Method, system, computer device and readable storage medium for identity information authentication

A technology for identity information authentication and identity information, applied in computer security devices, computing, digital data authentication, etc., can solve problems such as lack of timeliness of information, improve timeliness and data accuracy, and achieve the effect of decentralization

Active Publication Date: 2021-07-20
HANGZHOU CCHC DIGITAL TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present application provides a method, system, computer equipment, and computer-readable storage medium for identity information authentication, so as to at least solve the problem in the related art that the information provided by the third-party authentication institution through the authentication service lacks timeliness

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, system, computer device and readable storage medium for identity information authentication
  • Method, system, computer device and readable storage medium for identity information authentication
  • Method, system, computer device and readable storage medium for identity information authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] In order to make the purpose, technical solutions and advantages of the present application clearer, the present application will be described and illustrated below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application. Based on the embodiments provided in the present application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the protection scope of the present application.

[0044] Obviously, the accompanying drawings in the following description are only some examples or embodiments of the present application, and those skilled in the art can also apply the present application to other similar scenarios. In addition, it can also be understood that although such development efforts may be complex and lengthy, for those of ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present application relates to a method, system, computer equipment, and readable storage medium for identity information authentication, wherein the identity information authentication method includes: obtaining first identity information of a first requesting party, and signing the first identity information , get the first signature; send the first signature and the first identity information to the blockchain, and the blockchain saves the first signature, the first identity information and the public key to the smart contract, where the public The key is used to verify the first signature. Through this application, the lack of timeliness of information provided by third-party certification agencies through certification services is solved, the decentralization of enterprise certification is realized, and the timeliness and data accuracy of enterprises in the certification process are improved.

Description

technical field [0001] The present application relates to the technical field of block chain, in particular to a method, system, computer equipment and readable storage medium for identity information authentication. Background technique [0002] With the development of Internet technology, there are more and more scenarios that require identity authentication. Among them, identity authentication means that an enterprise provides its own identity information in the process of processing business, and the authentication agency verifies the identity information of the enterprise to determine the identity of the enterprise. A process that has permission to use certain resources. [0003] In related technologies, the certification information provided by the third-party certification agency does not have an authoritative organization to endorse its information source, and often does not have strong legal effect, and the correctness of the certification information itself is not ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/31G06F21/64G06F21/62
CPCG06F21/31G06F21/6218G06F21/64
Inventor 姜勇陈宇峰王泽伟张思同周昕韩永楠
Owner HANGZHOU CCHC DIGITAL TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products