社会信用代码,税号,经营规模等),只能通过不同身份子模块获得尽可能丰富的用户画像,这样既保护了用户隐私,又开放了用户信息,现有技术中的信任系统及应用是无法做到的,用户对自己的隐私信息和应用的使用情况信息均有绝对的控制权,防止用户的隐私信息和应用的使用情况信息泄露。
应用的用户在使用应用的平台提供应用服务时,应用的平台将提供区块链信任系统中身份存储子模块提供的可信数据供用户参考,用户通过身份授权模块在授权的时候,比如只能授权是否可以公开一个身份存储子模块的全部信息或完全不公开,不能有选择性的公开好的和关闭不好的,或者在信任系统中设定提醒模块,通过提醒模块可以告知第三方用户此用户公开信息的百分比,由第三方用户定夺。比如打车平台,有些车主差评很多,或某些开车习惯的评论,或者此车主其他应用比如驾校评分,或其他商业信用,用户都可以拿来参考,尤 其是女性,在时间比较晚的时候回避差评比较恶劣的车主。
商业平台只负责运营,对一些新兴的应用的平台,可以直接使用信任系统的历史沉淀数据,减少了信用累积的时间;比如一个新的网约车或共享经济的应用出现,就可以直接使用本信用系统注册用户的以往多年的信用数据积累来给用户画像,而不需要在新的应用的平台上从0开始积累数据,省去了信任责任的构建,也减少了新兴应用构建信任数据的时间。
实施例5
一种信任系统,本实施例在实施例1、2、3、4的基础上作进一步改进,包括身份注册模块,用于用户的身份注册,在区块链上产生公钥和私钥,产生多个账户ID;身份校验模块,通过账户ID和私钥签名校验信息校验此账户ID是否属于用户以及是否使用;身份存储子模块,存储用户在应用上的行为活动信息。进一步地,应用根据用户的身份信息提供的完整程度来设定用户的服务等级和信任等级。
不同的应用对要求提供的身份信息不够完整的用户,应用会有相应的策略来限制用户的服务。对应用提供信息更多更透明的用户,将获取更多的信任,信任来自应用和身份的查看者。
实施例6
一种信任系统,本实施例在实施例1、2、3、4、5的基础上作进一步改进,包括身份注册模块,用于用户的身份注册,在区块链上产生公钥和私钥,产生多个账户ID;身份校验模块,通过账户ID和私钥签名校验信息校验此账户ID是否属于用户以及是否使用;身份存储子模块,存储用户在应用上的行为活动信息。进一步地,用户的信任等级的信任来源于应用的其他用户或第三方权威商业机构。
用户信任信息的来源有多种,可以是应用使用服务的人的评价,比如搭车人对车主的评价,争议比较大的,商业平台将通过核实写入区块链,一旦写入将永久保存。也可以是第三方权威商业机构,比如车辆所,或和区块链信任平台合作的民间权威认证商业组织。
实施例7
一种信任系统,本实施例在实施例1、2、3、4、5、6的基础上作进一步改进,包括身份注册模块,用于用户的身份注册,在区块链上产生公钥和私钥,产生多个账户ID;身份校验模块,通过账户ID和私钥签名校验信息校验此账户ID是否属于用户以及是否使用;身份存储子模块,存储用户在应用上的行为活动信息。进一步地,应用链发行自己的通证来激励用户或第三方权威商业机构。
围绕应用链也会有一个生态圈,为了应用链的自组织运营,应用链会发行自己的通证(token)来激励生态圈的用户或第三方权威商业机构,比如各权威认证机构提供数据会得到 一定量token作为奖励,用户提供了可信的评论信息也可以得到奖励,同时各方也会收到监督,如果提供了假的数据也会收到扣除token的惩罚。
实施例8
如图8所示,一种信任系统的构建方法,根据实施例1-7任一项技术方案所述的一种信任系统,包括以下步骤:
S1、用户通过区块链产生公钥和私钥;
产生公钥和私钥的方式共有2种,一种是,通过区块链随机产生公钥和私钥,一旦私钥丢失无法找回,另一种是,区块链运营方根据用户身份信息(姓名、性别,身份证号、手机号、邮箱、声音、面部图像,指纹,家庭住址,户口所在地等个人用户身份信息,或者企业、组织、机构或单位的名称、统一社会信用代码、地址、税号等集体身份信息)进行Hash加密后,产生私钥和公钥,私钥如果丢失,可以向区块链运营方找回。
S2、用户的公钥和用户身份信息保存在区块链中;
用户的身份信息需要和第三方认证机构认证签名后保存到区块链,身份信息的分类不同可能有不同的第三方认证机构,比如身份证信息需要政府公安局认证,学历信息需要高校认证,银行卡资产信息可能要银行认证,汽车信息由车辆管理所认证,按照分类保存在区块链上,由于只是签名信息,是一串数字,这串证书签名信息包括认证机构,被认证用户的区块链账户ID,和对真实信息的加密签名信息,可以通过第三方认证机构网站鉴定真实性,同时又不泄露具体信息,比如身份证号,面部信息等,同时也证明了身份信息的真实可信性,将用户的隐私信息隐藏起来,保护了用户隐私,使得用户隐私信息无法被盗用或滥用。同时在必要时候也可以通过第三方认证机构在征得用户同意情况下获取真实信息。
用户的公钥和用户身份信息也可以保存在区块链运营方的私有数据库中,如图9所示,用户信息更加集中,而不是开放和扩散,不需要每个商业应用都认证。
S3、区块链对同一用户产生多个不同的账户ID;
如果一个用户只有一个账户ID,那么通过追溯该账户ID在区块链上的交易行为或活动行为,会增大该用户的账户ID被攻击的风险,从而容易导致用户隐私信息被盗取;一个用户对应拥有多个账户ID,无法追溯该用户的行为,进而起到保护用户隐私信息的作用,使得攻击者无法通过某个账户ID的行为确定到用户。账户ID的数量可以设定成区块链随机产生,也可以设定成由用户请求产生,而账户ID的产生方式可以是对用户的公钥做不同次数的hash,即可产生多个不同的账户ID。
S4、用户通过账户ID在应用上进行注册使用;
用户不需要提供用户身份证等敏感信息给应用,账户ID代表用户的隐私信息已经被区块 链备份和认证,用户的隐私信息保存在区块链上,区块链提供代表用户隐私信息已经被备份和认证的账户ID在应用上注册,这些应用不一定是在区块链上搭建的,可以是运营方自主开发的软件应用,也可以是基于区块搭建的应用,但每个应用均与区块链有连接接口,对区块链存在一定的信任基础,以便用户在对应的应用上注册时,方便获取代表用户隐私信息的账户ID,从而将用户的隐私信息与应用隔离开来。
一个应用的运营方仅知道用户的一个账户ID,且确定该账户ID是经过区块链备份和认证过的,可以用于自己的经营使用,但却不能够获得该用户的隐私信息,所以无法将用户隐私信息用在其他地方,无法泄露用户的隐私信息,解决了用户在使用不同的应用时,存在隐私泄露的问题。
S5、区块链存储用户在应用上的行为活动信息。
用户在在不同的应用上的行为活动信息作为用户信任画像的一部分,被分别存储在u区块链上。
实施例9
如图10所示,一种信任系统的构建方法,在实施例8的基础上进一步改进,S4中的注册包括以下步骤:
S401、用户向区块链发送一笔验证交易,选择一个账户ID和私钥签名信息发送给区块链;
S402、区块链节点会对账户ID和用户签名信息进行验证,验证通过,证明此账户ID属于该用户,且未被使用,在应用上继续注册使用;验证不通过,证明该账户ID不是该用户所有或该账户ID已被使用,不能在应用上注册使用;
S403、验证通过,并注册成功后,区块链记录该账户ID状态为已经被使用。
实施例10
一种信任系统的构建方法,在实施例8、9的基础上进一步改进,S5之后,用户授权其他应用访问用户在应用上的行为活动信息的权限;优选地,用户授权其他方在应用上写入用户的评价信息的权限;优选地,每个应用均配置一条应用链,与信任系统连接;优选地,应用根据用户的身份信息提供的完整程度来设定用户的服务等级和信任等级;优选地,用户的信任等级的信任来源于应用的其他用户或第三方权威商业机构;优选地,应用链发行自己的通证来激励用户或第三方权威商业机构。
用户授权其他应用访问用户在应用上的行为活动信息的权限,即,比如用户基于本发明的信任系统在A、B、C和D四个应用均进行了注册和使用,那么用户可以授权B、C和D三个应用的运营方或其他用户对该用户在A应用上的行为活动信息进行访问和查看的权限。
用户授权其他方在应用上写入用户的评价信息的权限,即,用户在A应用上的行为活动 信息可以授权其他用户对自己的行为活动信息进行评价、访问和查看的权限。
每个应用均配置一条应用链,与信任系统的身份存储子模块连接,用于存储用户的行为活动信息,比如商业行为信息,来自其他用户的评价等,为防止用户的账户ID被追踪,当用户授权其他应用(比如B、C和D应用)访问和查看用户在某应用(比如A应用)上的行为活动信息时,B、C和D应用将无法看到用户在A应用上对应的账户ID。
应用根据用户的身份信息提供的完整程度来设定用户的服务等级和信任等级,即每个应用通过用户的账户ID可以看出用户提供了哪些用户信息,但不能获知具体的内容,由此来判断用户信息的丰富或完整程度,从而用于设定用户的服务等级和信任等级。
用户的信任等级的信任来源于应用的其他用户或第三方权威商业机构;即,用户的信任等级与其他用户对自己的评价有关,也与第三方权威商业机构有关,比如车辆管理所的打分等方面。
应用链发行自己的通证来激励用户或第三方权威商业机构。鼓励多方积极参与使用应用,建立用户群,以便于运营盈利。
实施例11
如图11,一种设备,包括处理器、输入设备、输出设备和存储器,所述处理器、输入设备、输出设备和存储器互相连接,其中,所述存储器用于存储计算机程序,所述计算机程序包括程序指令,所述处理器被配置用于调用所述程序指令,执行如实施例8-10任一项技术方案所述方法。
实施例12
一种计算机可读存储介质,所述计算机存储介质存储有计算机程序,所述计算机程序包括程序指令,所述程序指令当被处理器执行时,使所述处理器执行如实施例8-10任一项技术方案所述方法。
实施例13
本实施例的一种信任系统,该系统提供如下几种功能模块,身份注册模块,身份校验模块,身份授权模块,身份管理模块,身份存储子模块。身份存储子模块可以按需扩展以满足和区分不同应用需求。
身份注册模块:提供用户身份注册功能,提供唯一区块链账户身份私有ID和多个账户ID。
身份校验模块,是用户提供自己的公有ID并提供自己签名校验信息来通过身份校验模块校验此公有ID属于此用户或者说就是此用户本人。
身份授权模块:提供对身份存储子模块访问的授权,此授权必须经用户本人授权。授权的方法可以是用户发送一个限时口令来允许访问存储子模块里面的本用户数据。
身份管理模块:实现一个智能合约,对用户存储子模块的信息提供动态的授权管理。比如默认公开子模块身份信息,允许其他方对本用户写入信息,比如商业评论信息等。
身份存储子模块,根据不同应用区分不同子模块,支持动态扩展,支持鉴权访问。
如图12所示,区块链平台通过信息记录多维采集,不可删改,可以追溯,分布式部署特点,可信认证机构提供可信数据等构筑信任基础。
区块链平台提供多种不同的应用,应用之间的信息不可直接共享,但是可以通过用户授权共享给应用,这样应用不但可以拿到本商业内的用户信息,还可以拿到其他应用的用户信息,用户画像更丰富,但是应用一般拿不到属于授权用户隐私的真实身份信息,只能通过不同身份子模块获得尽可能丰富的用户画像,这样既保护了用户隐私,又开放了用户信息,这在信任平台出现以前是做不到的。
区块链平台针对不同的应用,对一个用户提供不同的应用账户,比如车主应用,淘宝小店应用,用户注册需要用自己身份证等真实身份注册,获取需要的应用账户ID,应用只需拿到区块链平台提供的对应用户的账户ID即可,不需要身份证等信息。
用户在向商业平台申请服务或注册服务时候,只需提供自己在区块链平台的账户ID即可,不需要提供身份证信息。用户可以对提供的账户ID签名,向区块链平台发一笔交易来向商业平台验证账户ID为其本人。这样商业平台拿不到用户的真实身份证信息,这样对用户隐私信息有所保护。
商业平台基于用户提供的自己的账户,可以向区块链平台申请授权获取用户其他应用的画像信息。用户也可以自己设定哪些应用信息对外开放。
对于不同应用要求身份信息提供不够完整的用户,商业平台会有相应的策略来限制用户的服务。对外提供信息更多更透明的用户,将获取更多的信任,信任来自商业平台和身份的查看者。
用户信任信息的来源有多种,可以是应用平台使用服务的人的评价,比如搭车人对车主的评价,争议比较大的,商业平台将通过核实写入区块链,一旦写入将永久保存。也可以是第三方权威商业机构,比如车辆所,或和区块链信任平台合作的民间权威认证商业组织。
围绕信任平台也会有一个生态圈,为了生态圈的自组织运营,平台会发行自己的通证(token)来激励生态圈的组织和个人,比如各权威认证机构提供数据会得到一定量token作为奖励,个人提供了可信的评论信息也可以得到奖励,同时各方也会收到监督,如果提供了假的数据也会收到扣除token的惩罚。
应用的用户在使用商业平台提供应用时候,商业平台将提供区块链信任平台提供的可信数据供用户参考,用户在授权的时候比如只能授权是否可以公开一个子模块的全部信息或完 全不公开,不能有选择性的公开好的和关闭不好的,或者平台可以告知第三方用户此用户公开信息的百分比,由第三方用户定夺。比如打车平台,有些车主差评很多,或某些开车习惯的评论,或者此车主其他应用比如驾校评分,或其他商业信用,用户都可以拿来参考,尤其是女性,在时间比较晚的时候回避差评比较恶劣的车主。
本实施例基于区块链的第三方信任系统。系统支持不同应用的信息记录查询和授权,这些不同应用可以叫应用链,不同链的信息均可经用户授权对应用开放。
区块链信任系统维护一个可信用户的多账户信息,商业应用只能拿到账户信息,而不需要身份证敏感信息,屏蔽用户隐私,用户使用自己签名验证账户属于自己。
商业系统只负责运营,对一些新兴的商业系统(应用),可以直接使用区块链系统的历史沉淀数据,减少了信用累积的时间。比如一个新的网约车或共享经济的应用出现,就可以直接使用本信用系统注册用户的以往多年的信用数据积累来给用户画像,而不需要在新的系统上从0开始积累数据。
本发明基于区块链技术,提出了一种第三方信任系统的设计,把信任从商业运营系统抽离出来独立运营;基于区块链信任系统构建信任生态圈,为各种应用服务。不但应用省去了信任责任的构建,也减少了新兴应用构建信任数据的时间。
以上示意性的对本发明及其实施方式进行了描述,该描述没有限制性,附图中所示的也只是本发明的实施方式之一,实际的结构并不局限于此。所以,如果本领域的普通技术人员受其启示,在不脱离本发明创造宗旨的情况下,不经创造性的设计出与该技术方案相似的结构方式及实施例,均应属于本发明的保护范围。

Claims (12)

  1. 一种信任系统,其特征在于,包括身份注册模块,用于用户的身份注册,在区块链上产生公钥和私钥,产生多个账户ID;身份校验模块,通过账户ID和私钥签名校验信息校验此账户ID是否属于用户以及是否使用;身份存储子模块,存储用户在应用上的行为活动信息。
  2. 根据权利要求1所述的一种信任系统,其特征在于,还包括身份管理模块,用于对身份存储子模块的信息提供动态的授权管理。
  3. 根据权利要求1或2所述的一种信任系统,其特征在于,身份存储子模块包括多个应用的身份存储子模块,每个应用均配置一条应用链,与信任系统的身份存储子模块连接。
  4. 根据权利要求1-3任一项所述的一种信任系统,其特征在于,身份授权模块,提供对身份存储子模块访问的权限。
  5. 根据权利要求4所述的一种信任系统,其特征在于,应用根据用户的身份信息提供的完整程度来设定用户的服务等级和信任等级。
  6. 根据权利要求5所述的一种信任系统,其特征在于,用户的信任等级的信任来源于应用的其他用户或第三方权威商业机构。
  7. 根据权利要求3所述的一种信任系统,其特征在于,应用链发行自己的通证来激励用户或第三方权威商业机构。
  8. 一种信任系统的构建方法,其特征在于,根据权利要求1-7任一项所述的一种信任系统,包括以下步骤:
    S1、用户通过区块链产生公钥和私钥;
    S2、用户的公钥和用户身份信息保存在区块链中;
    S3、区块链对同一用户产生多个不同的账户ID;
    S4、用户通过账户ID在应用上进行注册使用;
    S5、区块链存储用户在应用上的行为活动信息。
  9. 根据权利要求8所述的一种信任系统的构建方法,其特征在于,S4中的注册包括以下步骤:
    S401、用户向区块链发送一笔验证交易,选择一个账户ID和私钥签名信息发送给区块链;
    S402、区块链节点会对账户ID和用户签名信息进行验证,验证通过,证明此账户ID属于该用户,且未被使用,在应用上继续注册使用;验证不通过,证明该账户ID不是该用户所有或该账户ID已被使用,不能在应用上注册使用;
    S403、验证通过,并注册成功后,区块链记录该账户ID状态为已经被使用。
  10. 根据权利要求8所述的一种信任系统的构建方法,其特征在于,S5之后,用户授权其他应用访问用户在应用上的行为活动信息的权限;优选地,用户授权其他方在应用上写入 用户的评价信息的权限;优选地,每个应用均配置一条应用链,与信任系统连接;优选地,应用根据用户的身份信息提供的完整程度来设定用户的服务等级和信任等级;优选地,用户的信任等级的信任来源于应用的其他用户或第三方权威商业机构;优选地,应用链发行自己的通证来激励用户或第三方权威商业机构。
  11. 一种设备,其特征在于,包括处理器、输入设备、输出设备和存储器,所述处理器、输入设备、输出设备和存储器互相连接,其中,所述存储器用于存储计算机程序,所述计算机程序包括程序指令,所述处理器被配置用于调用所述程序指令,执行如权利要求8-10任一项所述方法。
  12. 一种计算机可读存储介质,其特征在于,所述计算机存储介质存储有计算机程序,所述计算机程序包括程序指令,所述程序指令当被处理器执行时,使所述处理器执行如权利要求8-10任一项所述方法。
PCT/CN2019/101603 2018-08-20 2019-08-20 一种信任系统及其构建方法、设备及存储介质 WO2020038366A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201810950729.3A CN109409893A (zh) 2018-08-20 2018-08-20 一种信任系统及其构建方法、设备及存储介质
CN201810950729.3 2018-08-20

Publications (1)

Publication Number Publication Date
WO2020038366A1 true WO2020038366A1 (zh) 2020-02-27

Family

ID=65464319

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/101603 WO2020038366A1 (zh) 2018-08-20 2019-08-20 一种信任系统及其构建方法、设备及存储介质

Country Status (2)

Country Link
CN (1) CN109409893A (zh)
WO (1) WO2020038366A1 (zh)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109409893A (zh) * 2018-08-20 2019-03-01 杭州复杂美科技有限公司 一种信任系统及其构建方法、设备及存储介质
CN113077254A (zh) * 2019-03-29 2021-07-06 创新先进技术有限公司 基于生物特征重置区块链账户密钥的方法和装置
CN110060037B (zh) * 2019-04-24 2020-12-08 上海能链众合科技有限公司 一种基于区块链的分布式数字身份系统
CN112733096B (zh) * 2019-10-14 2024-02-27 深圳市红砖坊技术有限公司 一种用户注册方法、用户登录方法及对应装置
JP7214616B2 (ja) * 2019-12-06 2023-01-30 Tvs Regza株式会社 データベース装置、データ処理システム、データ処理法およびデータ処理プログラム
CN110781419B (zh) * 2020-01-02 2020-04-28 成都四方伟业软件股份有限公司 一种基于区块链的多系统配合使用的方法
CN111339188B (zh) * 2020-02-20 2023-10-31 百度在线网络技术(北京)有限公司 基于区块链的媒介内容处理方法、装置、设备和介质
CN111626735B (zh) * 2020-05-28 2020-12-22 上海逐鲨智能科技有限公司 一种数据交互系统、方法和模块
CN112184449A (zh) * 2020-09-30 2021-01-05 上海旺链信息科技有限公司 一种基于区块链的管理方法和系统

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103607371A (zh) * 2013-07-02 2014-02-26 燕山大学 一种通过第三方平台保护互联网用户隐私的方法
CN107079036A (zh) * 2016-12-23 2017-08-18 深圳前海达闼云端智能科技有限公司 注册及授权方法、装置及系统
US20170330179A1 (en) * 2016-05-16 2017-11-16 Coinplug, Inc. Method for issuing authentication information and blockchain-based server using the same
CN109409893A (zh) * 2018-08-20 2019-03-01 杭州复杂美科技有限公司 一种信任系统及其构建方法、设备及存储介质

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9858569B2 (en) * 2014-03-21 2018-01-02 Ramanan Navaratnam Systems and methods in support of authentication of an item
CN106097073A (zh) * 2016-06-20 2016-11-09 深圳市淘淘谷信息技术有限公司 一种用区块链来赋予数字账户交易过程独有id的方法
US11170346B2 (en) * 2016-09-19 2021-11-09 Sap Se Decentralized credentials verification network
CN107196966B (zh) * 2017-07-05 2020-04-14 北京信任度科技有限公司 基于区块链的多方信任的身份认证方法和系统
CN108234478A (zh) * 2017-12-29 2018-06-29 重庆小犀智能科技有限公司 一种基于区块链的个人信用信息分享系统以及方法

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103607371A (zh) * 2013-07-02 2014-02-26 燕山大学 一种通过第三方平台保护互联网用户隐私的方法
US20170330179A1 (en) * 2016-05-16 2017-11-16 Coinplug, Inc. Method for issuing authentication information and blockchain-based server using the same
CN107079036A (zh) * 2016-12-23 2017-08-18 深圳前海达闼云端智能科技有限公司 注册及授权方法、装置及系统
CN109409893A (zh) * 2018-08-20 2019-03-01 杭州复杂美科技有限公司 一种信任系统及其构建方法、设备及存储介质

Also Published As

Publication number Publication date
CN109409893A (zh) 2019-03-01

Similar Documents

Publication Publication Date Title
WO2020038366A1 (zh) 一种信任系统及其构建方法、设备及存储介质
WO2020038367A1 (zh) 一种隔离用户身份信息的方法、系统、设备和存储介质
US11563728B2 (en) System and method for identity management
US11847197B2 (en) System and method for identity management
US11018869B2 (en) Blockchain-based digital identity management (DIM) system
US10127378B2 (en) Systems and methods for registering and acquiring E-credentials using proof-of-existence and digital seals
US10887098B2 (en) System for digital identity authentication and methods of use
US10810290B2 (en) Robust method and an apparatus for authenticating a client in non-face-to-face online interactions based on a combination of live biometrics, biographical data, blockchain transactions and signed digital certificates
US9900309B2 (en) Methods for using digital seals for non-repudiation of attestations
Windley Digital identity
WO2019099486A1 (en) System for digital identity authentication and methods of use
US20150058931A1 (en) System and Method for Identity Management
CN110414270B (zh) 一种基于区块链的个人数据保护系统及方法
Symeonidis et al. Keyless car sharing system: A security and privacy analysis
US20130318619A1 (en) Encapsulated security tokens for electronic transactions
Choudhari et al. Interoperable blockchain solution for digital identity management
Rajput et al. Towards a more secure Aadhaar
Lourinho et al. Securing the digital witness identity using blockchain and zero-knowledge proofs
Panfil The credential highway: how self-sovereign identity unlocks property rights for the bottom billion
Guo et al. Search engine based proper privacy protection scheme
Hariharasudan et al. Single Identity System for Identification papers based on Blockchain
Rosner E-Government Trust frameworks in the United States
Alotaibi et al. Blockchain for Identity Management: Ensuring Trust and Integrity in the Education Sector
Rihaczek Data interchange and legal security—signature surrogates
Brands Secure access management: trends, drivers and solutions

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19852641

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19852641

Country of ref document: EP

Kind code of ref document: A1