WO2022161343A1 - 数据验证处理的方法、装置及设备 - Google Patents

数据验证处理的方法、装置及设备 Download PDF

Info

Publication number
WO2022161343A1
WO2022161343A1 PCT/CN2022/073694 CN2022073694W WO2022161343A1 WO 2022161343 A1 WO2022161343 A1 WO 2022161343A1 CN 2022073694 W CN2022073694 W CN 2022073694W WO 2022161343 A1 WO2022161343 A1 WO 2022161343A1
Authority
WO
WIPO (PCT)
Prior art keywords
business
query
data
verifiable
request
Prior art date
Application number
PCT/CN2022/073694
Other languages
English (en)
French (fr)
Inventor
金戈
沈陈侃
刘佳伟
Original Assignee
支付宝(杭州)信息技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 支付宝(杭州)信息技术有限公司 filed Critical 支付宝(杭州)信息技术有限公司
Publication of WO2022161343A1 publication Critical patent/WO2022161343A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Definitions

  • This document relates to the technical field of data processing, in particular to methods, devices and equipment for data verification processing.
  • the embodiments of this specification provide a data verification processing method.
  • the method includes receiving a request for creating a verifiable claim sent by the business server.
  • the creation request is used for requesting to create a verifiable statement based on the service data of the first user about the target service received by the service server.
  • the content data of the verifiable claim includes the business data.
  • a query credential generation request is sent to the blockchain system according to the verifiable claim.
  • the query credential generation request is used to request the blockchain system to send the generated query credential of the verifiable claim to a business client of the first user corresponding to the business server.
  • the query credential is used by the service client to acquire the verifiable statement, and to perform verification processing on the acquired service data in the verifiable statement according to the service data of the target service submitted by the first user.
  • the embodiments of this specification provide a data verification processing method.
  • the method includes receiving a query credential generation request sent by an identity management system.
  • the query credential generation request is used to request to generate a query credential for the verifiable claim to be verified.
  • the content data of the verifiable statement includes the service data about the target service of the first user received by the service server.
  • the query credential of the verifiable claim is generated according to the query credential generation request based on the blockchain.
  • the query credential is sent to the service client of the first user corresponding to the service server.
  • the query credential is used by the service client to acquire the verifiable statement, and to perform verification processing on the acquired service data in the verifiable statement according to the service data of the target service submitted by the first user.
  • the embodiments of this specification provide a data verification processing method.
  • the method includes sending a data processing request to a corresponding service server in response to a service operation of the first user.
  • the data processing request is used to request the business server to create a verifiable claim through an identity management system, and to generate a query credential for the verifiable claim through a blockchain system.
  • the content data of the verifiable claim includes the service data of the first user about the target service. Acquiring the verifiable claim is performed according to the received query credential. and performing verification processing on the business data in the verifiable statement according to the business data of the target business submitted by the first user.
  • the embodiments of this specification provide a data verification processing method.
  • the method includes receiving a data processing request sent by a service client.
  • the service data to be verified about the target service of the first user is determined according to the data processing request.
  • a request to create a verifiable claim is sent to the identity management system according to the business data.
  • the creation request is used to request the identity management system to create a verifiable claim including the business data, and send the generated query credential of the verifiable claim to the business client through the blockchain system.
  • the query credential is used by the service client to acquire the verifiable statement, and to perform verification processing on the acquired service data in the verifiable statement according to the service data of the target service submitted by the first user.
  • the embodiments of this specification provide a data verification processing method.
  • the method includes, in response to a query operation of the first user, obtaining a query credential for a verifiable claim to be verified from a service client in a preset manner.
  • the query credential is generated by the blockchain system based on the verifiable statement according to the query credential generation request sent by the identity management system.
  • the verifiable claim sent by the identity management system is received, and the verifiable claim is presented.
  • the verifiable statement is used for the first user to perform matching processing between the service data in the verifiable statement and the service data submitted by the first user displayed by the service client.
  • the embodiments of this specification provide a data verification processing apparatus.
  • the device includes a receiving module, which receives a request for creating a verifiable statement sent by a service server. Wherein, the creation request is used for requesting to create a verifiable statement based on the service data of the first user about the target service received by the service server.
  • the apparatus also includes a creation module that creates a verifiable claim according to the creation request. Wherein, the content data of the verifiable claim includes the business data.
  • the device further includes a sending module, which sends a query credential generation request to the blockchain system according to the verifiable statement.
  • the query credential generation request is used to request the blockchain system to send the generated query credential of the verifiable claim to a business client of the first user corresponding to the business server.
  • the query credential is used by the service client to acquire the verifiable statement, and to perform verification processing on the acquired service data in the verifiable statement according to the service data of the target service submitted by the first user.
  • the embodiments of this specification provide a data verification processing apparatus.
  • the device includes a receiving module for receiving a query credential generation request sent by the identity management system.
  • the query credential generation request is used to request to generate a query credential for the verifiable claim to be verified.
  • the content data of the verifiable statement includes the service data about the target service of the first user received by the service server.
  • the apparatus further includes a generating module that generates the query credential of the verifiable claim according to the query credential generation request based on the blockchain.
  • the device further includes a sending module, which sends the query credential to a service client of the first user corresponding to the service server.
  • the query credential is used by the service client to acquire the verifiable statement, and to perform verification processing on the acquired service data in the verifiable statement according to the service data of the target service submitted by the first user.
  • the embodiments of this specification provide a data verification processing apparatus.
  • the device includes a sending module, and in response to the service operation of the first user, sends a data processing request to the corresponding service server.
  • the data processing request is used to request the business server to create a verifiable claim through an identity management system, and to generate a query credential for the verifiable claim through a blockchain system.
  • the content data of the verifiable claim includes the service data of the first user about the target service.
  • the apparatus further includes a processing module, which performs an acquisition process of the verifiable statement according to the received query credential. and performing verification processing on the business data in the verifiable statement according to the business data of the target business submitted by the first user.
  • the embodiments of this specification provide a data verification processing apparatus.
  • the device includes a receiving module, which receives a data processing request sent by a service client, and determines, according to the data processing request, service data to be verified about the target service of the first user.
  • the device further includes a sending module, which sends a request for creating a verifiable claim to the identity management system according to the business data.
  • the creation request is used to request the identity management system to create a verifiable claim including the business data, and send the generated query credential of the verifiable claim to the business client through the blockchain system.
  • the query credential is used by the service client to acquire the verifiable statement, and to perform verification processing on the acquired service data in the verifiable statement according to the service data of the target service submitted by the first user.
  • the embodiments of this specification provide a data verification processing apparatus.
  • the device includes an obtaining module, which, in response to the query operation of the first user, obtains the query credential of the verifiable statement to be verified from the service client according to a preset method.
  • the query credential is generated by the blockchain system based on the verifiable statement according to the query credential generation request sent by the identity management system.
  • the apparatus further includes a sending module, which sends a query request to the identity management system according to the query credential.
  • the apparatus further includes a receiving module for receiving the verifiable claim sent by the identity management system.
  • the apparatus also includes a presentation module that presents the verifiable claim.
  • the verifiable statement is used for the first user to perform matching processing between the service data in the verifiable statement and the service data submitted by the first user displayed by the service client.
  • the embodiments of this specification provide a data verification processing device.
  • the device includes a processor.
  • the apparatus also includes a memory arranged to store the computer-executable instructions.
  • the computer-executable instructions when executed, cause the processor to receive a request for creating a verifiable claim sent by a business server.
  • the creation request is used for requesting to create a verifiable statement based on the service data of the first user about the target service received by the service server.
  • the content data of the verifiable claim includes the business data.
  • a query credential generation request is sent to the blockchain system according to the verifiable claim.
  • the query credential generation request is used to request the blockchain system to send the generated query credential of the verifiable claim to a business client of the first user corresponding to the business server.
  • the query credential is used by the service client to acquire the verifiable statement, and to perform verification processing on the acquired service data in the verifiable statement according to the service data of the target service submitted by the first user.
  • the embodiments of this specification provide a data verification processing device.
  • the device includes a processor.
  • the apparatus also includes a memory arranged to store the computer-executable instructions.
  • the computer-executable instructions when executed, cause the processor to receive a query credential generation request sent by an identity management system.
  • the query credential generation request is used to request to generate a query credential for the verifiable claim to be verified.
  • the content data of the verifiable statement includes the service data about the target service of the first user received by the service server.
  • the query credential of the verifiable claim is generated according to the query credential generation request based on the blockchain.
  • the query credential is sent to the service client of the first user corresponding to the service server.
  • the query credential is used by the service client to acquire the verifiable statement, and to perform verification processing on the acquired service data in the verifiable statement according to the service data of the target service submitted by the first user.
  • the embodiments of this specification provide a data verification processing device.
  • the device includes a processor.
  • the apparatus also includes a memory arranged to store the computer-executable instructions.
  • the computer-executable instructions when executed, cause the processor to send a data processing request to a corresponding service server in response to a service operation of the first user.
  • the data processing request is used to request the business server to create a verifiable claim through an identity management system, and to generate a query credential for the verifiable claim through a blockchain system.
  • the content data of the verifiable claim includes the service data of the first user about the target service. Acquiring the verifiable claim is performed according to the received query credential. and performing verification processing on the business data in the verifiable statement according to the business data of the target business submitted by the first user.
  • the embodiments of this specification provide a data verification processing device.
  • the device includes a processor.
  • the apparatus also includes a memory arranged to store the computer-executable instructions.
  • the computer-executable instructions when executed, cause the processor to receive a data processing request sent by a service client.
  • the service data to be verified about the target service of the first user is determined according to the data processing request.
  • a request to create a verifiable claim is sent to the identity management system according to the business data.
  • the creation request is used to request the identity management system to create a verifiable claim including the business data, and send the generated query credential of the verifiable claim to the business client through the blockchain system.
  • the query credential is used by the service client to acquire the verifiable statement, and to perform verification processing on the acquired service data in the verifiable statement according to the service data of the target service submitted by the first user.
  • the embodiments of this specification provide a data verification processing device.
  • the device includes a processor.
  • the apparatus also includes a memory arranged to store the computer-executable instructions.
  • the computer-executable instructions when executed, cause the processor, in response to a query operation of the first user, to obtain a query credential for a verifiable claim to be verified from a service client in a preset manner.
  • the query credential is generated by the blockchain system based on the verifiable statement according to the query credential generation request sent by the identity management system.
  • the verifiable claim sent by the identity management system is received, and the verifiable claim is presented.
  • the verifiable statement is used for the first user to perform matching processing between the service data in the verifiable statement and the service data submitted by the first user displayed by the service client.
  • the embodiments of this specification provide a storage medium.
  • the storage medium is used to store computer-executable instructions.
  • the computer-executable instructions receive, when executed by the processor, a request for creating a verifiable claim sent by the service server.
  • the creation request is used for requesting to create a verifiable statement based on the service data of the first user about the target service received by the service server.
  • the content data of the verifiable claim includes the business data.
  • a query credential generation request is sent to the blockchain system according to the verifiable claim.
  • the query credential generation request is used to request the blockchain system to send the generated query credential of the verifiable claim to a business client of the first user corresponding to the business server.
  • the query credential is used by the service client to acquire the verifiable statement, and to perform verification processing on the acquired service data in the verifiable statement according to the service data of the target service submitted by the first user.
  • the embodiments of this specification provide a storage medium.
  • the storage medium is used to store computer-executable instructions.
  • the computer-executable instructions when executed by the processor, receive a query credential generation request sent by an identity management system.
  • the query credential generation request is used to request to generate a query credential for the verifiable claim to be verified.
  • the content data of the verifiable statement includes the service data about the target service of the first user received by the service server.
  • the query credential of the verifiable claim is generated according to the query credential generation request based on a blockchain.
  • the query credential is sent to the service client of the first user corresponding to the service server.
  • the query credential is used by the service client to acquire the verifiable statement, and to perform verification processing on the acquired service data in the verifiable statement according to the service data of the target service submitted by the first user.
  • the embodiments of this specification provide a storage medium.
  • the storage medium is used to store computer-executable instructions.
  • the computer-executable instruction When executed by the processor, the computer-executable instruction sends a data processing request to the corresponding service server in response to the service operation of the first user.
  • the data processing request is used to request the business server to create a verifiable claim through an identity management system, and to generate a query credential for the verifiable claim through a blockchain system.
  • the content data of the verifiable claim includes the service data of the first user about the target service. Acquiring the verifiable claim is performed according to the received query credential. and performing verification processing on the business data in the verifiable statement according to the business data of the target business submitted by the first user.
  • the embodiments of this specification provide a storage medium.
  • the storage medium is used to store computer-executable instructions.
  • the computer-executable instructions when executed by the processor, receive a data processing request sent by a service client.
  • the service data to be verified about the target service of the first user is determined according to the data processing request.
  • a request to create a verifiable claim is sent to the identity management system according to the business data.
  • the creation request is used to request the identity management system to create a verifiable claim including the business data, and send the generated query credential of the verifiable claim to the business client through the blockchain system.
  • the query credential is used by the service client to acquire the verifiable statement, and to perform verification processing on the acquired service data in the verifiable statement according to the service data of the target service submitted by the first user.
  • the embodiments of this specification provide a storage medium.
  • the storage medium is used to store computer-executable instructions.
  • the computer-executable instructions when executed by the processor, acquire the query credentials of the verifiable claim to be verified from the service client according to a preset manner in response to the query operation of the first user.
  • the query credential is generated by the blockchain system based on the verifiable statement according to the query credential generation request sent by the identity management system.
  • the verifiable claim sent by the identity management system is received, and the verifiable claim is presented.
  • the verifiable statement is used for the first user to perform matching processing between the service data in the verifiable statement and the service data submitted by the first user displayed by the service client.
  • FIG. 1 is a schematic diagram of a first scenario of a data verification processing method provided by an embodiment of the present specification
  • FIG. 2 is a schematic diagram of a second scenario of a data verification processing method provided by an embodiment of the present specification
  • FIG. 3 is a first schematic flowchart of a data verification processing method provided by an embodiment of the present specification
  • FIG. 4 is a second schematic flowchart of a data verification processing method provided by an embodiment of the present specification.
  • FIG. 5 is a third schematic flowchart of a data verification processing method provided by an embodiment of the present specification.
  • FIG. 6 is a fourth schematic flowchart of a data verification processing method provided by an embodiment of the present specification.
  • FIG. 7 is a fifth schematic flowchart of a data verification processing method provided by an embodiment of the present specification.
  • FIG. 8 is a sixth schematic flowchart of a data verification processing method provided by an embodiment of the present specification.
  • FIG. 9 is a seventh schematic flowchart of a data verification processing method provided by an embodiment of the present specification.
  • FIG. 10 is a schematic diagram of a first module composition of a data verification processing device provided in an embodiment of the present specification.
  • FIG. 11 is a schematic diagram of the composition of a second module of a data verification processing device provided in an embodiment of the present specification
  • FIG. 12 is a schematic diagram of a third module composition of a data verification processing device provided in an embodiment of the present specification.
  • FIG. 13 is a schematic diagram of a fourth module composition of a data verification processing device provided in the embodiment of the present specification.
  • FIG. 14 is a schematic diagram of the composition of a fifth type of modules of a data verification processing device provided in an embodiment of the present specification.
  • FIG. 15 is a schematic structural diagram of a data verification processing device according to an embodiment of the present specification.
  • FIG. 1 is a schematic diagram of an application scenario of the data verification processing method provided by the embodiment of this specification.
  • the scenario includes a first user's business client, a business server corresponding to the business client, an identity management system, and a blockchain system.
  • the service client can be installed in a first terminal device, and the first terminal device can be a mobile phone, a tablet computer, a desktop computer, a portable notebook computer, etc. (only a desktop computer is shown in FIG. 1 ); the service client can be An independent application program (Application, App for short) may also be a small program embedded in other application programs, or may be a web application or the like.
  • the business server may be an independent server, or a server cluster composed of multiple servers, providing at least one business processing service, such as wealth management business, insurance business, registration business, payment business, and the like.
  • the identity management system provides services such as the creation of digital identities and the creation of Verifiable Claims (VC); among them, digital identities can be displayed in various ways, such as DID (Decentralized Identity), etc. DID also It can be called distributed digital identity.
  • the blockchain system includes at least one blockchain node (only one is shown in FIG. 1 ) that is connected to the blockchain, and data is stored in the blockchain, such as the generation record information of the query voucher, and the like.
  • the service client may send a data processing request to the corresponding service server in response to the service operation of the first user.
  • the service server determines the service data to be verified about the target service of the first user according to the received data processing request; and sends a request for creating a verifiable statement to the identity management system according to the determined service data.
  • the identity management system creates a verifiable claim including business data according to the received creation request, and sends a query credential generation request to the blockchain system according to the verifiable claim.
  • the blockchain node in the blockchain system After receiving the query voucher generation request, the blockchain node in the blockchain system generates a query voucher that can verify the statement, and sends the query voucher to the first user's business client through the identity management system and the business server.
  • the business client sends a query request to the identity management system according to the received query credential, and the identity management system sends the verifiable statement queried to the business client.
  • the service client performs verification processing on the service data in the received verifiable statement according to the service data of the target service submitted by the first user.
  • the blockchain node can also send the query credential to the business client of the first user through the business server (not shown in FIG. 1 ).
  • the scenario may further include a query client of the first user, and the query client may be installed in a second terminal device, and the second terminal device may be a mobile phone, a tablet computer, a desktop computer, a portable notebook A computer, etc. (only a mobile phone is shown in FIG. 2 ); the query client can be an independent application program or a small program embedded in other application programs.
  • the service client After the service client receives the query certificate, it provides the query certificate to the query client in a preset manner and displays the obtained business data of the target service submitted by the first user; the query client reports to the identity
  • the management system sends a query request, receives a verifiable statement sent by the identity management system, and displays the received verifiable statement, so that the first user matches the business data in the verifiable statement with the business data displayed by the business client.
  • a verifiable statement is created based on the business data of the first user about the target business received by the business server, and a query certificate of the verifiable statement is generated through the blockchain system, and the query certificate is sent to the business client, so that the business The client can obtain the verifiable statement based on the query credential, and perform verification processing on the business data in the verifiable statement; thus, the effective verification of the business data received by the business server is realized, and the tampering of the business data is avoided.
  • the query certificate is generated based on the blockchain system, which ensures the authenticity of the query certificate and the unique correlation between the query certificate and the verifiable statement , avoiding the risk of forgery of query credentials or verifiable claims, thereby ensuring the validity of verification.
  • FIG. 3 is a schematic flowchart of a data verification processing method provided in an embodiment of the present specification.
  • the method in FIG. 3 can be executed by the identity management system in FIG. 1 , and includes the following steps: Step S102 : The creation request of the verification statement; wherein, the creation request is used to request the creation of a verifiable statement based on the business data of the first user about the target business received by the business server; specifically, as shown in Figure 4, the business client responds to the first The user's business operation sends a data processing request to the corresponding business server.
  • the service server determines the service data of the first user about the target service to be verified according to the received data processing request, and sends a request for creating a verifiable statement to the identity management system according to the determined service data.
  • the service client when the first user has the processing requirements of the target service, the service client is operated to submit the service data of the target service; the service client, in response to the submission operation of the first user, obtains the service of the target service submitted by the first user. data, and send a business processing request to the business server according to the obtained business data.
  • the business server sends a request for creating a verifiable statement to the identity management system according to the business data in the received business processing request, so as to realize the verification processing of the business data received by the business server. Therefore, before the business server performs business processing, verification processing is performed on the business data received by the business server, which can ensure effective processing of the target business and avoid losses to the first user due to tampering of business data.
  • the first user operates its service client to select the target service to be verified to initiate Verification processing: in response to the verification operation of the first user, the service client determines the service identification information of the first user about the target service to be verified, and sends a verification request to the service server according to the service identification information.
  • the business server obtains corresponding business data according to the business identification information in the verification request, and sends a request for creating a verifiable statement to the identity management system according to the obtained business data, so as to verify the business data processed by the business server.
  • the service identification information is, for example, serial number information for the first user to handle the target service, credential identification information for the first user's service voucher for the target service, and the like.
  • Step S104 create a verifiable statement according to the creation request; wherein, the content data of the verifiable statement includes business data;
  • Step S106 send a query voucher generation request to the blockchain system according to the verifiable statement, and the query voucher generation request is used to request a block
  • the chain system sends the generated query certificate of the verifiable statement to the business client corresponding to the business server of the first user; the query certificate is used by the business client to obtain the verifiable statement, and according to the business of the target business submitted by the first user
  • the data verifies the business data in the obtained verifiable claim.
  • the blockchain system when the blockchain system receives the query voucher generation request, it generates a query voucher that can verify the statement according to the query voucher generation request, and sends the generated query voucher to the identity management system, and the identity management system sends the query voucher to the business service.
  • the business server sends the received query credentials to the business client.
  • the blockchain system sends the generated query certificate to the business server, and the business server sends the received query certificate to the business client.
  • the query certificate may include a hash value of a verifiable statement, and the specific form of the query certificate may be set according to needs in practical applications, for example, the query certificate may be a two-dimensional code, a barcode, or the like.
  • a verifiable statement is created based on the business data of the first user about the target business received by the business server, and a query certificate of the verifiable statement is generated through the blockchain system, and the query certificate is sent to the business client,
  • the business client can obtain the verifiable claim based on the query credential, and perform verification processing on the business data in the verifiable claim.
  • the blockchain system generates the query certificate, which ensures the authenticity of the query certificate and the unique association between the query certificate and the verifiable statement, avoids the risk of forgery of the query certificate or the verifiable statement, and ensures the validity of the verification.
  • step S104 may include the following steps S104-2: step S104-2, If it is determined that the creation request meets the preset creation conditions, a verifiable claim is created according to the creation request.
  • determining that the creation request meets the preset creation conditions may include: if the first digital identity information of the business server, the second digital identity information of the first user, and the first signature data are obtained, and the verification of the first signature data is passed, Then, it is determined that the creation request meets the preset creation conditions; wherein, the first signature data is obtained by signing the first designated data based on the first private key corresponding to the first digital identity information.
  • the creation request may include the first digital identity information of the business server and/or the second digital identity of the first user information
  • the creation request may include the server information of the business server and/or the user information of the first user.
  • the identity management system receives the creation request of the verifiable statement, it determines whether the creation request includes the first digital identity information of the business server and the second digital identity information of the first user, and if so, obtains the first digital identity information from the creation request.
  • the identity management system allocates a corresponding public-private key pair for the generated first digital identity information and/or the second digital identity information, and sends the private key in the public-private key pair to the corresponding service server and/or the first user, And store the public key in association with the corresponding digital identity information, such as saving it to the blockchain.
  • the creation request may include the first signature data; correspondingly, determining that the first signature data is obtained may include: the identity management system determines whether the creation request includes The first signature data, if yes, it is determined to obtain the first signature data; if not, a request for obtaining the signature data is sent to the business server, and if the first signature data sent by the business server is received, it is determined to obtain the first signature data. signature data.
  • the identity management system After obtaining the first signature data, the first digital identity information and the second digital identity information, the identity management system obtains the corresponding public key according to the first digital identity information, and performs verification processing on the first signature data according to the obtained public key, If the verification is passed, it is determined that the creation request meets the preset creation conditions; if the verification fails, it is determined that the creation request does not meet the preset creation conditions, and a request failure information is sent to the business server.
  • verifying the first signature data the risk of others posing as the service server to send a creation request is avoided; by obtaining the first digital identity information and the second digital identity information, it is ensured that the creation conditions of the verifiable statement are met.
  • creating a verifiable statement according to the creation request in step S104 may include: performing signature processing on the second specified data according to the second private key corresponding to the third digital identity information of the identity management system to obtain the second signature data;
  • the first digital identity information, the second digital identity information, the first signature data, the second signature data and the business data included in the creation request are determined as content data, and a verifiable claim is created according to the content data.
  • the second specified data can be set according to needs in practical applications, for example, the second specified data includes first digital identity information, second digital identity information, service data, and the like.
  • the identity management system sends the blockchain system to the blockchain system based on the created verifiable claim.
  • the verifiable claim is included in the query credential generation request, thereby saving the verifiable claim to the blockchain to ensure the immutability of the verifiable claim.
  • sending the query voucher generation request to the blockchain system according to the verifiable statement in step S106 may include: generating the query voucher generation request according to the verifiable statement, and sending the query voucher generation request to the blockchain system; wherein, the query voucher The generation request is used to request the blockchain system to hash the verifiable claim according to the preset method to obtain the hash value, generate the query credential of the verifiable claim according to the hash value, and generate the verifiable claim based on the hash value and the verifiable claim.
  • the generation record information of the query certificate is saved in the blockchain.
  • the identity management system sends a query certificate generation request to the blockchain system according to the hash value of the verifiable statement.
  • sending a query credential generation request to the blockchain system according to the verifiable statement may include: hashing the verifiable statement according to a preset method to obtain a hash value, and generating a query credential generation request according to the hash value ; Send the generated query credential generation request to the blockchain system; and, save the verifiable proof and the hash value association to the designated storage area.
  • the query voucher generation request is used to request the blockchain system to generate a query voucher for a verifiable statement according to the hash value, and save the generation record information of the query voucher in the blockchain.
  • the designated storage area may be the local storage area of the identity management system, cloud storage, or blockchain.
  • the query voucher is generated according to the determined hash value of the verifiable claim, and the query voucher is sent to the business client through the identity management system and the business server .
  • the business client can obtain the verifiable statement and complete the verification process; correspondingly, as shown in FIG. 4 , the business client sends a query request to the identity management system according to the query credential, The identity management system sends the verifiable statement queried to the business client, and the business client verifies the business data in the received verifiable statement according to the acquired business data of the target business submitted by the first user.
  • step S106 it may further include: receiving a query request sent by the business client based on the query credential, obtaining a verifiable statement according to the query request, and sending the obtained verifiable statement to the business client; specifically, when the query credential is generated
  • the identity management system obtains the hash value from the query request, and obtains the associated saved verifiable claim from the blockchain according to the hash value; or, the identity management system reports to the blockchain according to the hash value.
  • the system sends an acquisition request for a verifiable statement, and the blockchain node in the blockchain system queries the associated saved verifiable statement from the blockchain according to the hash value in the acquisition request and sends it to the identity management system.
  • the identity management system obtains the hash value from the query request, obtains the associated saved verifiable claim from the specified storage area according to the hash value, and stores the obtained verifiable claim.
  • the validation assertion is sent to the business client.
  • the identity management system performs query processing based on the query request sent by the business client, and the business client performs the verification processing of the verifiable statement, which realizes the verification of the business data received by the business server and avoids the need for business data. Risk of being tampered with and causing losses to the first user.
  • the first user can operate its query client , in response to the query operation of the first user, the query client obtains a query certificate from the service client according to a preset method, and sends a query request to the identity management system according to the query certificate, and the identity management system performs query processing according to the query request, and sends the query
  • the received verifiable statement is sent to the query client, and the query client displays the received verifiable statement, so that the user can compare the business data in the verifiable statement with the business data of the target business submitted by the first user displayed by the business client.
  • the method may include: receiving a query request sent by the query client based on the query credential, obtaining a verifiable statement according to the query request, and sending the obtained verifiable statement to the query client.
  • the identity management system performs query processing based on the query request sent by the query client, and the query client displays the acquired verifiable statement for the first user to perform verification processing on the business data, thereby realizing the verification of the business data received by the business server.
  • Data verification avoids the risk of loss to the first user due to tampering with business data.
  • Figures 4 and 5 are only for illustration and not for limitation.
  • the execution order of some operations can be interchanged, and some operations can also be implemented in other ways; for example, the blockchain system can also send query credentials to the identity After the management system, the generation record of the query certificate is uploaded to the chain; the blockchain system can also send the query certificate to the business server, and the business server sends the query certificate to the business client.
  • the identity management system creates a verifiable statement based on the business data of the first user about the target business received by the business server, generates a query certificate for the verifiable statement through the blockchain system, and sends the query certificate to the business
  • the client enables the business client to obtain a verifiable claim based on the query credential, and perform verification processing on the business data in the verifiable claim.
  • the blockchain system generates the query certificate, which ensures the authenticity of the query certificate and the unique association between the query certificate and the verifiable statement, avoids the risk of forgery of the query certificate or the verifiable statement, and ensures the validity of the verification.
  • FIG. 6 is a schematic flowchart of another data verification processing method provided by the embodiment of this specification; as shown in FIG. 6 , the method includes the following steps: Step S202, receiving a query credential generation request sent by the identity management system; wherein, query The credential generation request is used to request to generate a query credential for the verifiable statement to be verified; the content data of the verifiable statement includes the business data of the first user about the target business received by the business server; specifically, the business client responds to the first The user's business operation sends a data processing request to the corresponding business server.
  • the business server determines the business data of the target business to be verified according to the received data processing request, and sends a request for creating a verifiable statement to the identity management system according to the determined business data.
  • the identity management system creates a verifiable claim including the business data according to the received creation request, and sends a query credential generation request to the blockchain system according to the created verifiable claim.
  • Step S204 based on the blockchain, according to the query voucher generation request to generate a query certificate that can verify the statement; in order to improve the generation rate of the query certificate, in the embodiment of the present application, a first smart contract is pre-deployed in the blockchain, and based on the first smart contract.
  • the smart contract generates query credentials.
  • step S204 may include: invoking the first smart contract deployed in the blockchain, and generating a query credential for a verifiable statement according to the query credential generation request based on the first smart contract.
  • the query credential is generated based on the hash value of the verifiable claim.
  • generating the query credential of the verifiable claim according to the query credential generation request may include: obtaining a hash value of the verifiable claim according to the query credential generation request, and generating the query credential according to the obtained hash value.
  • the hash value of the verifiable claim is obtained from the query credential generation request; or, the verifiable claim is obtained from the query credential generation request, and the obtained verifiable claim is hashed according to a preset method to obtain the hash value .
  • Step S206 sending the query credential to the business client corresponding to the business server of the first user; the query credential is used by the business client to obtain a verifiable statement, and according to the business data of the target business submitted by the first user, the obtained verifiability is verified.
  • the business data in the verification statement is processed for verification.
  • send the query certificate to the business client through the identity management system that is, the blockchain system sends the query certificate to the identity management system, and the identity management system sends the received query certificate to the business server; the business server sends the query certificate to the business server.
  • the received query credentials are sent to the business client.
  • send the query certificate to the business client through the business server that is, the blockchain system sends the query certificate to the determined business server, and the business server sends the received query certificate to the business client.
  • the blockchain system after generating the query certificate, the blockchain system also saves the generation record of the query certificate to the block in the chain.
  • the query voucher generation request includes a verifiable statement
  • the verifiable statement, the query voucher, and the generation time of the query voucher are associated with records
  • the recorded information is determined as the generation record information of the query voucher, and the generation record information is saved. to the blockchain.
  • the query credential generation request includes the hash value of the verifiable statement
  • the hash value, the query credential, the generation time of the query credential, etc. are associated with records
  • the recorded information is determined as the generation record information of the query credential, and the record will be generated.
  • Information is saved to the blockchain. It should be pointed out that the specific content of the generated record information can be set by itself as required in practical applications.
  • the blockchain system when receiving a query voucher generation request, the blockchain system generates a query voucher for a verifiable statement to be verified and sends it to the business client, so that the business client can obtain the verifiable statement based on the query voucher, and Verification processing is performed on the business data in the verifiable statement; wherein, the business data in the verifiable statement is the business data about the target business of the first user received by the business server.
  • the blockchain system generates the query certificate, which ensures the authenticity of the query certificate and the unique association between the query certificate and the verifiable statement, avoids the risk of forgery of the query certificate or the verifiable statement, and ensures the validity of the verification.
  • FIG. 7 is a schematic flowchart of another data verification processing method provided by the embodiment of this specification; as shown in FIG.
  • Step S302 responds to the business operation of the first user, and sends the corresponding business server to the Send a data processing request; wherein, the data processing request is used to request the business server to create a verifiable statement through the identity management system, and generate a query certificate for the verifiable statement through the blockchain system; wherein, the content data of the verifiable statement includes the first Business data of the user about the target service; optionally, in response to the submission operation of the first user, obtain the service data of the target service submitted by the first user, and send a service processing request to the service server according to the obtained service data.
  • the service identification information of the first user about the target service to be verified is determined, and a verification request is sent to the service server according to the service identification information.
  • the service identification information is, for example, serial number information for the first user to handle the target service, credential identification information for the first user's service voucher for the target service, and the like.
  • Step S304 is to obtain the verifiable statement according to the received query credential, and to perform verification processing on the business data in the verifiable statement according to the business data of the target business submitted by the first user.
  • the query voucher sent by the service server is received, the verifiable statement is acquired according to the received query voucher, and the service data in the verifiable statement is verified according to the business data of the target service submitted by the first user.
  • step S304 may include the following steps S304-2 and S304-4: step S304-2, obtaining a hash value of the verifiable claim from the query credential, and sending a query request to the identity management system according to the obtained hash value;
  • the query request is used to request the identity management system to obtain the corresponding verifiable claim according to the hash value; specifically, the query credential is parsed to obtain the hash value of the verifiable claim, and the query request is sent to the identity management system according to the obtained hash value.
  • Step S304-4 Receive the verifiable statement sent by the identity management system, and perform matching processing between the service data in the verifiable statement and the acquired service data of the target service submitted by the first user.
  • the business client sends a business processing request to the business server based on the submission operation of the first user
  • the business data in the verifiable statement is matched with the business data obtained based on the submission operation of the first user;
  • the match is successful, it is determined that the business data in the verifiable statement has passed the verification, and the verification pass information is sent to the business server; the verification pass information is used to instruct the business server to perform business processing according to the business data. Therefore, in the process of business processing, when the business client passes the verification of the business data received by the business server based on the obtained verifiable statement, it instructs the business server to perform business processing, effectively avoiding the tampering of business data. losses to the first user.
  • the service client sends a verification request to the service server based on the verification operation of the first user
  • the service data about the target service submitted by the first user is obtained based on the determined service identification information of the first user about the target service to be verified
  • the verifiable statement is received
  • the business data in the verifiable statement is matched with the acquired business data.
  • step S304-4 the business data in the verifiable statement is matched with the acquired business data of the target business submitted by the first user, which may include:
  • the third digital identity information obtains the public key corresponding to the third digital identity information; if the second signature data in the verifiable statement is verified according to the obtained public key, submit the business data in the verifiable statement with the obtained first user
  • the business data of the target business is matched and processed.
  • the verifiable statement may include third digital identity information
  • the business client obtains the third digital identity information of the identity management system from the verifiable statement; or, the identity management system sends the verifiable statement and the third digital identity information to the
  • the business client receives the third digital identity information and the verifiable statement sent by the identity management system. Therefore, by verifying the second signature data, it is ensured that the verifiable statement is created by the identity management system rather than malicious forgery by an illegal user, thereby ensuring the validity of the verification.
  • step S304 includes the above steps S304-2 and S304-4, and the service client sends a service processing request to the service server based on the submission operation of the first user
  • it may further include: if it is determined that the verification is passed, Then, send verification pass information to the business server; the verification pass information is used to instruct the business server to perform business processing according to the business data; and receive business processing result information sent by the business server, and display the business processing result information. If the verification fails, the verification failure information is sent to the business server, and the request failure information is displayed.
  • step S304 includes the above steps S304-2 and S304-4, and the service client sends verification to the service server based on the verification operation of the first user
  • the method may further include: displaying verification result information.
  • the service client after receiving the query certificate, can also provide the query certificate to the query client of the first user in a preset manner, and the query client obtains a verifiable statement and displays it to the user, for users to authenticate.
  • step S304 may include the following step S304-6: step S304-6, displaying the acquired business data of the target service submitted by the first user, and providing the query credentials to the query client of the first user in a preset manner;
  • the query credential is used for the query client to send a query request to the identity management system, and to display the verifiable statement sent by the identity management system, so that the first user can match the business data in the verifiable statement with the business data displayed by the business client.
  • the service client of the first user and the query client are installed in different terminal devices, and accordingly, the query credentials are provided to the query client of the first user in a preset manner, but
  • the business client sends the query certificate to the query client; or the business client parses the query certificate to obtain the hash value of the verifiable statement, and sends the obtained hash value to the query client; or, the business client displays the received query Credentials, the query client scans the query credentials presented by the business client to obtain the hash value of the verifiable claim in the query credentials.
  • the service client sends the query certificate or hash value to the query client, which can be sent through Bluetooth communication or wireless communication; the method of the service client providing the query certificate to the query client can be applied in practice. Set according to your needs.
  • the business client sends a data processing request to the business server, so that the business server requests the identity management system to create a verifiable statement based on the business data of the first user about the target business received by the business server, and passes
  • the blockchain system generates query credentials for verifiable claims, and sends the query credentials to the business client, so that the business client can obtain verifiable claims based on the query credentials, and verify the business data in the verifiable claims.
  • the blockchain system generates the query certificate, which ensures the authenticity of the query certificate and the unique association between the query certificate and the verifiable statement, avoids the risk of forgery of the query certificate or the verifiable statement, and ensures the validity of the verification.
  • FIG. 8 is a schematic flowchart of another data verification processing method provided by the embodiment of this specification; as shown in FIG. 8 , the method includes the following steps: Step S402, receiving a data processing request sent by a service client, according to the data processing request Determine the service data to be verified about the target service of the first user; optionally, receive a service processing request sent by the service client, and determine the service data included in the service processing request as the service data to be verified about the target service of the first user .
  • the service client receives the verification request sent by the service client, and obtain the associated service data from the association relationship between the saved service identifier information and the service data according to the service identification information of the first user about the target service in the verification request;
  • the data is determined as service data to be verified about the target service of the first user.
  • the data processing request may also include the second digital identity information of the first user; when the first user does not apply for the second digital identity information from the identity management system , the data processing request may also include user information of the first user, such as user name, ID number, contact information, and the like.
  • Step S404 sending a request for creating a verifiable statement to the identity management system according to the business data; the creation request is used to request the identity management system to create a verifiable statement including the business data, and the generated query credential for the verifiable statement is sent through the blockchain system To the business client; the query credential is used for the business client to obtain a verifiable statement, and to perform verification processing on the business data in the obtained verifiable statement according to the business data of the target business submitted by the first user.
  • the creation request may also include the first digital identity information and the second digital identity information.
  • Identity Information When the business server does not apply for the first digital identity information from the identity management system, and the data processing request also includes the user information of the first user, the creation request may also include the server information of the business server (such as the server ID, IP address, etc.) and user information of the first user.
  • the steps after step S404 may further include: if the verification pass information sent by the business client is received, perform business processing according to the business data, and send the business to the business client Processing result information.
  • the business server requests the identity management system to create a verifiable statement based on the determined business data of the first user about the target business, and generates a query certificate for the verifiable statement through the blockchain system, and sends the query certificate to the business
  • the client enables the business client to obtain a verifiable claim based on the query credential, and perform verification processing on the business data in the verifiable claim.
  • the blockchain system generates the query certificate, which ensures the authenticity of the query certificate and the unique association between the query certificate and the verifiable statement, avoids the risk of forgery of the query certificate or the verifiable statement, and ensures the validity of the verification.
  • FIG. 9 is a schematic flowchart of another data verification processing method provided by an embodiment of the present specification; as shown in FIG.
  • the method includes the following steps: Step S502 , in response to the query operation of the first user, according to a preset method, from The business client obtains the query certificate of the verifiable statement to be verified; wherein, the query certificate is generated by the blockchain system according to the query certificate generation request sent by the identity management system, and is generated based on the verifiable statement; in order to facilitate the verification operation for use, preferably
  • the service client and the query client are installed in different terminal devices; correspondingly, step S502 may include: in response to the query operation of the first user, scanning the query certificate displayed by the service client to obtain the to-be-verified query certificate in the query certificate.
  • the hash value of the verifiable claim of It is obtained by the business client parsing the query certificate.
  • the query certificate or hash value sent by the service client can be received by wireless communication or Bluetooth communication, which can be set by itself in practical applications.
  • Step S504 sending a query request to the identity management system according to the query credential; specifically, sending a query request to the identity management system according to the hash value of the verifiable statement.
  • Step S506 receiving the verifiable statement sent by the identity management system, and displaying the received verifiable statement; wherein, the verifiable statement is used by the first user to submit the business data in the verifiable statement and the first user displayed by the business client. Business data for matching processing.
  • displaying the verifiable statement may include: obtaining the public key corresponding to the third digital identity information according to the determined third digital identity information of the identity management system; The verifiable claim is displayed if the second signature data of .
  • the first user can match the business data in the verifiable statement displayed by the query client with the business data submitted by the first user displayed by the business client, so as to satisfy the self-verification of the first user. demand.
  • the query client obtains the query credential from the service client, and obtains the verifiable statement from the identity management system based on the query credential, so that the first user performs verification processing on the business data in the verifiable statement;
  • the query voucher is generated by the blockchain system, and the business data is the business data of the first user about the target business received by the business server.
  • the blockchain system generates the query certificate, which ensures the authenticity of the query certificate and the unique association between the query certificate and the verifiable statement, avoids the risk of forgery of the query certificate or the verifiable statement, and ensures the validity of the verification.
  • FIG. 10 is a schematic diagram of the module composition of a data verification processing device provided in an embodiment of this specification. As shown in FIG.
  • the device includes: a receiving module 601, which receives a request for creating a verifiable statement sent by a business server; wherein, The creation request is used to request to create a verifiable statement based on the business data of the first user about the target service received by the service server; the creation module 602 creates a verifiable statement according to the creation request; wherein the verifiable statement is The content data of the statement includes the business data; the sending module 603 sends a query voucher generation request to the blockchain system according to the verifiable statement, where the query voucher generation request is used to request the blockchain system to generate all the data.
  • a receiving module 601 which receives a request for creating a verifiable statement sent by a business server; wherein, The creation request is used to request to create a verifiable statement based on the business data of the first user about the target service received by the service server; the creation module 602 creates a verifiable statement according to the creation request; wherein the verifiable statement is
  • the query credential of the verifiable statement is sent to the service client corresponding to the service server of the first user; the query credential is used by the service client to obtain the verifiable statement, and according to the first user
  • the business data of the target business submitted by a user is subjected to verification processing on the business data in the obtained verifiable statement.
  • the creation module 602 if it is determined that the creation request meets a preset creation condition, creates a verifiable statement according to the creation request.
  • the apparatus further includes: a query module; the query module receives a query request sent by the service client based on the query credential, obtains the verifiable statement according to the query request, and retrieves the obtained verifiable statement. Send the verifiable statement to the service client; or, receive a query request sent by the query client based on the query credential, obtain the verifiable statement according to the query request, and send the acquired verifiable statement to The query client; wherein, the query client obtains the query credential from the service client according to a preset method.
  • the data verification processing device creates a verifiable statement based on the business data of the first user about the target business received by the business server, and generates a query certificate for the verifiable statement through the blockchain system, and the query certificate is Sent to the business client, so that the business client can obtain the verifiable claim based on the query credential, and perform verification processing on the business data in the verifiable claim.
  • the blockchain system generates the query certificate, which ensures the authenticity of the query certificate and the unique association between the query certificate and the verifiable statement, avoids the risk of forgery of the query certificate or the verifiable statement, and ensures the validity of the verification.
  • Fig. 11 is a schematic diagram of the module composition of a data verification processing device provided by an embodiment of the present specification. As shown in Fig.
  • the device includes: a receiving module 701, which receives a query credential generation request sent by an identity management system;
  • the query voucher generation request is used to request to generate a query voucher of a verifiable statement to be verified;
  • the content data of the verifiable statement includes the business data of the first user about the target business received by the business server;
  • the chain generates the query certificate of the verifiable statement according to the query certificate generation request;
  • the sending module 703 sends the query certificate to the service client corresponding to the service server of the first user;
  • the query credential is used by the service client to acquire the verifiable statement, and to perform verification processing on the acquired service data in the verifiable statement according to the service data of the target service submitted by the first user.
  • the generating module 702 invokes a first smart contract deployed in the blockchain, and generates the query credential of the verifiable statement according to the query credential generation request based on the first smart contract.
  • the generating module 702 obtains a hash value of the verifiable claim according to the query credential generation request, and generates the query credential according to the hash value.
  • the device further includes: a saving module; the saving module saves the generation record information of the query voucher in the blockchain.
  • the data verification processing device when receiving a query voucher generation request, generates a query voucher for a verifiable statement to be verified and sends it to a business client, so that the business client can obtain a verifiable statement based on the query voucher. , and perform verification processing on the business data in the verifiable statement; wherein, the business data in the verifiable statement is the business data of the first user about the target business received by the business server.
  • the blockchain system generates the query certificate, which ensures the authenticity of the query certificate and the unique association between the query certificate and the verifiable statement, avoids the risk of forgery of the query certificate or the verifiable statement, and ensures the validity of the verification.
  • Fig. 12 is a schematic diagram of the module composition of a data verification and processing device provided by the embodiment of this specification. As shown in Fig.
  • the device includes: a sending module 801, in response to a first user's business operation, sends a corresponding business server to the Send a data processing request; the data processing request is used to request the business server to create a verifiable claim through the identity management system, and generate a query credential for the verifiable claim through the blockchain system; wherein, the verifiable claim
  • the content data includes the business data of the first user about the target business; the processing module 802 performs the acquisition processing of the verifiable statement according to the received query credential, and according to the target submitted by the first user
  • the business data of the business performs verification processing on the business data in the verifiable statement.
  • the processing module 802 obtains a hash value of the verifiable claim from the query credential; sends a query request to the identity management system according to the hash value, where the query request is used to request
  • the identity management system obtains the corresponding verifiable statement according to the hash value; receives the verifiable statement sent by the identity management system; compares the business data in the verifiable statement with the obtained first verifiable statement.
  • the service data of the target service submitted by a user is subjected to matching processing.
  • the processing module 802 displays the acquired business data of the target business submitted by the first user, and provides the query credential to the query client of the first user in a preset manner;
  • the query credential is used by the query client to send a query request to the identity management system, and to display the verifiable statement sent by the identity management system, so that the first user can use the verifiable statement
  • the business data is matched with the displayed business data.
  • the data verification processing device sends a data processing request to the business server, so that the business server requests the identity management system to create a verifiable statement based on the business data of the first user about the target business received by the business server , and generate the query certificate of the verifiable statement through the blockchain system, and send the query certificate to the business client, so that the business client can obtain the verifiable statement based on the query certificate, and verify the business data in the verifiable statement.
  • the blockchain system generates the query certificate, which ensures the authenticity of the query certificate and the unique association between the query certificate and the verifiable statement, avoids the risk of forgery of the query certificate or the verifiable statement, and ensures the validity of the verification.
  • Fig. 13 is a schematic diagram of the module composition of a data verification and processing device provided by an embodiment of this specification. As shown in Fig. 13, the device includes: a receiving module 901, which receives a data processing request sent by a service client, and processes the data according to the data processing request.
  • the sending module 902 sends a request for creating a verifiable statement to the identity management system according to the service data, where the creation request is used to request the identity management system to create a statement including: The verifiable statement of the business data, and the generated query credential of the verifiable statement is sent to the business client through the blockchain system; the query credential is used by the business client to obtain the verifiable statement statement, and perform verification processing on the acquired business data in the verifiable statement according to the business data of the target business submitted by the first user.
  • the receiving module 901 further receives the query voucher sent by the blockchain system or the identity management system, and sends the query voucher to the service client.
  • the business server requests the identity management system to create a verifiable statement based on the determined business data of the first user about the target business, and generates a query certificate for the verifiable statement through the blockchain system,
  • the query credential is sent to the business client, so that the business client can obtain a verifiable statement based on the query credential, and perform verification processing on the business data in the verifiable statement.
  • the blockchain system generates the query certificate, which ensures the authenticity of the query certificate and the unique association between the query certificate and the verifiable statement, avoids the risk of forgery of the query certificate or the verifiable statement, and ensures the validity of the verification.
  • FIG. 14 is a schematic diagram of the module composition of a data verification processing apparatus provided in the embodiment of this specification. As shown in FIG.
  • the apparatus includes: an acquisition module 1001 , in response to a query operation of a first user, according to a preset method, from the service The client obtains the query certificate of the verifiable statement to be verified; wherein, the query certificate is generated by the blockchain system according to the query certificate generation request sent by the identity management system, and is generated based on the verifiable statement; the sending module 1002, according to the The query credential sends a query request to the identity management system; the receiving module 1003 receives the verifiable statement sent by the identity management system; the presentation module 1004 displays the verifiable statement; the verifiable statement is used for all The first user performs matching processing between the service data in the verifiable statement and the service data submitted by the first user displayed by the service client.
  • the obtaining module 1001 scans the query credential displayed by the service client to obtain the hash value of the verifiable statement; or, receives the hash value sent by the service client, The hash value is obtained by parsing the query certificate by the service client; or, receiving the query certificate sent by the service client, and parsing the query certificate to obtain the hash value of the verifiable statement; the sending Module 1002: Send a query request to the identity management system according to the hash value.
  • the data verification processing apparatus obtains the query credential from the service client, and obtains the verifiable statement from the identity management system based on the query credential, so that the first user can perform verification processing on the business data in the verifiable statement ; wherein, the query voucher is generated through the blockchain system, and the business data is the business data of the first user about the target business received by the business server.
  • the blockchain system generates the query certificate, which ensures the authenticity of the query certificate and the unique association between the query certificate and the verifiable statement, avoids the risk of forgery of the query certificate or the verifiable statement, and ensures the validity of the verification.
  • the embodiments of this specification also provide a data verification processing device, which is used to execute the above-mentioned data verification processing method, as shown in FIG. 15 .
  • a schematic structural diagram of a data verification processing device provided by an embodiment of the specification.
  • the data verification processing devices may vary greatly due to different configurations or performances, and may include one or more processors 11 and a memory 12, and the memory 12 may store one or more storage applications program or data. Among them, the memory 12 may be short-term storage or persistent storage.
  • the application program stored in memory 12 may include one or more modules (not shown), each module may include a series of computer-executable instructions in a verification processing device for data. Still further, the processor 11 may be arranged to communicate with the memory 12 to execute a series of computer-executable instructions in the memory 12 on the verification processing device of the data.
  • the data verification processing device may also include one or more power supplies 13 , one or more wired or wireless network interfaces 14 , one or more input and output interfaces 15 , one or more keyboards 16 and the like.
  • the data verification processing device includes a memory, and one or more programs, wherein the one or more programs are stored in the memory, and the one or more programs may include one or more modules, And each module may include a series of computer-executable instructions in a verification processing device for data, and the one or more programs configured to be executed by one or more processors include computer-executable instructions for: receiving The creation request of the verifiable statement sent by the business server; wherein, the creation request is used to request the creation of a verifiable statement based on the business data of the first user about the target business received by the business server; create a verifiable statement according to the creation request A verifiable claim; wherein, the content data of the verifiable claim includes the business data; according to the verifiable claim, a query credential generation request is sent to the blockchain system, and the query credential generation request is used to request the block
  • the chain system sends the generated query credential of the verifiable statement to the business client of the first user corresponding
  • the creating a verifiable claim according to the creation request includes: if it is determined that the creation request meets a preset creation condition, creating a verifiable claim according to the creation request. .
  • the method further includes: receiving a query sent by the business client based on the query voucher. request, acquire the verifiable statement according to the query request, and send the acquired verifiable statement to the service client; Request to acquire the verifiable statement, and send the acquired verifiable statement to the query client; wherein the query client acquires the query credential from the service client according to a preset method.
  • the data verification processing device creates a verifiable statement based on the business data of the first user about the target business received by the business server, and generates a query certificate for the verifiable statement through the blockchain system, and the query certificate is Sent to the business client, so that the business client can obtain the verifiable claim based on the query credential, and perform verification processing on the business data in the verifiable claim.
  • the blockchain system generates the query certificate, which ensures the authenticity of the query certificate and the unique association between the query certificate and the verifiable statement, avoids the risk of forgery of the query certificate or the verifiable statement, and ensures the validity of the verification.
  • the data verification processing device includes a memory, and one or more programs, wherein the one or more programs are stored in the memory, and the one or more programs may include one or more modules , and each module may include a series of computer-executable instructions in a verification processing device for data, and the one or more programs configured to be executed by one or more processors include computer-executable instructions for performing the following: Receive a query credential generation request sent by the identity management system; wherein the query credential generation request is used to request the generation of a query credential for a verifiable statement to be verified; the content data of the verifiable statement includes the first received by the business server.
  • User's business data about the target business generate the query certificate of the verifiable statement based on the query certificate generation request based on the blockchain; send the query certificate to the first user and the business server Corresponding service client; the query credential is used by the service client to obtain the verifiable statement, and pair the obtained verifiable statement according to the service data of the target service submitted by the first user.
  • Business data is validated.
  • generating the query credential of the verifiable statement based on the query credential generation request based on the blockchain may include: invoking a first smart contract deployed in the blockchain, based on The first smart contract generates the query credential for the verifiable claim according to the query credential generation request.
  • the generating the query credential of the verifiable claim according to the query credential generation request includes: obtaining the verifiable claim according to the query credential generation request. a hash value, and the query credential is generated according to the hash value.
  • the method when the computer-executable instruction is executed, after generating the query credential of the verifiable statement according to the query credential generation request based on the blockchain, the method further includes: recording the generation of the inquiry credential. Information is saved to the blockchain.
  • the data verification processing device when receiving a query credential generation request, generates a query credential for a verifiable statement to be verified and sends it to a business client, so that the business client can obtain a verifiable statement based on the query credential , and perform verification processing on the business data in the verifiable statement; wherein, the business data in the verifiable statement is the business data of the first user about the target business received by the business server.
  • the blockchain system generates the query certificate, which ensures the authenticity of the query certificate and the unique association between the query certificate and the verifiable statement, avoids the risk of forgery of the query certificate or the verifiable statement, and ensures the validity of the verification.
  • the data verification processing device includes a memory, and one or more programs, wherein the one or more programs are stored in the memory, and the one or more programs may include one or more modules , and each module may include a series of computer-executable instructions in a verification processing device for data, and the one or more programs configured to be executed by one or more processors include computer-executable instructions for performing the following:
  • a data processing request is sent to the corresponding business server; the data processing request is used to request the business server to create a verifiable statement through the identity management system, and generate all data through the blockchain system.
  • the query credential of the verifiable statement wherein the content data of the verifiable statement includes the business data of the first user about the target service; the acquisition process of the verifiable statement is performed according to the received query credential, and Verification processing is performed on the business data in the verifiable statement according to the business data of the target business submitted by the first user.
  • Verifying the business data in the verifiable statement includes: obtaining a hash value of the verifiable statement from the query credential; sending a query request to the identity management system according to the hash value, the The query request is used to request the identity management system to obtain the corresponding verifiable statement according to the hash value; receive the verifiable statement sent by the identity management system; compare the business data in the verifiable statement with the verifiable statement.
  • the acquired service data of the target service submitted by the first user is subjected to matching processing.
  • Verifying the business data in the verifiable statement includes: displaying the acquired business data of the target business submitted by the first user, and providing the query credential to the first user in a preset manner the query client; the query credential is used for the query client to send a query request to the identity management system, and to display the verifiable statement sent by the identity management system, so that the first user can use the The business data in the verifiable statement is matched with the displayed business data.
  • the data verification processing device sends a data processing request to the business server, so that the business server requests the identity management system to create a verifiable statement based on the business data of the first user about the target business received by the business server , and generate the query certificate of the verifiable statement through the blockchain system, and send the query certificate to the business client, so that the business client can obtain the verifiable statement based on the query certificate, and verify the business data in the verifiable statement.
  • the blockchain system generates the query certificate, which ensures the authenticity of the query certificate and the unique association between the query certificate and the verifiable statement, avoids the risk of forgery of the query certificate or the verifiable statement, and ensures the validity of the verification.
  • the data verification processing device includes a memory, and one or more programs, wherein the one or more programs are stored in the memory, and the one or more programs may include one or more modules , and each module may include a series of computer-executable instructions in a verification processing device for data, and the one or more programs configured to be executed by one or more processors include computer-executable instructions for performing the following: Receive the data processing request sent by the service client, and determine the service data to be verified about the target service of the first user according to the data processing request; send a request for creating a verifiable statement to the identity management system according to the service data, and the creation The request is used to request the identity management system to create a verifiable statement including the business data, and send the generated query credential of the verifiable statement to the business client through the blockchain system; Obtain the verifiable statement from the service client, and perform verification processing on the business data in the obtained verifiable statement according to the business data of the target service submitted by the first user.
  • the method further includes: receiving a transmission from the blockchain system or the identity management system. the query voucher; send the query voucher to the service client.
  • the business server requests the identity management system to create a verifiable statement based on the determined business data of the first user about the target business, and generates a query certificate for the verifiable statement through the blockchain system,
  • the query credential is sent to the business client, so that the business client can obtain a verifiable statement based on the query credential, and perform verification processing on the business data in the verifiable statement.
  • the blockchain system generates the query certificate, which ensures the authenticity of the query certificate and the unique association between the query certificate and the verifiable statement, avoids the risk of forgery of the query certificate or the verifiable statement, and ensures the validity of the verification.
  • the data verification processing device includes a memory, and one or more programs, wherein the one or more programs are stored in the memory, and the one or more programs may include one or more modules , and each module may include a series of computer-executable instructions in a verification processing device for data, and the one or more programs configured to be executed by one or more processors include computer-executable instructions for performing the following:
  • the query certificate of the verifiable statement to be verified is obtained from the business client according to a preset method; wherein, the query certificate is generated by the blockchain system according to the query certificate sent by the identity management system.
  • Request generated based on the verifiable statement; sending a query request to the identity management system according to the query credential; receiving the verifiable statement sent by the identity management system, displaying the verifiable statement; the verifiable statement for the first user to perform matching processing between the service data in the verifiable statement and the service data submitted by the first user displayed by the service client.
  • the obtaining the query credential of the verifiable statement to be verified from the business client according to a preset manner includes: scanning the query credential displayed by the business client, and obtaining the query credential.
  • the terminal sends the query credential, and parses the query credential to obtain the hash value of the verifiable claim;
  • the sending a query request to the identity management system according to the query credential includes: sending a query request to the identity management system according to the hash value.
  • the identity management system sends a query request.
  • the data verification processing device obtains the query credential from the service client, and obtains the verifiable statement from the identity management system based on the query credential, so that the first user can perform verification processing on the business data in the verifiable statement ; wherein, the query voucher is generated through the blockchain system, and the business data is the business data of the first user about the target business received by the business server.
  • the blockchain system generates the query certificate, which ensures the authenticity of the query certificate and the unique association between the query certificate and the verifiable statement, avoids the risk of forgery of the query certificate or the verifiable statement, and ensures the validity of the verification.
  • the embodiments of this specification also provide a storage medium for storing computer-executable instructions.
  • the storage medium can For U disk, optical disk, hard disk, etc.
  • the creation request uses creating a verifiable statement based on the business data of the first user about the target service received by the business server; creating a verifiable statement according to the creation request; wherein, the content data of the verifiable statement includes the business data ;
  • the user's service client corresponding to the service server the query credential is used by the service client to obtain the verifi
  • the creating a verifiable statement according to the creation request includes: if it is determined that the creation request meets a preset creation condition, then creating a verifiable statement according to the creation request. Create a verifiable claim using the Create Request described above.
  • the method further includes: receiving the service client based on the For the query request sent by the query credential, obtain the verifiable statement according to the query request, and send the acquired verifiable statement to the service client; or, receive the verifiable statement sent by the query client based on the query credential.
  • query request obtain the verifiable statement according to the query request, and send the obtained verifiable statement to the query client; wherein the query client obtains the verifiable statement from the service client according to a preset method the query certificate.
  • a verifiable statement is created based on the business data of the first user about the target business received by the business server, and a verifiable statement is generated through the blockchain system.
  • the query credential of the verification statement is sent to the business client, so that the business client can obtain the verifiable statement based on the query credential, and perform verification processing on the business data in the verifiable statement.
  • the blockchain system generates the query certificate, which ensures the authenticity of the query certificate and the unique association between the query certificate and the verifiable statement, avoids the risk of forgery of the query certificate or the verifiable statement, and ensures the validity of the verification.
  • the storage medium may be a U disk, an optical disk, a hard disk, etc., when the computer-executable instructions stored in the storage medium are executed by the processor, the following process can be implemented: receiving the query credential sent by the identity management system.
  • the query credential generation request is used to request the generation of a query credential for a verifiable statement to be verified;
  • the content data of the verifiable statement includes the business data of the first user about the target business received by the business server;
  • the query credential is used by the service client to acquire the verifiable statement, and to perform verification processing on the acquired service data in the verifiable statement according to the service data of the target service submitted by the first user.
  • generating the query credential of the verifiable claim based on the blockchain based on the query credential generation request includes: calling a block The first smart contract deployed in the chain generates the query credential of the verifiable claim according to the query credential generation request based on the first smart contract.
  • the generating the query credential of the verifiable claim according to the query credential generation request includes: generating a request according to the query credential A hash value of the verifiable claim is obtained, and the query credential is generated according to the hash value.
  • the method further includes: The generation record information of the query voucher is stored in the blockchain.
  • a query voucher generation request is received
  • a query voucher of the verifiable claim to be verified is generated and sent to the business client, so that the business client
  • the terminal can obtain the verifiable statement based on the query credential, and perform verification processing on the business data in the verifiable statement; wherein, the business data in the verifiable statement is the business data of the first user about the target business received by the business server.
  • the blockchain system generates the query certificate, which ensures the authenticity of the query certificate and the unique association between the query certificate and the verifiable statement, avoids the risk of forgery of the query certificate or the verifiable statement, and ensures the validity of the verification.
  • the storage medium may be a USB flash drive, an optical disc, a hard disk, etc.
  • the following process can be implemented: In response to the business operation of the first user; , send a data processing request to the corresponding business server; the data processing request is used to request the business server to create a verifiable statement through the identity management system, and generate a query credential for the verifiable statement through the blockchain system;
  • the content data of the verifiable statement includes the business data of the first user about the target service; the acquisition process of the verifiable statement is performed according to the received query credential;
  • the service data of the target service performs verification processing on the service data in the verifiable statement.
  • the process of acquiring the verifiable statement is performed according to the received query credential, and the process of acquiring the verifiable statement is performed according to the received query credential, and the process of acquiring the verifiable statement is performed according to the received query credential and the
  • the business data of the target business is used to verify the business data in the verifiable statement, including: obtaining the hash value of the verifiable statement from the query credential;
  • the system sends a query request, the query request is used to request the identity management system to obtain the corresponding verifiable statement according to the hash value; receive the verifiable statement sent by the identity management system;
  • the business data in the verification statement is matched with the obtained business data of the target business submitted by the first user.
  • the process of acquiring the verifiable statement is performed according to the received query credential, and the process of acquiring the verifiable statement is performed according to the received query credential, and the process of acquiring the verifiable statement is performed according to the received query credential and the Verifying the business data in the verifiable statement with the business data of the target business, including: displaying the obtained business data of the target business submitted by the first user, and storing the query voucher in a preset manner provided to the query client of the first user; the query credential is used by the query client to send a query request to the identity management system, and to display the verifiable statement sent by the identity management system, so that all The first user performs matching processing between the business data in the verifiable statement and the displayed business data.
  • the service server When the computer-executable instructions stored in the storage medium provided by the embodiments of this specification are executed by the processor, by sending a data processing request to the service server, the service server requests the identity management system based on the information about the first user received by the service server.
  • the business data of the target business creates a verifiable statement, and generates a query certificate for the verifiable statement through the blockchain system, and sends the query certificate to the business client, so that the business client can obtain the verifiable statement based on the query certificate, and verify the verifiable statement.
  • the business data in the statement is validated.
  • the blockchain system generates the query certificate, which ensures the authenticity of the query certificate and the unique association between the query certificate and the verifiable statement, avoids the risk of forgery of the query certificate or the verifiable statement, and ensures the validity of the verification.
  • the storage medium may be a USB flash drive, an optical disk, a hard disk, etc.
  • the following process can be implemented: receiving the data sent by the service client to process. request, according to the data processing request, determine the business data to be verified about the target business of the first user; send a request for creating a verifiable statement to the identity management system according to the business data, where the creation request is used to request the identity management system
  • the system creates a verifiable statement including the business data, and sends the generated query credential for the verifiable statement to the business client through the blockchain system; the query credential is used by the business client to obtain all the information.
  • the verifiable statement is obtained, and the business data in the acquired verifiable statement is verified according to the business data of the target business submitted by the first user.
  • the method further includes: receiving the blockchain system. or the query voucher sent by the identity management system; sending the query voucher to the service client.
  • the computer-executable instructions stored in the storage medium provided by the embodiments of this specification request the identity management system to create a verifiable statement based on the determined business data of the first user about the target business, and generate a verifiable statement through the blockchain system.
  • the query credential of the verification statement is sent to the business client, so that the business client can obtain the verifiable statement based on the query credential, and perform verification processing on the business data in the verifiable statement.
  • the blockchain system generates the query certificate, which ensures the authenticity of the query certificate and the unique association between the query certificate and the verifiable statement, avoids the risk of forgery of the query certificate or the verifiable statement, and ensures the validity of the verification.
  • the storage medium can be a USB flash drive, an optical disk, a hard disk, etc.
  • the following process can be implemented: in response to the query operation of the first user, the computer-executable instructions from the business customer are sent according to a preset method.
  • the terminal obtains the query certificate of the verifiable statement to be verified; wherein, the query certificate is generated by the blockchain system according to the query certificate generation request sent by the identity management system, and is generated based on the verifiable statement;
  • the identity management system sends a query request; receives the verifiable statement sent by the identity management system, and displays the verifiable statement; the verifiable statement is used by the first user to use the service in the verifiable statement
  • the data is matched with the service data presented by the service client and submitted by the first user.
  • the obtaining the query credential of the verifiable claim to be verified from the service client according to a preset method includes: scanning the service client to display the query credentials. obtain the hash value of the verifiable statement; or, receive the hash value sent by the service client, where the hash value is obtained by the service client parsing the query certificate obtaining; or, receiving the query credential sent by the service client, and parsing the query credential to obtain the hash value of the verifiable claim; the sending a query request to the identity management system according to the query credential includes: according to the The hash value sends a query request to the identity management system.
  • the first user obtains the query credential from the service client and obtains the verifiable claim from the identity management system based on the query credential, so that the first user can The business data in the verification statement is verified; wherein, the query certificate is generated by the blockchain system, and the business data is the business data of the first user about the target business received by the business server.
  • the blockchain system generates the query certificate, which ensures the authenticity of the query certificate and the unique association between the query certificate and the verifiable statement, avoids the risk of forgery of the query certificate or the verifiable statement, and ensures the validity of the verification.
  • a Programmable Logic Device (such as a Field Programmable Gate Array (FPGA)) is an integrated circuit whose logic function is determined by user programming of the device.
  • HDL Hardware Description Language
  • ABEL Advanced Boolean Expression Language
  • AHDL Altera Hardware Description Language
  • HDCal Joint CHDL
  • JHDL Java Hardware Description Language
  • Lava Lava
  • Lola MyHDL
  • PALASM RHDL
  • VHDL Very-High-Speed Integrated Circuit Hardware Description Language
  • Verilog Verilog
  • the controller may be implemented in any suitable manner, for example, the controller may take the form of, for example, a microprocessor or processor and a computer readable medium storing computer readable program code (eg software or firmware) executable by the (micro)processor , logic gates, switches, application specific integrated circuits (ASICs), programmable logic controllers and embedded microcontrollers, examples of controllers include but are not limited to the following microcontrollers: ARC 625D, Atmel AT91SAM, Microchip PIC18F26K20 and Silicon Labs C8051F320, the memory controller can also be implemented as part of the control logic of the memory.
  • ARC 625D ARC 625D
  • Atmel AT91SAM Microchip PIC18F26K20
  • Silicon Labs C8051F320 Silicon Labs
  • the controller in addition to implementing the controller in the form of pure computer readable program code, the controller can be implemented as logic gates, switches, application specific integrated circuits, programmable logic controllers and embedded devices by logically programming the method steps.
  • the same function can be realized in the form of a microcontroller, etc. Therefore, such a controller can be regarded as a hardware component, and the devices included therein for realizing various functions can also be regarded as a structure within the hardware component. Or even, the means for implementing various functions can be regarded as both software modules implementing the methods and structures within hardware components.
  • a typical implementation device is a computer.
  • the computer may be, for example, a personal computer, laptop computer, cellular phone, camera phone, smart phone, personal digital assistant, media player, navigation device, email device, game console, tablet computer, wearable device or A combination of any of these devices.
  • embodiments of the present specification may be provided as a method, a system or a computer program product. Accordingly, embodiments of this specification may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present specification may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, etc.) embodying computer-usable program code.
  • computer-usable storage media including, but not limited to, disk storage, CD-ROM, optical storage, etc.
  • These computer program instructions may also be stored in a computer-readable memory capable of directing a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory result in an article of manufacture comprising instruction means, the instructions
  • the apparatus implements the functions specified in the flow or flow of the flowcharts and/or the block or blocks of the block diagrams.
  • a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
  • processors CPUs
  • input/output interfaces network interfaces
  • memory volatile and non-volatile memory
  • Memory may include forms of non-persistent memory, random access memory (RAM) and/or non-volatile memory in computer readable media, such as read only memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
  • RAM random access memory
  • ROM read only memory
  • flash RAM flash memory
  • Computer-readable media includes both persistent and non-permanent, removable and non-removable media, and storage of information may be implemented by any method or technology.
  • the information may be computer readable instructions, data structures, modules of programs, or other data.
  • Examples of computer storage media include, but are not limited to, phase-change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), read only memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), Flash Memory or other memory technology, Compact Disc Read Only Memory (CD-ROM), Digital Versatile Disc (DVD) or other optical storage, Magnetic tape cartridges, magnetic tape disk storage or other magnetic storage devices or any other non-transmission medium that can be used to store information that can be accessed by a computing device.
  • computer-readable media does not include transitory computer-readable media, such as modulated data signals and carrier waves.
  • Embodiments of the specification may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer.
  • program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types.
  • Embodiments of the specification may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network.
  • program modules may be located in both local and remote computer storage media including storage devices.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

本说明书实施例提供了一种数据的验证处理方法、装置及设备,其中方法包括:身份管理系统接收业务服务端发送的可验证声明的创建请求,根据创建请求创建可验证声明,该可验证声明的内容数据包括业务服务端接收到的第一用户关于目标业务的业务数据;根据可验证声明向区块链系统发送查询凭证生成请求;区块链系统将生成的可验证声明的查询凭证发送给第一用户的与业务服务端对应的业务客户端;业务客户端根据接收到的查询凭证获取可验证声明,并根据第一用户提交的目标业务的业务数据对获取的可验证声明中的业务数据进行验证处理。

Description

数据验证处理的方法、装置及设备 技术领域
本文件涉及数据处理技术领域,尤其涉及用于数据验证处理的方法、装置及设备。
背景技术
随着互联网技术的不断发展,业务的办理模式逐渐由线下办理转变为线上办理。该业务办理模式的转变给用户和业务提供方均带来了便利,但同时也存在安全隐患,如用户的业务数据在向业务提供方传输的过程中,可能被窃取者窃取并篡改,而业务提供方基于接收到的被篡改的业务数据进行业务处理,极易给用户造成损失。
发明内容
本说明书实施例提供了一种数据的验证处理方法。该方法包括接收业务服务端发送的可验证声明的创建请求。其中,所述创建请求用于请求基于所述业务服务端接收到的第一用户关于目标业务的业务数据创建可验证声明。根据所述创建请求创建可验证声明。其中,所述可验证声明的内容数据包括所述业务数据。根据所述可验证声明向区块链系统发送查询凭证生成请求。所述查询凭证生成请求用于请求所述区块链系统将生成的所述可验证声明的查询凭证发送给所述第一用户的与所述业务服务端对应的业务客户端。所述查询凭证用于所述业务客户端获取所述可验证声明,并根据所述第一用户提交的所述目标业务的业务数据对获取的所述可验证声明中的业务数据进行验证处理。
本说明书实施例提供了一种数据的验证处理方法。该方法包括接收身份管理系统发送的查询凭证生成请求。其中,所述查询凭证生成请求用于请求生成待验证的可验证声明的查询凭证。所述可验证声明的内容数据包括业务服务端接收到的第一用户关于目标业务的业务数据。基于区块链根据所述查询凭证生成请求生成所述可验证声明的所述查询凭证。将所述查询凭证发送给所述第一用户的与所述业务服务端对应的业务客户端。所述查询凭证用于所述业务客户端获取所述可验证声明,并根据所述第一用户提交的所述目标业务的业务数据对获取的所述可验证声明中的业务数据进行验证处理。
本说明书实施例提供了一种数据的验证处理方法。该方法包括响应于第一用户的业务操作,向对应的业务服务端发送数据处理请求。所述数据处理请求用于请求所述业务服务端通过身份管理系统创建可验证声明,并通过区块链系统生成所述可验证声明的查询凭证。其中,所述可验证声明的内容数据包括所述第一用户关于目标业务的业务数据。根据接收到的所述查询凭证进行所述可验证声明的获取处理。以及根据所述第一用户提交的所述目标业务的业务数据对所述可验证声明中的业务数据进行验证处理。
本说明书实施例提供了一种数据的验证处理方法。该方法包括接收业务客户端发送的数据处理请求。根据所述数据处理请求确定第一用户关于目标业务的待验证的业务数据。根据所述业务数据向身份管理系统发送可验证声明的创建请求。所述创建请求用于请求所述身份管理系统创建包括所述业务数据的可验证声明,并通过区块链系统将生成的所述可验证声明的查询凭证发送给所述业务客户端。所述查询凭证用于所述业务客户端获取所述可验证声明,并根据第一用户提交的所述目标业务的业务数据对获取的所述可验证声明中的业务数据进行验证处理。
本说明书实施例提供了一种数据的验证处理方法。该方法包括响应于第一用户的查询操作,根据预设方式从业务客户端获取待验证的可验证声明的查询凭证。其中,所述查询凭证由区块链系统根据身份管理系统发送的查询凭证生成请求,基于所述可验证声明所生成。根据所述查询凭证向所述身份管理系统发送查询请求。接收所述身份管理系统发送的所述可验证声明,展示所述可验证声明。可验证声明用于第一用户将可验证声明中的业务数据与业务客户端展示的第一用户提交的业务数据进行匹配处理。
本说明书实施例提供了一种数据的验证处理装置。该装置包括接收模块,接收业务服务端发送的可验证声明的创建请求。其中,所述创建请求用于请求基于所述业务服务端接收到的第一用户关于目标业务的业务数据创建可验证声明。该装置还包括创建模块, 根据所述创建请求创建可验证声明。其中,所述可验证声明的内容数据包括所述业务数据。该装置还包括发送模块,根据所述可验证声明向区块链系统发送查询凭证生成请求。所述查询凭证生成请求用于请求所述区块链系统将生成的所述可验证声明的查询凭证发送给所述第一用户的与所述业务服务端对应的业务客户端。所述查询凭证用于所述业务客户端获取所述可验证声明,并根据所述第一用户提交的所述目标业务的业务数据对获取的所述可验证声明中的业务数据进行验证处理。
本说明书实施例提供了一种数据的验证处理装置。该装置包括接收模块,接收身份管理系统发送的查询凭证生成请求。其中,所述查询凭证生成请求用于请求生成待验证的可验证声明的查询凭证。所述可验证声明的内容数据包括业务服务端接收到的第一用户关于目标业务的业务数据。该装置还包括生成模块,基于区块链根据所述查询凭证生成请求生成所述可验证声明的所述查询凭证。该装置还包括发送模块,将所述查询凭证发送给所述第一用户的与所述业务服务端对应的业务客户端。所述查询凭证用于所述业务客户端获取所述可验证声明,并根据所述第一用户提交的所述目标业务的业务数据对获取的所述可验证声明中的业务数据进行验证处理。
本说明书实施例提供了一种数据的验证处理装置。该装置包括发送模块,响应于第一用户的业务操作,向对应的业务服务端发送数据处理请求。所述数据处理请求用于请求所述业务服务端通过身份管理系统创建可验证声明,并通过区块链系统生成所述可验证声明的查询凭证。其中,所述可验证声明的内容数据包括所述第一用户关于目标业务的业务数据。该装置还包括处理模块,根据接收到的所述查询凭证进行所述可验证声明的获取处理。以及根据所述第一用户提交的所述目标业务的业务数据对所述可验证声明中的业务数据进行验证处理。
本说明书实施例提供了一种数据的验证处理装置。该装置包括接收模块,接收业务客户端发送的数据处理请求,根据所述数据处理请求确定第一用户关于目标业务的待验证的业务数据。该装置还包括发送模块,根据所述业务数据向身份管理系统发送可验证声明的创建请求。所述创建请求用于请求所述身份管理系统创建包括所述业务数据的可验证声明,并通过区块链系统将生成的所述可验证声明的查询凭证发送给所述业务客户端。所述查询凭证用于所述业务客户端获取所述可验证声明,并根据第一用户提交的所述目标业务的业务数据对获取的所述可验证声明中的业务数据进行验证处理。
本说明书实施例提供了一种数据的验证处理装置。该装置包括获取模块,响应于第一用户的查询操作,根据预设方式从业务客户端获取待验证的可验证声明的查询凭证。其中,所述查询凭证由区块链系统根据身份管理系统发送的查询凭证生成请求,基于所述可验证声明所生成。该装置还包括发送模块,根据所述查询凭证向所述身份管理系统发送查询请求。该装置还包括接收模块,接收所述身份管理系统发送的所述可验证声明。该装置还包括展示模块,展示所述可验证声明。所述可验证声明用于所述第一用户将所述可验证声明中的业务数据与所述业务客户端展示的所述第一用户提交的业务数据进行匹配处理。
本说明书实施例提供了一种数据的验证处理设备。该设备包括处理器。该设备还包括被安排成存储计算机可执行指令的存储器。所述计算机可执行指令在被执行时使所述处理器接收业务服务端发送的可验证声明的创建请求。其中,所述创建请求用于请求基于所述业务服务端接收到的第一用户关于目标业务的业务数据创建可验证声明。根据所述创建请求创建可验证声明。其中,所述可验证声明的内容数据包括所述业务数据。根据所述可验证声明向区块链系统发送查询凭证生成请求。所述查询凭证生成请求用于请求所述区块链系统将生成的所述可验证声明的查询凭证发送给所述第一用户的与所述业务服务端对应的业务客户端。所述查询凭证用于所述业务客户端获取所述可验证声明,并根据所述第一用户提交的所述目标业务的业务数据对获取的所述可验证声明中的业务数据进行验证处理。
本说明书实施例提供了一种数据的验证处理设备。该设备包括处理器。该设备还包括被安排成存储计算机可执行指令的存储器。所述计算机可执行指令在被执行时使所述处理器接收身份管理系统发送的查询凭证生成请求。其中,所述查询凭证生成请求用于请求生成待验证的可验证声明的查询凭证。所述可验证声明的内容数据包括业务服务端接收到的第一用户关于目标业务的业务数据。基于区块链根据所述查询凭证生成请求生成所述可验证声明的所述查询凭证。将所述查询凭证发送给所述第一用户的与所述业务服务端对应的业务客户端。所述查询凭证用于所述业务客户端获取所述可验证声明,并根据所述第一用户提交的所述目标业务的业务数据对获取的所述可验证声明中的业务数据进行验证处理。
本说明书实施例提供了一种数据的验证处理设备。该设备包括处理器。该设备还包括被安排成存储计算机可执行指令的存储器。所述计算机可执行指令在被执行时使所述处理器响应于第一用户的业务操作,向对应的业务服务端发送数据处理请求。所述数据处理请求用于请求所述业务服务端通过身份管理系统创建可验证声明,并通过区块链系统生成所述可验证声明的查询凭证。其中,所述可验证声明的内容数据包括所述第一用户关于目标业务的业务数据。根据接收到的所述查询凭证进行所述可验证声明的获取处理。以及根据所述第一用户提交的所述目标业务的业务数据对所述可验证声明中的业务数据进行验证处理。
本说明书实施例提供了一种数据的验证处理设备。该设备包括处理器。该设备还包括被安排成存储计算机可执行指令的存储器。所述计算机可执行指令在被执行时使所述处理器接收业务客户端发送的数据处理请求。根据所述数据处理请求确定第一用户关于目标业务的待验证的业务数据。根据所述业务数据向身份管理系统发送可验证声明的创建请求。所述创建请求用于请求所述身份管理系统创建包括所述业务数据的可验证声明,并通过区块链系统将生成的所述可验证声明的查询凭证发送给所述业务客户端。所述查询凭证用于所述业务客户端获取所述可验证声明,并根据第一用户提交的所述目标业务的业务数据对获取的所述可验证声明中的业务数据进行验证处理。
本说明书实施例提供了一种数据的验证处理设备。该设备包括处理器。该设备还包括被安排成存储计算机可执行指令的存储器。所述计算机可执行指令在被执行时使所述处理器响应于第一用户的查询操作,根据预设方式从业务客户端获取待验证的可验证声明的查询凭证。其中,所述查询凭证由区块链系统根据身份管理系统发送的查询凭证生成请求,基于所述可验证声明所生成。根据所述查询凭证向所述身份管理系统发送查询请求。接收所述身份管理系统发送的所述可验证声明,展示所述可验证声明。可验证声明用于第一用户将可验证声明中的业务数据与业务客户端展示的第一用户提交的业务数据进行匹配处理。
本说明书实施例提供了一种存储介质。该存储介质用于存储计算机可执行指令。所述计算机可执行指令在被处理器执行时接收业务服务端发送的可验证声明的创建请求。其中,所述创建请求用于请求基于所述业务服务端接收到的第一用户关于目标业务的业务数据创建可验证声明。根据所述创建请求创建可验证声明。其中,所述可验证声明的内容数据包括所述业务数据。根据所述可验证声明向区块链系统发送查询凭证生成请求。所述查询凭证生成请求用于请求所述区块链系统将生成的所述可验证声明的查询凭证发送给所述第一用户的与所述业务服务端对应的业务客户端。所述查询凭证用于所述业务客户端获取所述可验证声明,并根据所述第一用户提交的所述目标业务的业务数据对获取的所述可验证声明中的业务数据进行验证处理。
本说明书实施例提供了一种存储介质。该存储介质用于存储计算机可执行指令。所述计算机可执行指令在被处理器执行时接收身份管理系统发送的查询凭证生成请求。其中,所述查询凭证生成请求用于请求生成待验证的可验证声明的查询凭证。所述可验证声明的内容数据包括业务服务端接收到的第一用户关于目标业务的业务数据。基于区块 链根据所述查询凭证生成请求生成所述可验证声明的所述查询凭证。将所述查询凭证发送给所述第一用户的与所述业务服务端对应的业务客户端。所述查询凭证用于所述业务客户端获取所述可验证声明,并根据所述第一用户提交的所述目标业务的业务数据对获取的所述可验证声明中的业务数据进行验证处理。
本说明书实施例提供了一种存储介质。该存储介质用于存储计算机可执行指令。所述计算机可执行指令在被处理器执行时响应于第一用户的业务操作,向对应的业务服务端发送数据处理请求。所述数据处理请求用于请求所述业务服务端通过身份管理系统创建可验证声明,并通过区块链系统生成所述可验证声明的查询凭证。其中,所述可验证声明的内容数据包括所述第一用户关于目标业务的业务数据。根据接收到的所述查询凭证进行所述可验证声明的获取处理。以及根据所述第一用户提交的所述目标业务的业务数据对所述可验证声明中的业务数据进行验证处理。
本说明书实施例提供了一种存储介质。该存储介质用于存储计算机可执行指令。所述计算机可执行指令在被处理器执行时接收业务客户端发送的数据处理请求。根据所述数据处理请求确定第一用户关于目标业务的待验证的业务数据。根据所述业务数据向身份管理系统发送可验证声明的创建请求。所述创建请求用于请求所述身份管理系统创建包括所述业务数据的可验证声明,并通过区块链系统将生成的所述可验证声明的查询凭证发送给所述业务客户端。所述查询凭证用于所述业务客户端获取所述可验证声明,并根据第一用户提交的所述目标业务的业务数据对获取的所述可验证声明中的业务数据进行验证处理。
本说明书实施例提供了一种存储介质。该存储介质用于存储计算机可执行指令。所述计算机可执行指令在被处理器执行时响应于第一用户的查询操作,根据预设方式从业务客户端获取待验证的可验证声明的查询凭证。其中,所述查询凭证由区块链系统根据身份管理系统发送的查询凭证生成请求,基于所述可验证声明所生成。根据所述查询凭证向所述身份管理系统发送查询请求。接收所述身份管理系统发送的所述可验证声明,展示所述可验证声明。可验证声明用于第一用户将可验证声明中的业务数据与业务客户端展示的第一用户提交的业务数据进行匹配处理。
附图说明
图1为本说明书实施例提供的一种数据的验证处理方法的第一种场景示意图;
图2为本说明书实施例提供的一种数据的验证处理方法的第二种场景示意图;
图3为本说明书实施例提供的一种数据的验证处理方法的第一种流程示意图;
图4为本说明书实施例提供的一种数据的验证处理方法的第二种流程示意图;
图5为本说明书实施例提供的一种数据的验证处理方法的第三种流程示意图;
图6为本说明书实施例提供的一种数据的验证处理方法的第四种流程示意图;
图7为本说明书实施例提供的一种数据的验证处理方法的第五种流程示意图;
图8为本说明书实施例提供的一种数据的验证处理方法的第六种流程示意图;
图9为本说明书实施例提供的一种数据的验证处理方法的第七种流程示意图;
图10为本说明书实施例提供的一种数据的验证处理装置的第一种模块组成示意图;
图11为本说明书实施例提供的一种数据的验证处理装置的第二种模块组成示意图;
图12为本说明书实施例提供的一种数据的验证处理装置的第三种模块组成示意图;
图13为本说明书实施例提供的一种数据的验证处理装置的第四种模块组成示意图;
图14为本说明书实施例提供的一种数据的验证处理装置的第五种模块组成示意图;
图15为本说明书实施例提供的一种数据的验证处理设备的结构示意图。
具体实施方式
图1为本说明书实施例提供的数据的验证处理方法的应用场景示意图,该场景包括第一用户的业务客户端、业务客户端对应的业务服务端、身份管理系统和区块链系统。其中,业务客户端可安装于第一终端设备中,该第一终端设备可为手机、平板电脑、台 式计算机、便携笔记本式计算机等(图1中仅示出台式计算机);该业务客户端可是独立的应用程序(Application,简称App),还可是嵌入到其他应用程序中的小程序,还可是网页应用等。业务服务端可是独立的服务器,也可是由多个服务器组成的服务器集群,提供至少一种业务的办理服务,如理财业务、保险业务、注册业务、缴费业务等。身份管理系统提供数字身份的创建、可验证声明(Verifiable Claims,简称VC)的创建等服务;其中,数字身份可通过多种方式展现,如DID(Decentralized Identity,去中心化身份)等,DID还可称为分布式数字身份。区块链系统包括接入区块链的至少一个区块链节点(图1中仅示出一个),区块链中保存有数据,如查询凭证的生成记录信息等。
业务客户端可响应于第一用户的业务操作,向对应的业务服务端发送数据处理请求。业务服务端根据接收到的数据处理请求,确定第一用户关于目标业务的待验证的业务数据;根据确定的业务数据向身份管理系统发送可验证声明的创建请求。身份管理系统根据接收到的创建请求创建包括业务数据的可验证声明,并根据可验证声明向区块链系统发送查询凭证生成请求。区块链系统中的区块链节点接收到查询凭证生成请求后,生成可验证声明的查询凭证,并通过身份管理系统和业务服务端将查询凭证发送给第一用户的业务客户端。业务客户端根据接收到的查询凭证向身份管理系统发送查询请求,身份管理系统将查询到的可验证声明发送给业务客户端。业务客户端根据第一用户提交的目标业务的业务数据对接收到的可验证声明中的业务数据进行验证处理。其中,区块链节点还可通过业务服务端将查询凭证发送给第一用户的业务客户端(图1中未示出)。
如图2所示,该场景还可包括第一用户的查询客户端,该查询客户端可安装于第二终端设备中,该第二终端设备可为手机、平板电脑、台式计算机、便携笔记本式计算机等(图2中仅示出手机);查询客户端可是独立的应用程序,还可是嵌入到其他应用程序中的小程序。当业务客户端接收到查询凭证后,按照预设方式将查询凭证提供给查询客户端并展示获取到的第一用户所提交的目标业务的业务数据;查询客户端根据获取到的查询凭证向身份管理系统发送查询请求,并接收身份管理系统发送的可验证声明,展示接收到的可验证声明,以使第一用户将可验证声明中的业务数据与业务客户端展示的业务数据进行匹配处理。
上述过程中,基于业务服务端接收到的第一用户关于目标业务的业务数据创建可验证声明,并通过区块链系统生成可验证声明的查询凭证,将查询凭证发送给业务客户端,使得业务客户端可基于查询凭证获取可验证声明,并对可验证声明中的业务数据进行验证处理;由此,实现了对业务服务端接收到的业务数据的有效验证,避免了因业务数据被篡改而给第一用户造成损失的风险,有利于提升线上业务办理的有效性;再者,基于区块链系统生成查询凭证,确保了查询凭证的真实性以及查询凭证与可验证声明的唯一关联性,避免了查询凭证或可验证声明的伪造风险,进而确保了验证的有效性。
基于上述应用场景架构,本申请实施例提供了一种数据的验证处理方法。图3为本说明书实施例提供的一种数据的验证处理方法的流程示意图,图3中的方法能够由图1中的身份管理系统执行,包括以下步骤:步骤S102,接收业务服务端发送的可验证声明的创建请求;其中,创建请求用于请求基于业务服务端接收到的第一用户关于目标业务的业务数据创建可验证声明;具体的,如图4所示,业务客户端响应于第一用户的业务操作,向对应的业务服务端发送数据处理请求。业务服务端根据接收到的数据处理请求确定第一用户关于待验证的目标业务的业务数据,根据确定的业务数据向身份管理系统发送可验证声明的创建请求。
更加具体的,当第一用户具有目标业务的办理需求时,操作业务客户端以提交目标业务的业务数据;业务客户端响应于第一用户的提交操作,获取第一用户提交的目标业务的业务数据,根据获取的业务数据向业务服务端发送业务处理请求。业务服务端根据接收到的业务处理请求中的业务数据向身份管理系统发送可验证声明的创建请求,以实现对业务服务端接收到的业务数据的验证处理。由此在业务服务端进行业务处理之前, 对业务服务端接收到的业务数据进行验证处理,能够确保目标业务的有效办理,避免因业务数据被篡改而给第一用户造成损失。
或,第一用户在目标业务办理完成之后,为了避免业务数据在传输过程中被篡改,或为了避免业务服务端恶意篡改业务数据,第一用户操作其业务客户端选择待验证的目标业务以发起验证处理;业务客户端响应于第一用户的验证操作,确定第一用户关于待验证的目标业务的业务标识信息,根据业务标识信息向业务服务端发送验证请求。业务服务端根据验证请求中的业务标识信息获取对应的业务数据,根据获取的业务数据向身份管理系统发送可验证声明的创建请求,以实现对业务服务端进行业务处理的业务数据进行验证。其中,业务标识信息如第一用户办理目标业务的流水号信息、第一用户关于目标业务的业务凭证的凭证标识信息等。由此在业务办理完成之后进行验证处理,能够及时的发现业务数据被篡改等问题,从而避免给第一用户造成损失。
步骤S104,根据创建请求创建可验证声明;其中,可验证声明的内容数据包括业务数据;步骤S106,根据可验证声明向区块链系统发送查询凭证生成请求,查询凭证生成请求用于请求区块链系统将生成的可验证声明的查询凭证发送给第一用户的与业务服务端对应的业务客户端;查询凭证用于业务客户端获取可验证声明,并根据第一用户提交的目标业务的业务数据对获取的可验证声明中的业务数据进行验证处理。
其中,当区块链系统接收到查询凭证生成请求时,根据查询凭证生成请求生成可验证声明的查询凭证,并将生成的查询凭证发送给身份管理系统,身份管理系统将查询凭证发送给业务服务端,业务服务端将接收到的查询凭证发送给业务客户端。或,区块链系统将生成的查询凭证发送给业务服务端,业务服务端将接收到的查询凭证发送给业务客户端。其中,查询凭证中可包括可验证声明的哈希值,查询凭证的具体形式可在实际应用中根据需要自行设定,如查询凭证可是二维码、条形码等。
本说明书实施例中,基于业务服务端接收到的第一用户关于目标业务的业务数据创建可验证声明,并通过区块链系统生成可验证声明的查询凭证,将查询凭证发送给业务客户端,使得业务客户端可基于查询凭证获取可验证声明,并对可验证声明中的业务数据进行验证处理。由此,实现了对业务服务端接收到的业务数据的有效验证,避免了因业务数据被篡改而给第一用户造成损失的风险,有利于提升线上业务办理的有效性;再者,基于区块链系统生成查询凭证,确保了查询凭证的真实性以及查询凭证与可验证声明的唯一关联性,避免了查询凭证或可验证声明的伪造风险,进而确保了验证的有效性。
为了确保可验证声明的有效性,本申请实施例中,身份管理系统首先对创建请求是否符合预设的创建条件进行验证,具体的,步骤S104可包括以下步骤S104-2:步骤S104-2,若确定创建请求符合预设的创建条件,则根据创建请求创建可验证声明。
其中,确定创建请求符合预设的创建条件可包括:若获取到业务服务端的第一数字身份信息、第一用户的第二数字身份信息和第一签名数据,且对第一签名数据验证通过,则确定创建请求符合预设的创建条件;其中,第一签名数据是基于第一数字身份信息所对应的第一私钥对第一指定数据进行签名处理所得。
具体而言,当业务服务端和/或第一用户预先从身份管理系统申请了数字身份信息时,创建请求中可包括业务服务端的第一数字身份信息和/或第一用户的第二数字身份信息,当业务服务端和/或第一用户端未申请数字身份信息时,创建请求中可包括业务服务端的服务端信息和/或第一用户的用户信息。相应的,身份管理系统接收到可验证声明的创建请求时,确定创建请求中是否包括业务服务端的第一数字身份信息和第一用户的第二数字身份信息,若是,则从创建请求中获取第一数字身份信息和第二数字身份信息;是否,则确定业务服务端和/或第一用户未申请数字身份信息,从创建请求中获取业务服务端的服务端信息和/或第一用户的用户信息,根据获取的信息生成业务服务端的第一数字身份信息和/或第一用户的第二数字身份信息。以及,身份管理系统为生成的第一数字身份信息和/或第二数字身份信息分配对应的公私钥对,将公私钥对中的私钥发送给相应的业务 服务端和/或第一用户,并将公钥与相应的数字身份信息关联保存,如保存至区块链中等。
当业务服务端预先从身份管理系统申请了第一数字身份信息时,创建请求中可包括第一签名数据;相应的,确定获取到第一签名数据可包括:身份管理系统确定创建请求中是否包括第一签名数据,若是,则确定获取到第一签名数据;若否,则向业务服务端发送签名数据的获取请求,若接收到业务服务端发送的第一签名数据,则确定获取到第一签名数据。当身份管理系统获取到第一签名数据、第一数字身份信息和第二数字身份信息后,根据第一数字身份信息获取对应的公钥,根据获取的公钥对第一签名数据进行验证处理,若验证通过,则确定创建请求符合预设的创建条件,若验证未通过,则确定创建请求不符合预设的创建条件,向业务服务端发送请求失败信息。通过对第一签名数据进行验证,避免了他人冒充业务服务端发送创建请求的风险;通过获取第一数字身份信息和第二数字身份信息,以确保满足可验证声明的创建条件。
为了证明可验证声明是由身份管理系统所创建,以便于业务客户端验证可验证声明的真实性,本申请实施例中,基于身份管理系统的第二签名数据创建可验证声明。具体的,步骤S104中根据创建请求创建可验证声明可包括:根据身份管理系统的第三数字身份信息所对应的第二私钥对第二指定数据进行签名处理,得到第二签名数据;将第一数字身份信息、第二数字身份信息、第一签名数据、第二签名数据和创建请求包括的业务数据确定为内容数据,根据内容数据创建可验证声明。其中,第二指定数据可在实际应用中根据需要自行设定,如第二指定数据包括第一数字身份信息、第二数字身份信息、业务数据等。
为了确保可验证声明的查询凭证的真实性和有效性,确保非法用户无法伪造查询凭证,如图4所示,身份管理系统在创建可验证声明之后,基于创建的可验证声明向区块链系统发送查询凭证生成请求。可选地,查询凭证生成请求中包括可验证声明,从而将可验证声明保存至区块链中,以确保可验证声明的不可篡改性。具体的,步骤S106中根据可验证声明向区块链系统发送查询凭证生成请求,可包括:根据可验证声明生成查询凭证生成请求,将查询凭证生成请求发送给区块链系统;其中,查询凭证生成请求用于请求区块链系统根据预设方式对可验证声明进行哈希处理得到哈希值,根据哈希值生成可验证声明的查询凭证,并将基于哈希值和可验证声明生成的查询凭证的生成记录信息保存至区块链中。
为了提升查询凭证的生产速率,本申请实施例中,身份管理系统根据可验证声明的哈希值向区块链系统发送查询凭证生成请求。具体的,步骤S106中根据可验证声明向区块链系统发送查询凭证生成请求,可包括:根据预设方式对可验证声明进行哈希处理得到哈希值,根据哈希值生成查询凭证生成请求;将生成的查询凭证生成请求发送给区块链系统;以及,将可验证证明和哈希值关联保存至指定的存储区域。其中,查询凭证生成请求用于请求区块链系统根据哈希值生成可验证声明的查询凭证,并将查询凭证的生成记录信息保存至区块链中。指定的存储区域可是身份管理系统本地的存储区域,还可是云存储,还可是区块链等。
当区块链系统接收到查询凭证生成请求时,如图4所示,根据确定的可验证声明的哈希值生成查询凭证,并将查询凭证通过身份管理系统和业务服务端发送给业务客户端。为了提升业务数据的验证效率,本申请实施例中,可由业务客户端获取可验证声明并完成验证处理;相应的,如图4所示,业务客户端根据查询凭证向身份管理系统发送查询请求,身份管理系统将查询到的可验证声明发送给业务客户端,业务客户端根据获取的第一用户提交的目标业务的业务数据对接收到的可验证声明中的业务数据进行验证处理。也就是说,步骤S106之后还可包括:接收业务客户端基于查询凭证发送的查询请求,根据查询请求获取可验证声明,将获取的可验证声明发送给业务客户端;具体的,当查询凭证生成请求中包括可验证声明时,身份管理系统从查询请求中获取哈希值,根据哈希值从区块链中获取关联保存的可验证声明;或,身份管理系统根据哈希值向区块 链系统发送可验证声明的获取请求,区块链系统中的区块链节点根据该获取请求中的哈希值从区块链中查询关联保存的可验证声明并发送给身份管理系统,身份管理系统将接收到可验证声明发送给业务客户端。当查询凭证生成请求中包括可验证声明的哈希值时,身份管理系统从查询请求中获取哈希值,根据哈希值从指定的存储区域获取关联保存的可验证声明,并将获取的可验证声明发送给业务客户端。
由此,身份管理系统基于业务客户端发送的查询请求进行查询处理,并由业务客户端进行可验证声明的验证处理,实现了对业务服务端接收到的业务数据的验证,避免了因业务数据被篡改而给第一用户造成损失的风险。
考虑到在实际应用中,一些用户还会有自行验证的需求,基于此,本申请实施例中,如图5所示,业务客户端接收到查询凭证后,第一用户可操作其查询客户端,查询客户端响应于第一用户的查询操作,根据预设方式从业务客户端获取查询凭证,并根据查询凭证向身份管理系统发送查询请求,身份管理系统根据查询请求进行查询处理,并将查询到的可验证声明发送给查询客户端,查询客户端展示接收到的可验证声明,以使用户将可验证声明中的业务数据与业务客户端展示的第一用户提交的目标业务的业务数据进行匹配。相应的,步骤S106之后可包括:接收查询客户端基于查询凭证发送的查询请求,根据查询请求获取可验证声明,将获取的可验证声明发送给查询客户端。
根据查询请求获取可验证声明的方式可参见前述相关描述,重复之处这里不再赘述。
由此,身份管理系统基于查询客户端发送的查询请求进行查询处理,并由查询客户端展示获取的可验证声明供第一用户进行业务数据的验证处理,实现了对业务服务端接收到的业务数据的验证,避免了因业务数据被篡改而给第一用户造成损失的风险。
需要指出的是,图4和图5仅用于示意而不用于限定,一些操作的执行顺序可互换,一些操作还可通过其他方式实现;如区块链系统还可将查询凭证发送给身份管理系统之后,将查询凭证的生成记录上链;区块链系统还可将查询凭证发送给业务服务端,业务服务端将查询凭证发送给业务客户端等。
本说明书实施例中,身份管理系统基于业务服务端接收到的第一用户关于目标业务的业务数据创建可验证声明,并通过区块链系统生成可验证声明的查询凭证,将查询凭证发送给业务客户端,使得业务客户端可基于查询凭证获取可验证声明,并对可验证声明中的业务数据进行验证处理。由此,实现了对业务服务端接收到的业务数据的有效验证,避免了因业务数据被篡改而给第一用户造成损失的风险,有利于提升线上业务办理的有效性;再者,基于区块链系统生成查询凭证,确保了查询凭证的真实性以及查询凭证与可验证声明的唯一关联性,避免了查询凭证或可验证声明的伪造风险,进而确保了验证的有效性。
对应上述描述的数据的验证处理方法,基于相同的技术构思,本说明书实施例还提供了另一种数据的验证处理方法,应用于区块链系统。图6为本说明书实施例提供的另一种数据的验证处理方法的流程示意图;如图6所示,该方法包括以下步骤:步骤S202,接收身份管理系统发送的查询凭证生成请求;其中,查询凭证生成请求用于请求生成待验证的可验证声明的查询凭证;可验证声明的内容数据包括业务服务端接收到的第一用户关于目标业务的业务数据;具体的,业务客户端响应于第一用户的业务操作,向对应的业务服务端发送数据处理请求。业务服务端根据接收到的数据处理请求确定待验证的目标业务的业务数据,根据确定的业务数据向身份管理系统发送可验证声明的创建请求。身份管理系统根据接收到的创建请求创建包括该业务数据的可验证声明,根据创建的可验证声明向区块链系统发送查询凭证生成请求。
步骤S204,基于区块链根据查询凭证生成请求生成可验证声明的查询凭证;为了提升查询凭证的生成速率,本申请实施例中,预先在区块链中部署第一智能合约,并基于第一智能合约生成查询凭证。相应的,步骤S204可包括:调用区块链中部署的第一智能合约,基于第一智能合约根据查询凭证生成请求生成可验证声明的查询凭证。
为了便于后续可验证声明的查询,本申请实施例中,基于可验证声明的哈希值生成查询凭证。步骤S204中根据查询凭证生成请求生成可验证声明的查询凭证,可包括:根据查询凭证生成请求获取可验证声明的哈希值,根据获取的哈希值生成查询凭证。
可选地,从查询凭证生成请求中获取可验证声明的哈希值;或,从查询凭证生成请求中获取可验证声明,根据预设方式对获取的可验证声明进行哈希处理得到哈希值。
步骤S206,将查询凭证发送给第一用户的与业务服务端对应的业务客户端;查询凭证用于业务客户端获取可验证声明,并根据第一用户提交的目标业务的业务数据对获取的可验证声明中的业务数据进行验证处理。
可选地,通过身份管理系统将查询凭证发送给业务客户端,即区块链系统将查询凭证发送给身份管理系统,身份管理系统将接收到的查询凭证发送给业务服务端;业务服务端将接收到的查询凭证发送给业务客户端。或,通过业务服务端将查询凭证发送给业务客户端,即区块链系统将查询凭证发送给确定的业务服务端,业务服务端将接收到的查询凭证发送给业务客户端。
为了便于对查询凭证的生成进行追溯,确保查询凭证的有效性,本申请实施例中,如图5所示,区块链系统在生成查询凭证之后,还将查询凭证的生成记录保存至区块链中。具体的,当查询凭证生成请求包括可验证声明时,将可验证声明、查询凭证、查询凭证的生成时间等关联记录,并将记录的信息确定为查询凭证的生成记录信息,将生成记录信息保存至区块链中。当查询凭证生成请求包括可验证声明的哈希值时,将该哈希值、查询凭证、查询凭证的生成时间等关联记录,并将记录的信息确定为查询凭证的生成记录信息,将生成记录信息保存至区块链中。需要指出的是,生成记录信息的具体内容可在实际应用中根据需要自行设定。
本说明书实施例中,区块链系统在接收到查询凭证生成请求时,生成待验证的可验证声明的查询凭证并发送给业务客户端,使得业务客户端可基于查询凭证获取可验证声明,并对可验证声明中的业务数据进行验证处理;其中,可验证声明中的业务数据是业务服务端接收到的第一用户关于目标业务的业务数据。由此,实现了对业务服务端接收到的业务数据的有效验证,避免了因业务数据被篡改而给第一用户造成损失的风险,有利于提升线上业务办理的有效性;再者,基于区块链系统生成查询凭证,确保了查询凭证的真实性以及查询凭证与可验证声明的唯一关联性,避免了查询凭证或可验证声明的伪造风险,进而确保了验证的有效性。
对应上述描述的数据的验证处理方法,基于相同的技术构思,本说明书实施例还提供了另一种数据的验证处理方法,应用于业务客户端。图7为本说明书实施例提供的另一种数据的验证处理方法的流程示意图;如图7所示,该方法包括以下步骤:步骤S302响应于第一用户的业务操作,向对应的业务服务端发送数据处理请求;其中,数据处理请求用于请求业务服务端通过身份管理系统创建可验证声明,并通过区块链系统生成可验证声明的查询凭证;其中,可验证声明的内容数据包括第一用户关于目标业务的业务数据;可选地,响应于第一用户的提交操作,获取第一用户提交的目标业务的业务数据,根据获取的业务数据向业务服务端发送业务处理请求。或,响应于第一用户的验证操作,确定第一用户关于待验证的目标业务的业务标识信息,根据业务标识信息向业务服务端发送验证请求。其中,业务标识信息如第一用户办理目标业务的流水号信息、第一用户关于目标业务的业务凭证的凭证标识信息等。
步骤S304根据接收到的查询凭证进行可验证声明的获取处理,以及根据第一用户提交的目标业务的业务数据对可验证声明中的业务数据进行验证处理。
具体的,接收业务服务端发送的查询凭证,根据接收到的查询凭证进行可验证声明的获取处理,以及根据第一用户提交的目标业务的业务数据对可验证声明中的业务数据进行验证处理。
为了提升验证效率,本申请实施例中,由业务客户端进行可验证声明的获取和验证 处理。具体的,步骤S304可包括以下步骤S304-2和步骤S304-4:步骤S304-2,从查询凭证中获取可验证声明的哈希值,根据获取的哈希值向身份管理系统发送查询请求;其中,查询请求用于请求身份管理系统根据哈希值获取对应的可验证声明;具体的,解析查询凭证得到可验证声明的哈希值,根据得到的哈希值向身份管理系统发送查询请求。
步骤S304-4,接收身份管理系统发送的可验证声明,将可验证声明中的业务数据与获取的第一用户提交的目标业务的业务数据进行匹配处理。
具体的,当业务客户端基于第一用户的提交操作,向业务服务端发送业务处理请求时,将可验证声明中的业务数据与基于第一用户的提交操作所获取的业务数据进行匹配处理;当匹配成功时,确定对可验证声明中的业务数据验证通过,向业务服务端发送验证通过信息;该验证通过信息用于指示业务服务端根据业务数据进行业务处理。由此,在业务办理过程中,当业务客户端基于获取的可验证声明对业务服务端接收到的业务数据验证通过时,指示业务服务端进行业务处理,有效的避免了因业务数据被篡改而给第一用户造成的损失。
当业务客户端基于第一用户的验证操作,向业务服务端发送验证请求时,基于确定的第一用户关于待验证的目标业务的业务标识信息获取第一用户提交的关于目标业务的业务数据,并在接收到可验证声明时,将可验证声明中的业务数据与获取的业务数据进行匹配处理。由此在业务办理完成之后进行验证处理,能够及时的发现业务数据被篡改等问题,从而避免给第一用户造成损失。
为了确保可验证声明的真实性,步骤S304-4中将可验证声明中的业务数据与获取的第一用户提交的目标业务的业务数据进行匹配处理,可包括:根据确定的身份管理系统的第三数字身份信息获取第三数字身份信息对应的公钥;若根据获取的公钥对可验证声明中的第二签名数据验证通过,则将可验证声明中的业务数据与获取的第一用户提交的目标业务的业务数据进行匹配处理。
其中,可验证声明中可包括第三数字身份信息,业务客户端从可验证声明中获取身份管理系统的第三数字身份信息;或,身份管理系统将可验证声明和第三数字身份信息发送给业务客户端,业务客户端接收身份管理系统发送的第三数字身份信息和可验证声明。由此,通过对第二签名数据进行验证,确保了可验证声明是身份管理系统所创建,而不是非法用户的恶意伪造,进而确保了验证的有效性。
当步骤S304包括上述步骤S304-2和步骤S304-4,且业务客户端基于第一用户的提交操作向业务服务端发送业务处理请求时,步骤S304-4之后还可包括:若确定验证通过,则向业务服务端发送验证通过信息;该验证通过信息用于指示业务服务端根据业务数据进行业务处理;以及接收业务服务端发送的业务处理结果信息,展示该业务处理结果信息。若验证未通过,则向业务服务端发送验证失败信息,以及展示请求失败信息。当步骤S304包括上述步骤S304-2和步骤S304-4,且业务客户端基于第一用户的验证操作向业务服务端发送验证时,步骤S304-4之后还可包括:展示验证结果信息。
考虑到在实际应用中,一些用户有自行验证的需求。基于此,本申请实施例中,业务客户端接收到查询凭证后,还可按照预设方式将查询凭证提供给第一用户的查询客户端,由查询客户端获取可验证声明并展示给用户,供用户进行验证处理。相应的,步骤S304可包括以下步骤S304-6:步骤S304-6,展示获取的第一用户提交的目标业务的业务数据,并按照预设方式将查询凭证提供给第一用户的查询客户端;查询凭证用于查询客户端向身份管理系统发送查询请求,并展示身份管理系统发送的可验证声明,使第一用户将可验证声明中的业务数据与业务客户端展示的业务数据进行匹配处理。
其中,获取第一用户提交的目标业务的业务数据的方式可参见前述相关描述,重复之初这里不再赘述。为了便于用户进行匹配处理,优选地,第一用户的业务客户端与查询客户端安装于不同的终端设备中,相应的,按照预设方式将查询凭证提供给第一用户的查询客户端,可是业务客户端将查询凭证发送给查询客户端;或业务客户端解析查询 凭证得到可验证声明的哈希值,将得到的哈希值发送给查询客户端;或,业务客户端展示接收到的查询凭证,查询客户端扫描业务客户端所展示的查询凭证以获取查询凭证中的可验证声明的哈希值。其中,业务客户端将查询凭证或哈希值发送给查询客户端可通过蓝牙通信的方式发送,也可通过无线通信的方式方法;业务客户端将查询凭证提供给查询客户端的方式可在实际应用中根据需要自行设定。
本说明书实施例中,业务客户端通过向业务服务端发送数据处理请求,从而业务服务端请求身份管理系统基于业务服务端接收到的第一用户关于目标业务的业务数据创建可验证声明,并通过区块链系统生成可验证声明的查询凭证,将查询凭证发送给业务客户端,使得业务客户端可基于查询凭证获取可验证声明,并对可验证声明中的业务数据进行验证处理。由此,实现了对业务服务端接收到的业务数据的有效验证,避免了因业务数据被篡改而给第一用户造成损失的风险,有利于提升线上业务办理的有效性;再者,基于区块链系统生成查询凭证,确保了查询凭证的真实性以及查询凭证与可验证声明的唯一关联性,避免了查询凭证或可验证声明的伪造风险,进而确保了验证的有效性。
对应上述描述的数据的验证处理方法,基于相同的技术构思,本说明书实施例还提供了另一种数据的验证处理方法,应用于业务服务端。图8为本说明书实施例提供的另一种数据的验证处理方法的流程示意图;如图8所示,该方法包括以下步骤:步骤S402,接收业务客户端发送的数据处理请求,根据数据处理请求确定第一用户关于目标业务的待验证的业务数据;可选地,接收业务客户端发送的业务处理请求,将业务处理请求包括的业务数据确定为第一用户关于目标业务的待验证的业务数据。或,接收业务客户端发送的验证请求,根据验证请求中的第一用户关于目标业务的业务标识信息,从保存的业务标识信息与业务数据的关联关系中获取关联的业务数据;将获取的业务数据确定为第一用户关于目标业务的待验证的业务数据。
当第一用户预先从身份管理系统申请了第二数字身份信息时,数据处理请求中还可包括第一用户的第二数字身份信息;当第一用户未从身份管理系统申请第二数字身份信息时,数据处理请求中还可包括第一用户的用户信息,如用户姓名、身份证件号码、联系方式等。
步骤S404,根据业务数据向身份管理系统发送可验证声明的创建请求;创建请求用于请求身份管理系统创建包括业务数据的可验证声明,通过区块链系统将生成的可验证声明的查询凭证发送给业务客户端;查询凭证用于业务客户端获取可验证声明,并根据第一用户提交的目标业务的业务数据对获取的可验证声明中的业务数据进行验证处理。
当业务服务端预先从身份管理系统申请了第一数字身份信息、且数据处理请求中还包括第一用户的第二数字身份信息时,创建请求中还可包括第一数字身份信息和第二数字身份信息。当业务服务端未从身份管理系统申请第一数字身份信息、且数据处理请求中还包括第一用户的用户信息时,创建请求中还可包括业务服务端的服务端信息(如服务端标识、IP地址等)和第一用户的用户信息。
当业务服务端接收到的数据处理请求是业务处理请求时,步骤S404之后还可包括:若接收到业务客户端发送的验证通过信息,则根据业务数据进行业务处理,以及向业务客户端发送业务处理结果信息。
本说明书实施例中,业务服务端基于确定的第一用户关于目标业务的业务数据请求身份管理系统创建可验证声明,并通过区块链系统生成可验证声明的查询凭证,将查询凭证发送给业务客户端,使得业务客户端可基于查询凭证获取可验证声明,并对可验证声明中的业务数据进行验证处理。由此,实现了对业务服务端接收到的业务数据的有效验证,避免了因业务数据被篡改而给第一用户造成损失的风险,有利于提升线上业务办理的有效性;再者,基于区块链系统生成查询凭证,确保了查询凭证的真实性以及查询凭证与可验证声明的唯一关联性,避免了查询凭证或可验证声明的伪造风险,进而确保了验证的有效性。
对应上述描述的数据的验证处理方法,基于相同的技术构思,本说明书实施例还提供了另一种数据的验证处理方法,应用于查询客户端。图9为本说明书实施例提供的另一种数据的验证处理方法的流程示意图;如图9所示,该方法包括以下步骤:步骤S502,响应于第一用户的查询操作,根据预设方式从业务客户端获取待验证的可验证声明的查询凭证;其中,查询凭证由区块链系统根据身份管理系统发送的查询凭证生成请求,基于可验证声明所生成;为了便于用于的验证操作,优选地,业务客户端与查询客户端安装于不同的终端设备中;相应的,步骤S502可包括:响应于第一用户的查询操作,扫描业务客户端展示的查询凭证,得到查询凭证中的待验证的可验证声明的哈希值;或,接收业务客户端发送的待验证的可验证声明的查询凭证;或,接收业务客户端发送的待验证的可验证声明的哈希值,该哈希值是业务客户端解析查询凭证所获得。其中,接收业务客户端发送的查询凭证或哈希值,可是通过无线通信的方式接收,还可是通过蓝牙通信的方式接收等,其可在实际应用中根据需要自行设定。
步骤S504,根据查询凭证向身份管理系统发送查询请求;具体的,根据可验证声明的哈希值向身份管理系统发送查询请求。
步骤S506,接收身份管理系统发送的可验证声明,展示接收到的可验证声明;其中,可验证声明用于第一用户将可验证声明中的业务数据与业务客户端展示的第一用户提交的业务数据进行匹配处理。
为了确保可验证声明的真实性,展示可验证声明可包括:根据确定的身份管理系统的第三数字身份信息获取第三数字身份信息对应的公钥;若根据获取的公钥对可验证声明中的第二签名数据验证通过,则展示可验证声明。
查询客户端展示可验证声明之后,第一用户即可将查询客户端展示的可验证声明中的业务数据与业务客户端展示的第一用户提交的业务数据进行匹配,从而满足第一用户自行验证的需求。
本说明书实施例中,查询客户端通过从业务客户端获取查询凭证,并基于查询凭证从身份管理系统获取可验证声明,以使第一用户对可验证声明中的业务数据进行验证处理;其中,查询凭证是通过区块链系统生成,业务数据是业务服务端接收到的第一用户关于目标业务的业务数据。由此,实现了对业务服务端接收到的业务数据的有效验证,避免了因业务数据被篡改而给第一用户造成损失的风险,有利于提升线上业务办理的有效性;再者,基于区块链系统生成查询凭证,确保了查询凭证的真实性以及查询凭证与可验证声明的唯一关联性,避免了查询凭证或可验证声明的伪造风险,进而确保了验证的有效性。
对应上述描述的数据的验证处理方法,基于相同的技术构思,本说明书实施例还提供一种数据的验证处理装置,应用于身份管理系统。图10为本说明书实施例提供的一种数据的验证处理装置的模块组成示意图,如图10所示,该装置包括:接收模块601,接收业务服务端发送的可验证声明的创建请求;其中,所述创建请求用于请求基于所述业务服务端接收到的第一用户关于目标业务的业务数据创建可验证声明;创建模块602,根据所述创建请求创建可验证声明;其中,所述可验证声明的内容数据包括所述业务数据;发送模块603,根据所述可验证声明向区块链系统发送查询凭证生成请求,所述查询凭证生成请求用于请求所述区块链系统将生成的所述可验证声明的查询凭证发送给所述第一用户的与所述业务服务端对应的业务客户端;所述查询凭证用于所述业务客户端获取所述可验证声明,并根据所述第一用户提交的所述目标业务的业务数据对获取的所述可验证声明中的业务数据进行验证处理。
可选地,所述创建模块602,若确定所述创建请求符合预设的创建条件,则根据所述创建请求创建可验证声明。
可选地,所述装置还包括:查询模块;所述查询模块,接收所述业务客户端基于所述查询凭证发送的查询请求,根据所述查询请求获取所述可验证声明,将获取的所述可 验证声明发送给所述业务客户端;或,接收查询客户端基于所述查询凭证发送的查询请求,根据所述查询请求获取所述可验证声明,将获取的所述可验证声明发送给所述查询客户端;其中,所述查询客户端根据预设方式从所述业务客户端获取所述查询凭证。
本说明书实施例提供的数据的验证处理装置,基于业务服务端接收到的第一用户关于目标业务的业务数据创建可验证声明,并通过区块链系统生成可验证声明的查询凭证,将查询凭证发送给业务客户端,使得业务客户端可基于查询凭证获取可验证声明,并对可验证声明中的业务数据进行验证处理。由此,实现了对业务服务端接收到的业务数据的有效验证,避免了因业务数据被篡改而给第一用户造成损失的风险,有利于提升线上业务办理的有效性;再者,基于区块链系统生成查询凭证,确保了查询凭证的真实性以及查询凭证与可验证声明的唯一关联性,避免了查询凭证或可验证声明的伪造风险,进而确保了验证的有效性。
对应上述描述的数据的验证处理方法,基于相同的技术构思,本说明书实施例还提供一种数据的验证处理装置,应用于区块链系统。图11为本说明书实施例提供的一种数据的验证处理装置的模块组成示意图,如图11所示,该装置包括:接收模块701,接收身份管理系统发送的查询凭证生成请求;其中,所述查询凭证生成请求用于请求生成待验证的可验证声明的查询凭证;所述可验证声明的内容数据包括业务服务端接收到的第一用户关于目标业务的业务数据;生成模块702,基于区块链根据所述查询凭证生成请求生成所述可验证声明的所述查询凭证;发送模块703,将所述查询凭证发送给所述第一用户的与所述业务服务端对应的业务客户端;所述查询凭证用于所述业务客户端获取所述可验证声明,并根据所述第一用户提交的所述目标业务的业务数据对获取的所述可验证声明中的业务数据进行验证处理。
可选地,所述生成模块702,调用区块链中部署的第一智能合约,基于所述第一智能合约根据所述查询凭证生成请求生成所述可验证声明的所述查询凭证。
可选地,所述生成模块702,根据所述查询凭证生成请求获取所述可验证声明的哈希值,根据所述哈希值生成所述查询凭证。
可选地,所述装置还包括:保存模块;所述保存模块,将所述查询凭证的生成记录信息保存至区块链中。
本说明书实施例提供的数据的验证处理装置,在接收到查询凭证生成请求时,生成待验证的可验证声明的查询凭证并发送给业务客户端,使得业务客户端可基于查询凭证获取可验证声明,并对可验证声明中的业务数据进行验证处理;其中,可验证声明中的业务数据是业务服务端接收到的第一用户关于目标业务的业务数据。由此,实现了对业务服务端接收到的业务数据的有效验证,避免了因业务数据被篡改而给第一用户造成损失的风险,有利于提升线上业务办理的有效性;再者,基于区块链系统生成查询凭证,确保了查询凭证的真实性以及查询凭证与可验证声明的唯一关联性,避免了查询凭证或可验证声明的伪造风险,进而确保了验证的有效性。
对应上述描述的数据的验证处理方法,基于相同的技术构思,本说明书实施例还提供一种数据的验证处理装置,应用于业务客户端。图12为本说明书实施例提供的一种数据的验证处理装置的模块组成示意图,如图12所示,该装置包括:发送模块801,响应于第一用户的业务操作,向对应的业务服务端发送数据处理请求;所述数据处理请求用于请求所述业务服务端通过身份管理系统创建可验证声明,并通过区块链系统生成所述可验证声明的查询凭证;其中,所述可验证声明的内容数据包括所述第一用户关于目标业务的业务数据;处理模块802,根据接收到的所述查询凭证进行所述可验证声明的获取处理,以及根据所述第一用户提交的所述目标业务的业务数据对所述可验证声明中的业务数据进行验证处理。
可选地,所述处理模块802,从所述查询凭证中获取所述可验证声明的哈希值;根据所述哈希值向所述身份管理系统发送查询请求,所述查询请求用于请求所述身份管理 系统根据所述哈希值获取对应的所述可验证声明;接收所述身份管理系统发送的所述可验证声明;将所述可验证声明中的业务数据与获取的所述第一用户提交的所述目标业务的业务数据进行匹配处理。
可选地,所述处理模块802,展示获取的所述第一用户提交的所述目标业务的业务数据,并按照预设方式将所述查询凭证提供给所述第一用户的查询客户端;所述查询凭证用于所述查询客户端向所述身份管理系统发送查询请求,并展示所述身份管理系统发送的所述可验证声明,使所述第一用户将所述可验证声明中的业务数据与展示的所述业务数据进行匹配处理。
本说明书实施例提供的数据的验证处理装置,通过向业务服务端发送数据处理请求,从而业务服务端请求身份管理系统基于业务服务端接收到的第一用户关于目标业务的业务数据创建可验证声明,并通过区块链系统生成可验证声明的查询凭证,将查询凭证发送给业务客户端,使得业务客户端可基于查询凭证获取可验证声明,并对可验证声明中的业务数据进行验证处理。由此,实现了对业务服务端接收到的业务数据的有效验证,避免了因业务数据被篡改而给第一用户造成损失的风险,有利于提升线上业务办理的有效性;再者,基于区块链系统生成查询凭证,确保了查询凭证的真实性以及查询凭证与可验证声明的唯一关联性,避免了查询凭证或可验证声明的伪造风险,进而确保了验证的有效性。
对应上述描述的数据的验证处理方法,基于相同的技术构思,本说明书实施例还提供一种数据的验证处理装置,应用于业务服务端。图13为本说明书实施例提供的一种数据的验证处理装置的模块组成示意图,如图13所示,该装置包括:接收模块901,接收业务客户端发送的数据处理请求,根据所述数据处理请求确定第一用户关于目标业务的待验证的业务数据;发送模块902,根据所述业务数据向身份管理系统发送可验证声明的创建请求,所述创建请求用于请求所述身份管理系统创建包括所述业务数据的可验证声明,并通过区块链系统将生成的所述可验证声明的查询凭证发送给所述业务客户端;所述查询凭证用于所述业务客户端获取所述可验证声明,并根据第一用户提交的所述目标业务的业务数据对获取的所述可验证声明中的业务数据进行验证处理。
可选地,所述接收模块901,还接收所述区块链系统或所述身份管理系统发送的所述查询凭证,将所述查询凭证发送给所述业务客户端。
本说明书实施例提供的数据的验证处理装置,业务服务端基于确定的第一用户关于目标业务的业务数据请求身份管理系统创建可验证声明,并通过区块链系统生成可验证声明的查询凭证,将查询凭证发送给业务客户端,使得业务客户端可基于查询凭证获取可验证声明,并对可验证声明中的业务数据进行验证处理。由此,实现了对业务服务端接收到的业务数据的有效验证,避免了因业务数据被篡改而给第一用户造成损失的风险,有利于提升线上业务办理的有效性;再者,基于区块链系统生成查询凭证,确保了查询凭证的真实性以及查询凭证与可验证声明的唯一关联性,避免了查询凭证或可验证声明的伪造风险,进而确保了验证的有效性。
对应上述描述的数据的验证处理方法,基于相同的技术构思,本说明书实施例还提供一种数据的验证处理装置,应用于查询客户端。图14为本说明书实施例提供的一种数据的验证处理装置的模块组成示意图,如图14所示,该装置包括:获取模块1001,响应于第一用户的查询操作,根据预设方式从业务客户端获取待验证的可验证声明的查询凭证;其中,所述查询凭证由区块链系统根据身份管理系统发送的查询凭证生成请求,基于所述可验证声明所生成;发送模块1002,根据所述查询凭证向所述身份管理系统发送查询请求;接收模块1003,接收所述身份管理系统发送的所述可验证声明;展示模块1004,展示所述可验证声明;所述可验证声明用于所述第一用户将所述可验证声明中的业务数据与所述业务客户端展示的所述第一用户提交的业务数据进行匹配处理。
可选地,所述获取模块1001,扫描所述业务客户端展示的所述查询凭证,得到所 述可验证声明的哈希值;或,接收所述业务客户端发送的所述哈希值,所述哈希值由所述业务客户端解析所述查询凭证所获得;或,接收业务客户端发送所述查询凭证,解析所述查询凭证得到所述可验证声明的哈希值;所述发送模块1002,根据所述哈希值向所述身份管理系统发送查询请求。
本说明书实施例提供的数据的验证处理装置,通过从业务客户端获取查询凭证,并基于查询凭证从身份管理系统获取可验证声明,以使第一用户对可验证声明中的业务数据进行验证处理;其中,查询凭证是通过区块链系统生成,业务数据是业务服务端接收到的第一用户关于目标业务的业务数据。由此,实现了对业务服务端接收到的业务数据的有效验证,避免了因业务数据被篡改而给第一用户造成损失的风险,有利于提升线上业务办理的有效性;再者,基于区块链系统生成查询凭证,确保了查询凭证的真实性以及查询凭证与可验证声明的唯一关联性,避免了查询凭证或可验证声明的伪造风险,进而确保了验证的有效性。
需要说明的是,本说明书中关于数据的验证处理装置的实施例与本说明书中关于数据的验证处理方法的实施例基于同一发明构思,因此该实施例的具体实施可参见前述对应的数据的验证处理方法的实施,重复之处不再赘述。
进一步地,对应上述描述的数据的验证处理方法,基于相同的技术构思,本说明书实施例还提供一种数据的验证处理设备,该设备用于执行上述的数据的验证处理方法,图15为本说明书实施例提供的一种数据的验证处理设备的结构示意图。
如图15所示,数据的验证处理设备可因配置或性能不同而产生比较大的差异,可包括一个或一个以上的处理器11和存储器12,存储器12中可存储有一个或一个以上存储应用程序或数据。其中,存储器12可是短暂存储或持久存储。存储在存储器12的应用程序可包括一个或一个以上模块(图示未示出),每个模块可包括数据的验证处理设备中的一系列计算机可执行指令。更进一步地,处理器11可设置为与存储器12通信,在数据的验证处理设备上执行存储器12中的一系列计算机可执行指令。数据的验证处理设备还可包括一个或一个以上电源13,一个或一个以上有线或无线网络接口14,一个或一个以上输入输出接口15,一个或一个以上键盘16等。
在一个具体的实施例中,数据的验证处理设备包括有存储器,以及一个或一个以上的程序,其中一个或一个以上程序存储于存储器中,且一个或一个以上程序可包括一个或一个以上模块,且每个模块可包括对数据的验证处理设备中的一系列计算机可执行指令,且经配置以由一个或一个以上处理器执行该一个或一个以上程序包含用于进行以下计算机可执行指令:接收业务服务端发送的可验证声明的创建请求;其中,所述创建请求用于请求基于所述业务服务端接收到的第一用户关于目标业务的业务数据创建可验证声明;根据所述创建请求创建可验证声明;其中,所述可验证声明的内容数据包括所述业务数据;根据所述可验证声明向区块链系统发送查询凭证生成请求,所述查询凭证生成请求用于请求所述区块链系统将生成的所述可验证声明的查询凭证发送给所述第一用户的与所述业务服务端对应的业务客户端;所述查询凭证用于所述业务客户端获取所述可验证声明,并根据所述第一用户提交的所述目标业务的业务数据对获取的所述可验证声明中的业务数据进行验证处理。
可选地,计算机可执行指令在被执行时,所述根据所述创建请求创建可验证声明,包括:若确定所述创建请求符合预设的创建条件,则根据所述创建请求创建可验证声明。
可选地,计算机可执行指令在被执行时,所述根据所述可验证声明向区块链系统发送查询凭证生成请求之后,还包括:接收所述业务客户端基于所述查询凭证发送的查询请求,根据所述查询请求获取所述可验证声明,将获取的所述可验证声明发送给所述业务客户端;或,接收查询客户端基于所述查询凭证发送的查询请求,根据所述查询请求获取所述可验证声明,将获取的所述可验证声明发送给所述查询客户端;其中,所述查询客户端根据预设方式从所述业务客户端获取所述查询凭证。
本说明书实施例提供的数据的验证处理设备,基于业务服务端接收到的第一用户关于目标业务的业务数据创建可验证声明,并通过区块链系统生成可验证声明的查询凭证,将查询凭证发送给业务客户端,使得业务客户端可基于查询凭证获取可验证声明,并对可验证声明中的业务数据进行验证处理。由此,实现了对业务服务端接收到的业务数据的有效验证,避免了因业务数据被篡改而给第一用户造成损失的风险,有利于提升线上业务办理的有效性;再者,基于区块链系统生成查询凭证,确保了查询凭证的真实性以及查询凭证与可验证声明的唯一关联性,避免了查询凭证或可验证声明的伪造风险,进而确保了验证的有效性。
在另一个具体的实施例中,数据的验证处理设备包括有存储器,以及一个或一个以上的程序,其中一个或一个以上程序存储于存储器中,且一个或一个以上程序可包括一个或一个以上模块,且每个模块可包括对数据的验证处理设备中的一系列计算机可执行指令,且经配置以由一个或一个以上处理器执行该一个或一个以上程序包含用于进行以下计算机可执行指令:接收身份管理系统发送的查询凭证生成请求;其中,所述查询凭证生成请求用于请求生成待验证的可验证声明的查询凭证;所述可验证声明的内容数据包括业务服务端接收到的第一用户关于目标业务的业务数据;基于区块链根据所述查询凭证生成请求生成所述可验证声明的所述查询凭证;将所述查询凭证发送给所述第一用户的与所述业务服务端对应的业务客户端;所述查询凭证用于所述业务客户端获取所述可验证声明,并根据所述第一用户提交的所述目标业务的业务数据对获取的所述可验证声明中的业务数据进行验证处理。
计算机可执行指令在被执行时,所述基于区块链根据所述查询凭证生成请求生成所述可验证声明的所述查询凭证,可包括:调用区块链中部署的第一智能合约,基于所述第一智能合约根据所述查询凭证生成请求生成所述可验证声明的所述查询凭证。
可选地,计算机可执行指令在被执行时,所述根据所述查询凭证生成请求生成所述可验证声明的所述查询凭证,包括:根据所述查询凭证生成请求获取所述可验证声明的哈希值,根据所述哈希值生成所述查询凭证。
可选地,计算机可执行指令在被执行时,所述基于区块链根据所述查询凭证生成请求生成所述可验证声明的所述查询凭证之后,还包括:将所述查询凭证的生成记录信息保存至区块链中。
本说明书实施例提供的数据的验证处理设备,在接收到查询凭证生成请求时,生成待验证的可验证声明的查询凭证并发送给业务客户端,使得业务客户端可基于查询凭证获取可验证声明,并对可验证声明中的业务数据进行验证处理;其中,可验证声明中的业务数据是业务服务端接收到的第一用户关于目标业务的业务数据。由此,实现了对业务服务端接收到的业务数据的有效验证,避免了因业务数据被篡改而给第一用户造成损失的风险,有利于提升线上业务办理的有效性;再者,基于区块链系统生成查询凭证,确保了查询凭证的真实性以及查询凭证与可验证声明的唯一关联性,避免了查询凭证或可验证声明的伪造风险,进而确保了验证的有效性。
在另一个具体的实施例中,数据的验证处理设备包括有存储器,以及一个或一个以上的程序,其中一个或一个以上程序存储于存储器中,且一个或一个以上程序可包括一个或一个以上模块,且每个模块可包括对数据的验证处理设备中的一系列计算机可执行指令,且经配置以由一个或一个以上处理器执行该一个或一个以上程序包含用于进行以下计算机可执行指令:响应于第一用户的业务操作,向对应的业务服务端发送数据处理请求;所述数据处理请求用于请求所述业务服务端通过身份管理系统创建可验证声明,并通过区块链系统生成所述可验证声明的查询凭证;其中,所述可验证声明的内容数据包括所述第一用户关于目标业务的业务数据;根据接收到的所述查询凭证进行所述可验证声明的获取处理,以及根据所述第一用户提交的所述目标业务的业务数据对所述可验证声明中的业务数据进行验证处理。
可选地,计算机可执行指令在被执行时,所述根据接收到的所述查询凭证进行所述可验证声明的获取处理,以及根据所述第一用户提交的所述目标业务的业务数据对所述可验证声明中的业务数据进行验证处理,包括:从所述查询凭证中获取所述可验证声明的哈希值;根据所述哈希值向所述身份管理系统发送查询请求,所述查询请求用于请求所述身份管理系统根据所述哈希值获取对应的所述可验证声明;接收所述身份管理系统发送的所述可验证声明;将所述可验证声明中的业务数据与获取的所述第一用户提交的所述目标业务的业务数据进行匹配处理。
可选地,计算机可执行指令在被执行时,所述根据接收到的所述查询凭证进行所述可验证声明的获取处理,以及根据所述第一用户提交的所述目标业务的业务数据对所述可验证声明中的业务数据进行验证处理,包括:展示获取的所述第一用户提交的所述目标业务的业务数据,并按照预设方式将所述查询凭证提供给所述第一用户的查询客户端;所述查询凭证用于所述查询客户端向所述身份管理系统发送查询请求,并展示所述身份管理系统发送的所述可验证声明,使所述第一用户将所述可验证声明中的业务数据与展示的所述业务数据进行匹配处理。
本说明书实施例提供的数据的验证处理设备,通过向业务服务端发送数据处理请求,从而业务服务端请求身份管理系统基于业务服务端接收到的第一用户关于目标业务的业务数据创建可验证声明,并通过区块链系统生成可验证声明的查询凭证,将查询凭证发送给业务客户端,使得业务客户端可基于查询凭证获取可验证声明,并对可验证声明中的业务数据进行验证处理。由此,实现了对业务服务端接收到的业务数据的有效验证,避免了因业务数据被篡改而给第一用户造成损失的风险,有利于提升线上业务办理的有效性;再者,基于区块链系统生成查询凭证,确保了查询凭证的真实性以及查询凭证与可验证声明的唯一关联性,避免了查询凭证或可验证声明的伪造风险,进而确保了验证的有效性。
在另一个具体的实施例中,数据的验证处理设备包括有存储器,以及一个或一个以上的程序,其中一个或一个以上程序存储于存储器中,且一个或一个以上程序可包括一个或一个以上模块,且每个模块可包括对数据的验证处理设备中的一系列计算机可执行指令,且经配置以由一个或一个以上处理器执行该一个或一个以上程序包含用于进行以下计算机可执行指令:接收业务客户端发送的数据处理请求,根据所述数据处理请求确定第一用户关于目标业务的待验证的业务数据;根据所述业务数据向身份管理系统发送可验证声明的创建请求,所述创建请求用于请求所述身份管理系统创建包括所述业务数据的可验证声明,并通过区块链系统将生成的所述可验证声明的查询凭证发送给所述业务客户端;所述查询凭证用于所述业务客户端获取所述可验证声明,并根据第一用户提交的所述目标业务的业务数据对获取的所述可验证声明中的业务数据进行验证处理。
可选地,计算机可执行指令在被执行时,所述根据所述业务数据向身份管理系统发送可验证声明的创建请求之后,还包括:接收所述区块链系统或所述身份管理系统发送的所述查询凭证;将所述查询凭证发送给所述业务客户端。
本说明书实施例提供的数据的验证处理设备,业务服务端基于确定的第一用户关于目标业务的业务数据请求身份管理系统创建可验证声明,并通过区块链系统生成可验证声明的查询凭证,将查询凭证发送给业务客户端,使得业务客户端可基于查询凭证获取可验证声明,并对可验证声明中的业务数据进行验证处理。由此,实现了对业务服务端接收到的业务数据的有效验证,避免了因业务数据被篡改而给第一用户造成损失的风险,有利于提升线上业务办理的有效性;再者,基于区块链系统生成查询凭证,确保了查询凭证的真实性以及查询凭证与可验证声明的唯一关联性,避免了查询凭证或可验证声明的伪造风险,进而确保了验证的有效性。
在另一个具体的实施例中,数据的验证处理设备包括有存储器,以及一个或一个以上的程序,其中一个或一个以上程序存储于存储器中,且一个或一个以上程序可包括 一个或一个以上模块,且每个模块可包括对数据的验证处理设备中的一系列计算机可执行指令,且经配置以由一个或一个以上处理器执行该一个或一个以上程序包含用于进行以下计算机可执行指令:响应于第一用户的查询操作,根据预设方式从业务客户端获取待验证的可验证声明的查询凭证;其中,所述查询凭证由区块链系统根据身份管理系统发送的查询凭证生成请求,基于所述可验证声明所生成;根据所述查询凭证向所述身份管理系统发送查询请求;接收所述身份管理系统发送的所述可验证声明,展示所述可验证声明;所述可验证声明用于所述第一用户将所述可验证声明中的业务数据与所述业务客户端展示的所述第一用户提交的业务数据进行匹配处理。
可选地,计算机可执行指令在被执行时,所述根据预设方式从业务客户端获取待验证的可验证声明的查询凭证,包括:扫描所述业务客户端展示的所述查询凭证,得到所述可验证声明的哈希值;或,接收所述业务客户端发送的所述哈希值,所述哈希值由所述业务客户端解析所述查询凭证所获得;或,接收业务客户端发送所述查询凭证,解析所述查询凭证得到所述可验证声明的哈希值;所述根据所述查询凭证向所述身份管理系统发送查询请求,包括:根据所述哈希值向所述身份管理系统发送查询请求。
本说明书实施例提供的数据的验证处理设备,通过从业务客户端获取查询凭证,并基于查询凭证从身份管理系统获取可验证声明,以使第一用户对可验证声明中的业务数据进行验证处理;其中,查询凭证是通过区块链系统生成,业务数据是业务服务端接收到的第一用户关于目标业务的业务数据。由此,实现了对业务服务端接收到的业务数据的有效验证,避免了因业务数据被篡改而给第一用户造成损失的风险,有利于提升线上业务办理的有效性;再者,基于区块链系统生成查询凭证,确保了查询凭证的真实性以及查询凭证与可验证声明的唯一关联性,避免了查询凭证或可验证声明的伪造风险,进而确保了验证的有效性。
需要说明的是,本说明书中关于数据的验证处理设备的实施例与本说明书中关于数据的验证处理方法的实施例基于同一发明构思,因此该实施例的具体实施可参见前述对应的数据的验证处理方法的实施,重复之处不再赘述。
进一步地,对应上述描述的数据的验证处理方法,基于相同的技术构思,本说明书实施例还提供了一种存储介质,用于存储计算机可执行指令,一个具体的实施例中,该存储介质可为U盘、光盘、硬盘等,该存储介质存储的计算机可执行指令在被处理器执行时,能实现以下流程:接收业务服务端发送的可验证声明的创建请求;其中,所述创建请求用于请求基于所述业务服务端接收到的第一用户关于目标业务的业务数据创建可验证声明;根据所述创建请求创建可验证声明;其中,所述可验证声明的内容数据包括所述业务数据;根据所述可验证声明向区块链系统发送查询凭证生成请求,所述查询凭证生成请求用于请求所述区块链系统将生成的所述可验证声明的查询凭证发送给所述第一用户的与所述业务服务端对应的业务客户端;所述查询凭证用于所述业务客户端获取所述可验证声明,并根据所述第一用户提交的所述目标业务的业务数据对获取的所述可验证声明中的业务数据进行验证处理。
可选地,该存储介质存储的计算机可执行指令在被处理器执行时,所述根据所述创建请求创建可验证声明,包括:若确定所述创建请求符合预设的创建条件,则根据所述创建请求创建可验证声明。
可选地,该存储介质存储的计算机可执行指令在被处理器执行时,所述根据所述可验证声明向区块链系统发送查询凭证生成请求之后,还包括:接收所述业务客户端基于所述查询凭证发送的查询请求,根据所述查询请求获取所述可验证声明,将获取的所述可验证声明发送给所述业务客户端;或,接收查询客户端基于所述查询凭证发送的查询请求,根据所述查询请求获取所述可验证声明,将获取的所述可验证声明发送给所述查询客户端;其中,所述查询客户端根据预设方式从所述业务客户端获取所述查询凭证。
本说明书实施例提供的存储介质存储的计算机可执行指令在被处理器执行时,基 于业务服务端接收到的第一用户关于目标业务的业务数据创建可验证声明,并通过区块链系统生成可验证声明的查询凭证,将查询凭证发送给业务客户端,使得业务客户端可基于查询凭证获取可验证声明,并对可验证声明中的业务数据进行验证处理。由此,实现了对业务服务端接收到的业务数据的有效验证,避免了因业务数据被篡改而给第一用户造成损失的风险,有利于提升线上业务办理的有效性;再者,基于区块链系统生成查询凭证,确保了查询凭证的真实性以及查询凭证与可验证声明的唯一关联性,避免了查询凭证或可验证声明的伪造风险,进而确保了验证的有效性。
另一个具体的实施例中,该存储介质可为U盘、光盘、硬盘等,该存储介质存储的计算机可执行指令在被处理器执行时,能实现以下流程:接收身份管理系统发送的查询凭证生成请求;其中,所述查询凭证生成请求用于请求生成待验证的可验证声明的查询凭证;所述可验证声明的内容数据包括业务服务端接收到的第一用户关于目标业务的业务数据;基于区块链根据所述查询凭证生成请求生成所述可验证声明的所述查询凭证;将所述查询凭证发送给所述第一用户的与所述业务服务端对应的业务客户端;所述查询凭证用于所述业务客户端获取所述可验证声明,并根据所述第一用户提交的所述目标业务的业务数据对获取的所述可验证声明中的业务数据进行验证处理。
可选地,该存储介质存储的计算机可执行指令在被处理器执行时,所述基于区块链根据所述查询凭证生成请求生成所述可验证声明的所述查询凭证,包括:调用区块链中部署的第一智能合约,基于所述第一智能合约根据所述查询凭证生成请求生成所述可验证声明的所述查询凭证。
可选地,该存储介质存储的计算机可执行指令在被处理器执行时,所述根据所述查询凭证生成请求生成所述可验证声明的所述查询凭证,包括:根据所述查询凭证生成请求获取所述可验证声明的哈希值,根据所述哈希值生成所述查询凭证。
可选地,该存储介质存储的计算机可执行指令在被处理器执行时,所述基于区块链根据所述查询凭证生成请求生成所述可验证声明的所述查询凭证之后,还包括:将所述查询凭证的生成记录信息保存至区块链中。
本说明书实施例提供的存储介质存储的计算机可执行指令在被处理器执行时,在接收到查询凭证生成请求时,生成待验证的可验证声明的查询凭证并发送给业务客户端,使得业务客户端可基于查询凭证获取可验证声明,并对可验证声明中的业务数据进行验证处理;其中,可验证声明中的业务数据是业务服务端接收到的第一用户关于目标业务的业务数据。由此,实现了对业务服务端接收到的业务数据的有效验证,避免了因业务数据被篡改而给第一用户造成损失的风险,有利于提升线上业务办理的有效性;再者,基于区块链系统生成查询凭证,确保了查询凭证的真实性以及查询凭证与可验证声明的唯一关联性,避免了查询凭证或可验证声明的伪造风险,进而确保了验证的有效性。
另一个具体的实施例中,该存储介质可为U盘、光盘、硬盘等,该存储介质存储的计算机可执行指令在被处理器执行时,能实现以下流程:响应于第一用户的业务操作,向对应的业务服务端发送数据处理请求;所述数据处理请求用于请求所述业务服务端通过身份管理系统创建可验证声明,并通过区块链系统生成所述可验证声明的查询凭证;其中,所述可验证声明的内容数据包括所述第一用户关于目标业务的业务数据;根据接收到的所述查询凭证进行所述可验证声明的获取处理,以及根据所述第一用户提交的所述目标业务的业务数据对所述可验证声明中的业务数据进行验证处理。
可选地,该存储介质存储的计算机可执行指令在被处理器执行时,所述根据接收到的所述查询凭证进行所述可验证声明的获取处理,以及根据所述第一用户提交的所述目标业务的业务数据对所述可验证声明中的业务数据进行验证处理,包括:从所述查询凭证中获取所述可验证声明的哈希值;根据所述哈希值向所述身份管理系统发送查询请求,所述查询请求用于请求所述身份管理系统根据所述哈希值获取对应的所述可验证声明;接收所述身份管理系统发送的所述可验证声明;将所述可验证声明中的业务数据与 获取的所述第一用户提交的所述目标业务的业务数据进行匹配处理。
可选地,该存储介质存储的计算机可执行指令在被处理器执行时,所述根据接收到的所述查询凭证进行所述可验证声明的获取处理,以及根据所述第一用户提交的所述目标业务的业务数据对所述可验证声明中的业务数据进行验证处理,包括:展示获取的所述第一用户提交的所述目标业务的业务数据,并按照预设方式将所述查询凭证提供给所述第一用户的查询客户端;所述查询凭证用于所述查询客户端向所述身份管理系统发送查询请求,并展示所述身份管理系统发送的所述可验证声明,使所述第一用户将所述可验证声明中的业务数据与展示的所述业务数据进行匹配处理。
本说明书实施例提供的存储介质存储的计算机可执行指令在被处理器执行时,通过向业务服务端发送数据处理请求,从而业务服务端请求身份管理系统基于业务服务端接收到的第一用户关于目标业务的业务数据创建可验证声明,并通过区块链系统生成可验证声明的查询凭证,将查询凭证发送给业务客户端,使得业务客户端可基于查询凭证获取可验证声明,并对可验证声明中的业务数据进行验证处理。由此,实现了对业务服务端接收到的业务数据的有效验证,避免了因业务数据被篡改而给第一用户造成损失的风险,有利于提升线上业务办理的有效性;再者,基于区块链系统生成查询凭证,确保了查询凭证的真实性以及查询凭证与可验证声明的唯一关联性,避免了查询凭证或可验证声明的伪造风险,进而确保了验证的有效性。
另一个具体的实施例中,该存储介质可为U盘、光盘、硬盘等,该存储介质存储的计算机可执行指令在被处理器执行时,能实现以下流程:接收业务客户端发送的数据处理请求,根据所述数据处理请求确定第一用户关于目标业务的待验证的业务数据;根据所述业务数据向身份管理系统发送可验证声明的创建请求,所述创建请求用于请求所述身份管理系统创建包括所述业务数据的可验证声明,并通过区块链系统将生成的所述可验证声明的查询凭证发送给所述业务客户端;所述查询凭证用于所述业务客户端获取所述可验证声明,并根据第一用户提交的所述目标业务的业务数据对获取的所述可验证声明中的业务数据进行验证处理。
可选地,该存储介质存储的计算机可执行指令在被处理器执行时,所述根据所述业务数据向身份管理系统发送可验证声明的创建请求之后,还包括:接收所述区块链系统或所述身份管理系统发送的所述查询凭证;将所述查询凭证发送给所述业务客户端。
本说明书实施例提供的存储介质存储的计算机可执行指令在被处理器执行时,基于确定的第一用户关于目标业务的业务数据请求身份管理系统创建可验证声明,并通过区块链系统生成可验证声明的查询凭证,将查询凭证发送给业务客户端,使得业务客户端可基于查询凭证获取可验证声明,并对可验证声明中的业务数据进行验证处理。由此,实现了对业务服务端接收到的业务数据的有效验证,避免了因业务数据被篡改而给第一用户造成损失的风险,有利于提升线上业务办理的有效性;再者,基于区块链系统生成查询凭证,确保了查询凭证的真实性以及查询凭证与可验证声明的唯一关联性,避免了查询凭证或可验证声明的伪造风险,进而确保了验证的有效性。
该存储介质可为U盘、光盘、硬盘等,该存储介质存储的计算机可执行指令在被处理器执行时,能实现以下流程:响应于第一用户的查询操作,根据预设方式从业务客户端获取待验证的可验证声明的查询凭证;其中,所述查询凭证由区块链系统根据身份管理系统发送的查询凭证生成请求,基于所述可验证声明所生成;根据所述查询凭证向所述身份管理系统发送查询请求;接收所述身份管理系统发送的所述可验证声明,展示所述可验证声明;所述可验证声明用于所述第一用户将所述可验证声明中的业务数据与所述业务客户端展示的所述第一用户提交的业务数据进行匹配处理。
可选地,该存储介质存储的计算机可执行指令在被处理器执行时,所述根据预设方式从业务客户端获取待验证的可验证声明的查询凭证,包括:扫描所述业务客户端展示的所述查询凭证,得到所述可验证声明的哈希值;或,接收所述业务客户端发送的所 述哈希值,所述哈希值由所述业务客户端解析所述查询凭证所获得;或,接收业务客户端发送所述查询凭证,解析所述查询凭证得到所述可验证声明的哈希值;所述根据所述查询凭证向所述身份管理系统发送查询请求,包括:根据所述哈希值向所述身份管理系统发送查询请求。
本说明书实施例提供的存储介质存储的计算机可执行指令在被处理器执行时,通过从业务客户端获取查询凭证,并基于查询凭证从身份管理系统获取可验证声明,以使第一用户对可验证声明中的业务数据进行验证处理;其中,查询凭证是通过区块链系统生成,业务数据是业务服务端接收到的第一用户关于目标业务的业务数据。由此,实现了对业务服务端接收到的业务数据的有效验证,避免了因业务数据被篡改而给第一用户造成损失的风险,有利于提升线上业务办理的有效性;再者,基于区块链系统生成查询凭证,确保了查询凭证的真实性以及查询凭证与可验证声明的唯一关联性,避免了查询凭证或可验证声明的伪造风险,进而确保了验证的有效性。
需要说明的是,本说明书中关于存储介质的实施例与本说明书中关于数据的验证处理方法的实施例基于同一发明构思,因此该实施例的具体实施可参见前述对应的数据的验证处理方法的实施,重复之处不再赘述。
上述对本说明书特定实施例进行了描述。其它实施例在所附权利要求书的范围内。在一些情况下,在权利要求书中记载的动作或步骤可按照不同于实施例中的顺序来执行且仍然可实现期望的结果。另外,在附图中描绘的过程不一定要求示出的特定顺序或连续顺序才能实现期望的结果。在某些实施方式中,多任务处理和并行处理也是可的或可能是有利的。
在20世纪90年代,对于一个技术的改进可很明显地区分是硬件上的改进(例如,对二极管、晶体管、开关等电路结构的改进)还是软件上的改进(对于方法流程的改进)。然而,随着技术的发展,当今的很多方法流程的改进已经可视为硬件电路结构的直接改进。设计人员几乎都通过将改进的方法流程编程到硬件电路中来得到相应的硬件电路结构。因此,不能说一个方法流程的改进就不能用硬件实体模块来实现。例如,可编程逻辑器件(Programmable Logic Device,PLD)(例如现场可编程门阵列(Field Programmable Gate Array,FPGA))就是这样一种集成电路,其逻辑功能由用户对器件编程来确定。由设计人员自行编程来把一个数字系统“集成”在一片PLD上,而不需要请芯片制造厂商来设计和制作专用的集成电路芯片。而且,如今,取代手工地制作集成电路芯片,这种编程也多半改用“逻辑编译器(logic compiler)”软件来实现,它与程序开发撰写时所用的软件编译器相类似,而要编译之前的原始代码也得用特定的编程语言来撰写,此称之为硬件描述语言(Hardware Description Language,HDL),而HDL也并非仅有一种,而是有许多种,如ABEL(Advanced Boolean Expression Language)、AHDL(Altera Hardware Description Language)、Confluence、CUPL(Cornell University Programming Language)、HDCal、JHDL(Java Hardware Description Language)、Lava、Lola、MyHDL、PALASM、RHDL(Ruby Hardware Description Language)等,目前最普遍使用的是VHDL(Very-High-Speed Integrated Circuit Hardware Description Language)与Verilog。本领域技术人员也应该清楚,只需要将方法流程用上述几种硬件描述语言稍作逻辑编程并编程到集成电路中,就可很容易得到实现该逻辑方法流程的硬件电路。
控制器可按任何适当的方式实现,例如,控制器可采取例如微处理器或处理器以及存储可由该(微)处理器执行的计算机可读程序代码(例如软件或固件)的计算机可读介质、逻辑门、开关、专用集成电路(Application Specific Integrated Circuit,ASIC)、可编程逻辑控制器和嵌入微控制器的形式,控制器的例子包括但不限于以下微控制器:ARC 625D、Atmel AT91SAM、Microchip PIC18F26K20以及Silicone Labs C8051F320,存储器控制器还可被实现为存储器的控制逻辑的一部分。本领域技术人员也知道,除了以纯计算机可读程序代码方式实现控制器以外,完全可通过将方法步骤进行逻辑编程来 使得控制器以逻辑门、开关、专用集成电路、可编程逻辑控制器和嵌入微控制器等的形式来实现相同功能。因此这种控制器可被认为是一种硬件部件,而对其内包括的用于实现各种功能的装置也可视为硬件部件内的结构。或甚至,可将用于实现各种功能的装置视为既可是实现方法的软件模块又可是硬件部件内的结构。
上述实施例阐明的系统、装置、模块或单元,具体可由计算机芯片或实体实现,或由具有某种功能的产品来实现。一种典型的实现设备为计算机。具体的,计算机例如可为个人计算机、膝上型计算机、蜂窝电话、相机电话、智能电话、个人数字助理、媒体播放器、导航设备、电子邮件设备、游戏控制台、平板计算机、可穿戴设备或这些设备中的任何设备的组合。
为了描述的方便,描述以上装置时以功能分为各种单元分别描述。当然,在实施本说明书实施例时可把各单元的功能在同一个或多个软件和/或硬件中实现。
本领域内的技术人员应明白,本说明书实施例可提供为方法、系统或计算机程序产品。因此,本说明书实施例可采用完全硬件实施例、完全软件实施例、或结合软件和硬件方面的实施例的形式。而且,本说明书可采用在一个或多个包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。
本说明书是参照根据本说明书实施例的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。
在一个典型的配置中,计算设备包括一个或多个处理器(CPU)、输入/输出接口、网络接口和内存。
内存可能包括计算机可读介质中的非永久性存储器,随机存取存储器(RAM)和/或非易失性内存等形式,如只读存储器(ROM)或闪存(flash RAM)。内存是计算机可读介质的示例。
计算机可读介质包括永久性和非永久性、可移动和非可移动媒体可由任何方法或技术来实现信息存储。信息可是计算机可读指令、数据结构、程序的模块或其他数据。计算机的存储介质的例子包括,但不限于相变内存(PRAM)、静态随机存取存储器(SRAM)、动态随机存取存储器(DRAM)、其他类型的随机存取存储器(RAM)、只读存储器(ROM)、电可擦除可编程只读存储器(EEPROM)、快闪记忆体或其他内存技术、只读光盘只读存储器(CD-ROM)、数字多功能光盘(DVD)或其他光学存储、磁盒式磁带,磁带磁盘存储或其他磁性存储设备或任何其他非传输介质,可用于存储可被计算设备访问的信息。按照本文中的界定,计算机可读介质不包括暂存电脑可读媒体(transitory media),如调制的数据信号和载波。
还需要说明的是,术语“包括”、“包含”或其任何其他变体意在涵盖非排他性的包含, 从而使得包括一系列要素的过程、方法、商品或设备不仅包括那些要素,而且还包括没有明确列出的其他要素,或是还包括为这种过程、方法、商品或设备所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括所述要素的过程、方法、商品或设备中还存在另外的相同要素。
本说明书实施例可在由计算机执行的计算机可执行指令的一般上下文中描述,例如程序模块。一般地,程序模块包括执行特定任务或实现特定抽象数据类型的例程、程序、对象、组件、数据结构等等。也可在分布式计算环境中实践本说明书的实施例,在这些分布式计算环境中,由通过通信网络而被连接的远程处理设备来执行任务。在分布式计算环境中,程序模块可位于包括存储设备在内的本地和远程计算机存储介质中。
本说明书中的各个实施例均采用递进的方式描述,各个实施例之间相同相似的部分互相参见即可,每个实施例重点说明的都是与其他实施例的不同之处。尤其,对于系统实施例而言,由于其基本相似于方法实施例,所以描述的比较简单,相关之处参见方法实施例的部分说明即可。
以上所述仅为本文件的实施例而已,并不用于限制本文件。对于本领域技术人员来说,本文件可有各种更改和变化。凡在本文件的精神和原理之内所作的任何修改、等同替换、改进等,均应包含在本文件的权利要求范围之内。

Claims (42)

  1. 一种数据的验证处理方法,包括:
    接收业务服务端发送的可验证声明的创建请求;其中,所述创建请求用于请求基于所述业务服务端接收到的第一用户关于目标业务的业务数据创建可验证声明;
    根据所述创建请求创建可验证声明;其中,所述可验证声明的内容数据包括所述业务数据;
    根据所述可验证声明向区块链系统发送查询凭证生成请求,所述查询凭证生成请求用于请求所述区块链系统将生成的所述可验证声明的查询凭证发送给所述第一用户的与所述业务服务端对应的业务客户端;所述查询凭证用于所述业务客户端获取所述可验证声明,并根据所述第一用户提交的所述目标业务的业务数据对获取的所述可验证声明中的业务数据进行验证处理。
  2. 根据权利要求1所述的方法,所述根据所述创建请求创建可验证声明,包括:
    若确定所述创建请求符合预设的创建条件,则根据所述创建请求创建可验证声明。
  3. 根据权利要求2所述的方法,所述确定所述创建请求符合预设的创建条件,包括:
    若获取到所述业务服务端的第一数字身份信息、所述第一用户的第二数字身份信息和第一签名数据,且对所述第一签名数据验证通过,则确定所述创建请求符合预设的创建条件;其中,所述第一签名数据是基于所述第一数字身份信息所对应的第一私钥对第一指定数据进行签名处理所得。
  4. 根据权利要求3所述的方法,所述根据所述创建请求创建可验证声明,包括:
    根据身份管理系统的第三数字身份信息所对应的第二私钥对第二指定数据进行签名处理,得到第二签名数据;
    将所述第一数字身份信息、所述第二数字身份信息、所述第一签名数据、所述第二签名数据和所述创建请求包括的所述业务数据确定为内容数据,根据所述内容数据创建所述可验证声明。
  5. 根据权利要求3所述的方法,所述方法还包括:
    若确定所述业务服务端和/或所述第一用户未申请数据身份信息,则根据获取的所述业务服务端的服务端信息和/或所述第一用户的用户信息,生成所述业务服务端的所述第一数字身份信息和/或所述第一用户的所述第二数字身份信息。
  6. 根据权利要求1所述的方法,所述根据所述可验证声明向区块链系统发送查询凭证生成请求之后,还包括:
    接收所述业务客户端基于所述查询凭证发送的查询请求,根据所述查询请求获取所述可验证声明,将获取的所述可验证声明发送给所述业务客户端;或,
    接收查询客户端基于所述查询凭证发送的查询请求,根据所述查询请求获取所述可验证声明,将获取的所述可验证声明发送给所述查询客户端;其中,所述查询客户端根据预设方式从所述业务客户端获取所述查询凭证。
  7. 根据权利要求6所述的方法,所述根据所述可验证声明向区块链系统发送查询凭证生成请求,包括:
    根据所述可验证声明生成所述查询凭证生成请求,将所述查询凭证生成请求发送给所述区块链系统;所述查询凭证生成请求用于请求所述区块链系统根据预设方式对所述可验证声明进行哈希处理得到哈希值,根据所述哈希值生成所述可验证声明的查询凭证,并将基于所述哈希值和所述可验证声明生成的所述查询凭证的生成记录信息保存至区块链中;
    所述根据所述查询请求获取所述可验证声明,包括:
    从所述查询请求中获取所述哈希值,根据获取的所述哈希值从所述区块链中获取关联保存的所述可验证声明。
  8. 根据权利要求6所述的方法,所述根据所述可验证声明向区块链系统发送查询凭证生成请求,包括:
    根据预设方式对所述可验证声明进行哈希处理得到哈希值,根据所述哈希值生成查询凭证生成请求;
    将所述查询凭证生成请求发送给所述区块链系统,所述查询凭证生成请求用于请求所述区块链系统根据所述哈希值生成所述可验证声明的查询凭证,并将所述查询凭证的生成记录信息保存至区块链中;
    将所述可验证证明和所述哈希值关联保存至指定的存储区域;
    所述根据所述查询请求获取所述可验证声明,包括:
    从所述查询请求中获取所述哈希值,根据获取的所述哈希值从所述存储区域中获取关联保存的所述可验证声明。
  9. 一种数据的验证处理方法,包括:
    接收身份管理系统发送的查询凭证生成请求;其中,所述查询凭证生成请求用于请求生成待验证的可验证声明的查询凭证;所述可验证声明的内容数据包括业务服务端接收到的第一用户关于目标业务的业务数据;
    基于区块链根据所述查询凭证生成请求生成所述可验证声明的所述查询凭证;
    将所述查询凭证发送给所述第一用户的与所述业务服务端对应的业务客户端;所述查询凭证用于所述业务客户端获取所述可验证声明,并根据所述第一用户提交的所述目标业务的业务数据对获取的所述可验证声明中的业务数据进行验证处理。
  10. 根据权利要求9所述的方法,所述基于区块链根据所述查询凭证生成请求生成所述可验证声明的所述查询凭证,包括:
    调用区块链中部署的第一智能合约,基于所述第一智能合约根据所述查询凭证生成请求生成所述可验证声明的所述查询凭证。
  11. 根据权利要求9所述的方法,所述根据所述查询凭证生成请求生成所述可验证声明的所述查询凭证,包括:
    根据所述查询凭证生成请求获取所述可验证声明的哈希值,根据所述哈希值生成所述查询凭证。
  12. 根据权利要求11所述的方法,所述根据所述查询凭证生成请求获取所述可验证声明的哈希值,包括:
    从所述查询凭证生成请求中获取所述可验证声明的哈希值;或,
    从所述查询凭证生成请求中获取所述可验证声明,根据预设方式对获取的所述可验证声明进行哈希处理得到哈希值。
  13. 根据权利要求9所述的方法,所述将所述查询凭证发送给所述业务客户端,包括:
    通过所述身份管理系统将所述查询凭证发送给所述业务客户端;或,
    通过所述业务服务端将所述查询凭证发送给所述业务客户端。
  14. 根据权利要求9所述的方法,所述基于区块链根据所述查询凭证生成请求生成所述可验证声明的所述查询凭证之后,还包括:
    将所述查询凭证的生成记录信息保存至区块链中。
  15. 一种数据的验证处理方法,包括:
    响应于第一用户的业务操作,向对应的业务服务端发送数据处理请求;所述数据处理请求用于请求所述业务服务端通过身份管理系统创建可验证声明,并通过区块链系统生成所述可验证声明的查询凭证;其中,所述可验证声明的内容数据包括所述第一用户关于目标业务的业务数据;
    根据接收到的所述查询凭证进行所述可验证声明的获取处理,以及根据所述第一用户提交的所述目标业务的业务数据对所述可验证声明中的业务数据进行验证处理。
  16. 根据权利要求15所述的方法,所述响应于第一用户的业务操作,向业务服务端发送数据处理请求,包括:
    响应于所述第一用户的提交操作,获取所述第一用户提交的所述目标业务的业务数据,根据所述业务数据向业务服务端发送业务处理请求;
    所述方法还包括:
    若确定所述验证处理通过,则向所述业务服务端发送验证通过信息;所述验证通过信息用于指示所述业务服务端根据所述业务数据进行业务处理。
  17. 根据权利要求15所述的方法,所述响应于第一用户的业务操作,向业务服务端发送数据处理请求,包括:
    响应于所述第一用户的验证操作,确定所述第一用户关于待验证的目标业务的业务标识信息,根据所述业务标识信息向业务服务端发送验证请求。
  18. 根据权利要求15所述的方法,所述根据接收到的所述查询凭证进行所述可验证声明的获取处理,以及根据所述第一用户提交的所述目标业务的业务数据对所述可验证声明中的业务数据进行验证处理,包括:
    从所述查询凭证中获取所述可验证声明的哈希值;
    根据所述哈希值向所述身份管理系统发送查询请求,所述查询请求用于请求所述身份管理系统根据所述哈希值获取对应的所述可验证声明;
    接收所述身份管理系统发送的所述可验证声明;
    将所述可验证声明中的业务数据与获取的所述第一用户提交的所述目标业务的业务数据进行匹配处理。
  19. 根据权利要求18所述的方法,所述将所述可验证声明中的业务数据与获取的所述第一用户提交的所述目标业务的业务数据进行匹配处理,包括:
    根据确定的所述身份管理系统的第三数字身份信息,获取所述第三数字身份信息对应的公钥;
    若根据所述公钥对所述可验证声明中的第二签名数据验证通过,则将所述可验证声明中的业务数据与获取的所述第一用户提交的所述目标业务的业务数据进行匹配处理。
  20. 根据权利要求15所述的方法,所述根据接收到的所述查询凭证进行所述可验证声明的获取处理,以及根据所述第一用户提交的所述目标业务的业务数据对所述可验证声明中的业务数据进行验证处理,包括:
    展示获取的所述第一用户提交的所述目标业务的业务数据,并按照预设方式将所述查询凭证提供给所述第一用户的查询客户端;所述查询凭证用于所述查询客户端向所述身份管理系统发送查询请求,并展示所述身份管理系统发送的所述可验证声明,使所述第一用户将所述可验证声明中的业务数据与展示的所述业务数据进行匹配处理。
  21. 一种数据的验证处理方法,包括:
    接收业务客户端发送的数据处理请求,根据所述数据处理请求确定第一用户关于目标业务的待验证的业务数据;
    根据所述业务数据向身份管理系统发送可验证声明的创建请求,所述创建请求用于请求所述身份管理系统创建包括所述业务数据的可验证声明,并通过区块链系统将生成的所述可验证声明的查询凭证发送给所述业务客户端;所述查询凭证用于所述业务客户端获取所述可验证声明,并根据第一用户提交的所述目标业务的业务数据对获取的所述可验证声明中的业务数据进行验证处理。
  22. 根据权利要求21所述的方法,所述接收业务客户端发送的数据处理请求,根据所述数据处理请求确定第一用户关于目标业务的待验证的业务数据,包括:
    接收业务客户端发送的业务处理请求,将所述业务处理请求包括的业务数据确定为第一用户关于目标业务的待验证的业务数据;
    所述根据所述业务数据向身份管理系统发送可验证声明的创建请求之后,还包括:
    若接收到所述业务客户端发送的验证通过信息,则根据所述业务数据进行业务处理。
  23. 根据权利要求21所述的方法,所述接收业务客户端发送的数据处理请求,根据所述数据处理请求确定第一用户关于目标业务的待验证的业务数据,包括:
    接收业务客户端发送的验证请求;
    根据所述验证请求中的所述第一用户关于所述目标业务的业务标识信息,从保存的业务标识信息与业务数据的关联关系中获取关联的业务数据;
    将获取的所述业务数据确定为所述第一用户关于所述目标业务的待验证的业务数据。
  24. 根据权利要求21所述的方法,所述根据所述业务数据向身份管理系统发送可验证声明的创建请求之后,还包括:
    接收所述区块链系统或所述身份管理系统发送的所述查询凭证;
    将所述查询凭证发送给所述业务客户端。
  25. 一种数据的验证处理方法,包括:
    响应于第一用户的查询操作,根据预设方式从业务客户端获取待验证的可验证声明的查询凭证;其中,所述查询凭证由区块链系统根据身份管理系统发送的查询凭证生成请求,基于所述可验证声明所生成;
    根据所述查询凭证向所述身份管理系统发送查询请求;
    接收所述身份管理系统发送的所述可验证声明,展示所述可验证声明;所述可验证声明用于所述第一用户将所述可验证声明中的业务数据与所述业务客户端展示的所述第一用户提交的业务数据进行匹配处理。
  26. 根据权利要求25所述的方法,所述根据预设方式从业务客户端获取待验证的可验证声明的查询凭证,包括:
    扫描所述业务客户端展示的所述查询凭证,得到所述可验证声明的哈希值;或,接收所述业务客户端发送的所述哈希值,所述哈希值由所述业务客户端解析所述查询凭证所获得;或,接收业务客户端发送所述查询凭证,解析所述查询凭证得到所述可验证声明的哈希值;
    所述根据所述查询凭证向所述身份管理系统发送查询请求,包括:
    根据所述哈希值向所述身份管理系统发送查询请求。
  27. 根据权利要求25所述的方法,所述展示所述可验证声明,包括:
    根据确定的所述身份管理系统的第三数字身份信息获取所述第三数字身份信息对应的公钥;
    若根据所述公钥对所述可验证声明中的第二签名数据验证通过,则展示所述可验证声明。
  28. 一种数据的验证处理装置,包括:
    接收模块,接收业务服务端发送的可验证声明的创建请求;其中,所述创建请求用于请求基于所述业务服务端接收到的第一用户关于目标业务的业务数据创建可验证声明;
    创建模块,根据所述创建请求创建可验证声明;其中,所述可验证声明的内容数据包括所述业务数据;
    发送模块,根据所述可验证声明向区块链系统发送查询凭证生成请求,所述查询凭证生成请求用于请求所述区块链系统将生成的所述可验证声明的查询凭证发送给所述第一用户的与所述业务服务端对应的业务客户端;所述查询凭证用于所述业务客户端获取所述可验证声明,并根据所述第一用户提交的所述目标业务的业务数据对获取的所述可验证声明中的业务数据进行验证处理。
  29. 一种数据的验证处理装置,包括:
    接收模块,接收身份管理系统发送的查询凭证生成请求;其中,所述查询凭证生成 请求用于请求生成待验证的可验证声明的查询凭证;所述可验证声明的内容数据包括业务服务端接收到的第一用户关于目标业务的业务数据;
    生成模块,基于区块链根据所述查询凭证生成请求生成所述可验证声明的所述查询凭证;
    发送模块,将所述查询凭证发送给所述第一用户的与所述业务服务端对应的业务客户端;所述查询凭证用于所述业务客户端获取所述可验证声明,并根据所述第一用户提交的所述目标业务的业务数据对获取的所述可验证声明中的业务数据进行验证处理。
  30. 一种数据的验证处理装置,包括:
    发送模块,响应于第一用户的业务操作,向对应的业务服务端发送数据处理请求;所述数据处理请求用于请求所述业务服务端通过身份管理系统创建可验证声明,并通过区块链系统生成所述可验证声明的查询凭证;其中,所述可验证声明的内容数据包括所述第一用户关于目标业务的业务数据;
    处理模块,根据接收到的所述查询凭证进行所述可验证声明的获取处理,以及根据所述第一用户提交的所述目标业务的业务数据对所述可验证声明中的业务数据进行验证处理。
  31. 一种数据的验证处理装置,包括
    接收模块,接收业务客户端发送的数据处理请求,根据所述数据处理请求确定第一用户关于目标业务的待验证的业务数据;
    发送模块,根据所述业务数据向身份管理系统发送可验证声明的创建请求,所述创建请求用于请求所述身份管理系统创建包括所述业务数据的可验证声明,并通过区块链系统将生成的所述可验证声明的查询凭证发送给所述业务客户端;所述查询凭证用于所述业务客户端获取所述可验证声明,并根据第一用户提交的所述目标业务的业务数据对获取的所述可验证声明中的业务数据进行验证处理。
  32. 一种数据的验证处理装置,包括:
    获取模块,响应于第一用户的查询操作,根据预设方式从业务客户端获取待验证的可验证声明的查询凭证;其中,所述查询凭证由区块链系统根据身份管理系统发送的查询凭证生成请求,基于所述可验证声明所生成;
    发送模块,根据所述查询凭证向所述身份管理系统发送查询请求;
    接收模块,接收所述身份管理系统发送的所述可验证声明;
    展示模块,展示所述可验证声明;所述可验证声明用于所述第一用户将所述可验证声明中的业务数据与所述业务客户端展示的所述第一用户提交的业务数据进行匹配处理。
  33. 一种数据的验证处理设备,包括:
    处理器;以及,
    被安排成存储计算机可执行指令的存储器,所述可执行指令在被执行时使所述处理器:
    接收业务服务端发送的可验证声明的创建请求;其中,所述创建请求用于请求基于所述业务服务端接收到的第一用户关于目标业务的业务数据创建可验证声明;
    根据所述创建请求创建可验证声明;其中,所述可验证声明的内容数据包括所述业务数据;
    根据所述可验证声明向区块链系统发送查询凭证生成请求,所述查询凭证生成请求用于请求所述区块链系统将生成的所述可验证声明的查询凭证发送给所述第一用户的与所述业务服务端对应的业务客户端;所述查询凭证用于所述业务客户端获取所述可验证声明,并根据所述第一用户提交的所述目标业务的业务数据对获取的所述可验证声明中的业务数据进行验证处理。
  34. 一种数据的验证处理设备,包括:
    处理器;以及,
    被安排成存储计算机可执行指令的存储器,所述可执行指令在被执行时使所述处理器:
    接收身份管理系统发送的查询凭证生成请求;其中,所述查询凭证生成请求用于请求生成待验证的可验证声明的查询凭证;所述可验证声明的内容数据包括业务服务端接收到的第一用户关于目标业务的业务数据;
    基于区块链根据所述查询凭证生成请求生成所述可验证声明的所述查询凭证;
    将所述查询凭证发送给所述第一用户的与所述业务服务端对应的业务客户端;所述查询凭证用于所述业务客户端获取所述可验证声明,并根据所述第一用户提交的所述目标业务的业务数据对获取的所述可验证声明中的业务数据进行验证处理。
  35. 一种数据的验证处理设备,包括:
    处理器;以及,
    被安排成存储计算机可执行指令的存储器,所述可执行指令在被执行时使所述处理器:
    响应于第一用户的业务操作,向对应的业务服务端发送数据处理请求;所述数据处理请求用于请求所述业务服务端通过身份管理系统创建可验证声明,并通过区块链系统生成所述可验证声明的查询凭证;其中,所述可验证声明的内容数据包括所述第一用户关于目标业务的业务数据;
    根据接收到的所述查询凭证进行所述可验证声明的获取处理,以及根据所述第一用户提交的所述目标业务的业务数据对所述可验证声明中的业务数据进行验证处理。
  36. 一种数据的验证处理设备,包括:
    处理器;以及,
    被安排成存储计算机可执行指令的存储器,所述可执行指令在被执行时使所述处理器:
    接收业务客户端发送的数据处理请求,根据所述数据处理请求确定第一用户关于目标业务的待验证的业务数据;
    根据所述业务数据向身份管理系统发送可验证声明的创建请求,所述创建请求用于请求所述身份管理系统创建包括所述业务数据的可验证声明,并通过区块链系统将生成的所述可验证声明的查询凭证发送给所述业务客户端;所述查询凭证用于所述业务客户端获取所述可验证声明,并根据第一用户提交的所述目标业务的业务数据对获取的所述可验证声明中的业务数据进行验证处理。
  37. 一种数据的验证处理设备,包括:
    处理器;以及,
    被安排成存储计算机可执行指令的存储器,所述可执行指令在被执行时使所述处理器:
    响应于第一用户的查询操作,根据预设方式从业务客户端获取待验证的可验证声明的查询凭证;其中,所述查询凭证由区块链系统根据身份管理系统发送的查询凭证生成请求,基于所述可验证声明所生成;
    根据所述查询凭证向所述身份管理系统发送查询请求;
    接收所述身份管理系统发送的所述可验证声明,展示所述可验证声明;所述可验证声明用于所述第一用户将所述可验证声明中的业务数据与所述业务客户端展示的所述第一用户提交的业务数据进行匹配处理。
  38. 一种存储介质,用于存储计算机可执行指令,所述计算机可执行指令在被处理器执行时实现以下流程:
    接收业务服务端发送的可验证声明的创建请求;其中,所述创建请求用于请求基于所述业务服务端接收到的第一用户关于目标业务的业务数据创建可验证声明;
    根据所述创建请求创建可验证声明;其中,所述可验证声明的内容数据包括所述业务数据;
    根据所述可验证声明向区块链系统发送查询凭证生成请求,所述查询凭证生成请求用于请求所述区块链系统将生成的所述可验证声明的查询凭证发送给所述第一用户的与所述业务服务端对应的业务客户端;所述查询凭证用于所述业务客户端获取所述可验证声明,并根据所述第一用户提交的所述目标业务的业务数据对获取的所述可验证声明中的业务数据进行验证处理。
  39. 一种存储介质,用于存储计算机可执行指令,所述计算机可执行指令在被处理器执行时实现以下流程:
    接收身份管理系统发送的查询凭证生成请求;其中,所述查询凭证生成请求用于请求生成待验证的可验证声明的查询凭证;所述可验证声明的内容数据包括业务服务端接收到的第一用户关于目标业务的业务数据;
    基于区块链根据所述查询凭证生成请求生成所述可验证声明的所述查询凭证;
    将所述查询凭证发送给所述第一用户的与所述业务服务端对应的业务客户端;所述查询凭证用于所述业务客户端获取所述可验证声明,并根据所述第一用户提交的所述目标业务的业务数据对获取的所述可验证声明中的业务数据进行验证处理。
  40. 一种存储介质,用于存储计算机可执行指令,所述计算机可执行指令在被处理器执行时实现以下流程:
    响应于第一用户的业务操作,向对应的业务服务端发送数据处理请求;所述数据处理请求用于请求所述业务服务端通过身份管理系统创建可验证声明,并通过区块链系统生成所述可验证声明的查询凭证;其中,所述可验证声明的内容数据包括所述第一用户关于目标业务的业务数据;
    根据接收到的所述查询凭证进行所述可验证声明的获取处理,以及根据所述第一用户提交的所述目标业务的业务数据对所述可验证声明中的业务数据进行验证处理。
  41. 一种存储介质,用于存储计算机可执行指令,所述计算机可执行指令在被处理器执行时实现以下流程:
    接收业务客户端发送的数据处理请求,根据所述数据处理请求确定第一用户关于目标业务的待验证的业务数据;
    根据所述业务数据向身份管理系统发送可验证声明的创建请求,所述创建请求用于请求所述身份管理系统创建包括所述业务数据的可验证声明,并通过区块链系统将生成的所述可验证声明的查询凭证发送给所述业务客户端;所述查询凭证用于所述业务客户端获取所述可验证声明,并根据第一用户提交的所述目标业务的业务数据对获取的所述可验证声明中的业务数据进行验证处理。
  42. 一种存储介质,用于存储计算机可执行指令,所述计算机可执行指令在被处理器执行时实现以下流程:
    响应于第一用户的查询操作,根据预设方式从业务客户端获取待验证的可验证声明的查询凭证;其中,所述查询凭证由区块链系统根据身份管理系统发送的查询凭证生成请求,基于所述可验证声明所生成;
    根据所述查询凭证向所述身份管理系统发送查询请求;
    接收所述身份管理系统发送的所述可验证声明,展示所述可验证声明;所述可验证声明用于所述第一用户将所述可验证声明中的业务数据与所述业务客户端展示的所述第一用户提交的业务数据进行匹配处理。
PCT/CN2022/073694 2021-01-27 2022-01-25 数据验证处理的方法、装置及设备 WO2022161343A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202110112919.XA CN112434348B (zh) 2021-01-27 2021-01-27 数据的验证处理方法、装置及设备
CN202110112919.X 2021-01-27

Publications (1)

Publication Number Publication Date
WO2022161343A1 true WO2022161343A1 (zh) 2022-08-04

Family

ID=74697325

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/073694 WO2022161343A1 (zh) 2021-01-27 2022-01-25 数据验证处理的方法、装置及设备

Country Status (2)

Country Link
CN (1) CN112434348B (zh)
WO (1) WO2022161343A1 (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115150103A (zh) * 2022-08-29 2022-10-04 人民法院信息技术服务中心 基于区块链的数字凭证离线验证方法、装置及设备
CN116915415A (zh) * 2023-09-13 2023-10-20 哈尔滨工程大学三亚南海创新发展基地 一种基于数字凭证的数据验证方法及系统

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112434348B (zh) * 2021-01-27 2021-04-20 支付宝(杭州)信息技术有限公司 数据的验证处理方法、装置及设备
CN113221142A (zh) * 2021-05-11 2021-08-06 支付宝(杭州)信息技术有限公司 授权业务的处理方法、装置、设备及系统

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190222424A1 (en) * 2018-01-12 2019-07-18 Nok Nok Labs, Inc. System and method for binding verifiable claims
CN110795501A (zh) * 2019-10-11 2020-02-14 支付宝(杭州)信息技术有限公司 基于区块链的可验证声明的创建方法、装置、设备及系统
CN111431936A (zh) * 2020-04-17 2020-07-17 支付宝(杭州)信息技术有限公司 基于可验证声明的授权处理方法、装置、设备及系统
CN112434348A (zh) * 2021-01-27 2021-03-02 支付宝(杭州)信息技术有限公司 数据的验证处理方法、装置及设备

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190222424A1 (en) * 2018-01-12 2019-07-18 Nok Nok Labs, Inc. System and method for binding verifiable claims
CN110795501A (zh) * 2019-10-11 2020-02-14 支付宝(杭州)信息技术有限公司 基于区块链的可验证声明的创建方法、装置、设备及系统
CN111431936A (zh) * 2020-04-17 2020-07-17 支付宝(杭州)信息技术有限公司 基于可验证声明的授权处理方法、装置、设备及系统
CN112434348A (zh) * 2021-01-27 2021-03-02 支付宝(杭州)信息技术有限公司 数据的验证处理方法、装置及设备

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115150103A (zh) * 2022-08-29 2022-10-04 人民法院信息技术服务中心 基于区块链的数字凭证离线验证方法、装置及设备
CN115150103B (zh) * 2022-08-29 2022-11-29 人民法院信息技术服务中心 基于区块链的数字凭证离线验证方法、装置及设备
CN116915415A (zh) * 2023-09-13 2023-10-20 哈尔滨工程大学三亚南海创新发展基地 一种基于数字凭证的数据验证方法及系统
CN116915415B (zh) * 2023-09-13 2023-12-19 哈尔滨工程大学三亚南海创新发展基地 一种基于数字凭证的数据验证方法及系统

Also Published As

Publication number Publication date
CN112434348A (zh) 2021-03-02
CN112434348B (zh) 2021-04-20

Similar Documents

Publication Publication Date Title
WO2022161343A1 (zh) 数据验证处理的方法、装置及设备
US11303603B2 (en) System and method for identity resolution across disparate distributed immutable ledger networks
JP6859513B2 (ja) 2次元コード生成の方法およびデバイス、ならびに2次元コード認識の方法およびデバイス
WO2021068636A1 (zh) 基于区块链的可验证声明的创建方法、装置、设备及系统
WO2021114937A1 (zh) 一种基于区块链的业务处理方法、装置及设备
WO2021239104A1 (zh) 基于区块链的业务处理
WO2021227966A1 (zh) 绑定处理
CN111986764B (zh) 基于区块链的医疗数据分享方法、装置、终端及存储介质
TW201909015A (zh) 登錄資訊處理方法及設備
US20120036365A1 (en) Combining request-dependent metadata with media content
US10819520B2 (en) Identity proofing offering for customers and non-customers
CN111931154B (zh) 基于数字凭证的业务处理方法、装置及设备
WO2022022245A1 (zh) 数字物权凭证的生成方法、装置及设备
WO2021208743A1 (zh) 应用程序的账户绑定
CN110633309A (zh) 一种区块链交易处理方法及装置
WO2019165875A1 (zh) 一种交易处理方法、服务器、客户端及系统
WO2023207086A1 (zh) 一种基于区块链的用户数据流转方法、装置及设备
TWI812366B (zh) 一種資料共用方法、裝置、設備及存儲介質
WO2022265740A1 (en) Cross-session issuance of verifiable credential
WO2022088710A1 (zh) 一种镜像管理方法及装置
EP4040720A1 (en) Secure identity card using unclonable functions
US20240129288A1 (en) Privacy-protection based verification
US11861587B1 (en) Encrypted multi-factor authentication technologies
US11349671B2 (en) Authenticating communication
US12002088B2 (en) Identity proofing offering for customers and non-customers

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22745218

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 22745218

Country of ref document: EP

Kind code of ref document: A1