Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A self-certified digital identity management system and method based on smart contracts

A digital identity and smart contract technology, applied in the field of information security, can solve problems such as being easy to be tampered with, users cannot have control over information data, and information data cannot be modified and deleted at will.

Active Publication Date: 2020-07-24
安徽中科晶格技术有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The central organization that stores this information can use its information and data for commercial profit without the user's knowledge or permission, and can delete and tamper with the user's data, resulting in the arbitrary theft of user information and data
[0004]2. At present, most systems adopt the traditional username-password login method. Due to the independence of different systems and different requirements for passwords, users need to memorize a large number of different passwords. password, causing great inconvenience to users logging in to the system
[0005]3. Users cannot have control over their own information and data, and cannot modify or delete information and data stored in different systems at will, and need to follow the format requirements of different systems Uploading data in the corresponding format makes it difficult to share data with other organizations, which is not conducive to data sharing and unified management
[0006]4. The digital information stored in most of the systems cannot be verified safely and effectively, which makes the third-party system unable to determine the legitimacy and accuracy of the information uploaded by users
If verified, the process is cumbersome and vulnerable to tampering attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A self-certified digital identity management system and method based on smart contracts
  • A self-certified digital identity management system and method based on smart contracts
  • A self-certified digital identity management system and method based on smart contracts

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0065] In this embodiment, a smart contract-based self-certified digital identity management system, such as figure 1 As shown, including: ordinary identity terminal, authoritative identity terminal, identity cloud server, smart contract on blockchain and distributed database under blockchain;

[0066] Identity terminals are terminal applications installed on device terminals such as smartphones, tablet computers, desktop computers, and notebooks, and are divided into ordinary identity terminals and authoritative identity terminals. Ordinary identity terminals mainly enter the user's digital information, complete the registration of digital identity and encrypt and upload digital information through the identity cloud server interaction interface, and authorize the digital information to other identity terminals through the identity cloud server interaction interface. Ordinary identity terminals include: key generation module, two-dimensional code module, digital identity regi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a self-certified digital identity management system and method based on a smart contract. An identity terminal sends a public key and associated digital information to a cloudserver via the Internet, and accomplishes registration and login of digital identity, and the authorization, operation and verification of digital information depending on the smart contract on a block chain and a distributed database under the block chain. A unique identity of the whole network can be provided, passwordless login is achieved by scanning a two-dimensional code, the login mode of the traditional username and password is broken through, and a user entirety can securely and effectively manage the digital identity and the associated digital information, on-demand authorization, operation and verification of information are achieved, thus realizing a decentralized, self-certified digital identity management system.

Description

technical field [0001] The invention relates to the field of information security, in particular to a smart contract-based self-authentication digital identity management system and a method thereof. Background technique [0002] As a global distributed database system, blockchain has the characteristics of unforgeable tampering and data sharing across the network. Because of these good characteristics, the application of blockchain technology in identity verification and management has attracted unanimous attention from both academia and industry . However, most of the traditional Internet identity systems adopt centralized technical solutions. Even in the current identity system that adopts decentralized technical solutions, there are the following defects: [0003] 1. Digital identities and related data are stored in a single centralized mechanism, which not only increases data maintenance costs, but also increases the risk of data leakage and theft. Attackers can steal...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3239H04L9/3247H04L63/0442H04L63/0478H04L63/0876H04L63/102
Inventor 赵赫周桐李芳李晓风谭海波张中贤王卫东吕波
Owner 安徽中科晶格技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products