区块链身份验证方案怎么写,区块链身份验证方案设计
请查看相关英文文档
❶ At what stage does blockchain cross-border transactions undergo identity verification?
Transaction initiation stage.
Blockchain development is still in its emerging stage, and it will take time to cultivate talents. Relying on the underlying technical characteristics, traceability and transactions can be carried out safely, efficiently and at low cost.
Blockchain is a database with data hash verification function. Blocks are data blocks. Data blocks are combined into a chain structure in chronological order, and cryptographic algorithms are used to record data in a distributed manner. In an accounting manner, the reliability of the database is collectively maintained, and all data blocks are connected in chronological order to form a blockchain.
❷ Application analysis of decentralized DID identity authentication
The purpose of decentralized DID is to support the sharing of IDs in multiple networks while protecting user privacy. interoperability to build a better web ecosystem. The previous chapter, Technical Analysis of Decentralized DID Identity Authentication, introduced the basic technical principles of DID. In this chapter, we briefly describe several DID usage scenarios.
Nowadays, people are accustomed to scanning QR codes on WeChat to log in, or logging in with Alipay authorization, etc., so that they can log in directly to third-party websites using WeChat accounts and Alipay accounts. Therefore, our personal information is kept by WeChat and Alipay. We believe that these large websites will not crash or leak our data. However, the phenomenon of "big data killing familiarity" is a counterexample. Websites use our data to control our payments. This is a drawback of centralized management of user information.
Take the registration of primary school students as an example. When registering, parents need to show their household registration book (to prove that the child has a local household registration and is indeed the parent’s child), and a real estate certificate (to prove that the house belongs to the parent and the child belongs to the parent). The house does belong to the school district to which it belongs) plus other marriage certificates, vaccination certificates, etc. These certificates are all in paper form and have been stamped and confirmed by the relevant departments. It's just that it's very troublesome to use. Parents need to bring all the documents. If they are lost, it is very cumbersome to replace them.
The "Guangdong Health Code" and "Macau Health Code" interoperability project implemented by WeBank is based on blockchain + DID technology to achieve cross-border identity authentication, allowing mainland tourists to Macau to In addition to providing nucleic acid certificates, you only need to apply for the "Guangdong Health Code" to easily pass the customs. There is no need to fill in the Macao local health code again.
Taking buying a house as an example again, when buying a houseIn the early stage, the sales office will require the home buyer to present a proof of funds (for example, deposit > 5 million). In this case, the home buyer needs to transfer funds from several banks to one bank. After collecting 5 million, the home buyer will then issue a certificate to the house. Sales office. For home buyers, moving funds back and forth between several banks is a loss and the amount is also revealed.
If DID is used, it will be much more convenient (the prerequisite is that multiple banks, home buyers, and sales offices have already registered DID on the blockchain). The process is as shown in the figure below.
The home buyer has bank deposit certificates VC given by multiple banks. He can combine the amounts in these VCs, then add the zero-knowledge proof ZKP proof to hide the specific amount, and convert it into VP after signing. To the sales office. After the sales office verified the correctness of this VP and the proof of zero-knowledge proof ZKP, it was confirmed that the home buyer had more than 5 million in funds, but did not know the specific amount.
With the expansion of the types of IoT devices, the data of the Internet of Things has gradually become richer, but the security of the Internet of Things devices and the credibility of the Internet of Things data have gradually attracted people's attention.
If IoT devices can be identified with DID, the security of IoT devices can be controlled and the credibility of the data can be confirmed from the source.
Taking machines in a factory as an example, each machine is assigned a DID by its manufacturer. When the machine is running, a large amount of production data will be generated. These production data (non-sensitive) can be signed, and the data, signature results and DID are saved on the blockchain.
The manufacturer of the machine can know the operating status of the machine based on the data on the chain, which facilitates better after-sales maintenance services.
When an enterprise needs a loan, the bank can judge the production and operation status of the enterprise and assess the loan risk based on the production data on the blockchain and the endorsement of the machine manufacturer. (This is also a scenario where blockchain is used across multiple organizations)
Taking cloud disk data sharing as an example, if I want to send some photos on the network disk to publishers,Apply for a link on the cloud disk, add an access password, and give it to the publisher for access. The publisher can retrieve the photos with this number, but the password may be reused by others, causing my photos to be leaked.
Using the DID method, data can be shared with users relatively safely, as shown in the figure below (premise: the data custodian, data party, and user have all registered DID on the blockchain).
< br /> This chapter briefly introduces several usage scenarios of DID, which I have collected so far. But what you learn on paper is ultimately shallow. In the future, you can try a variety of DIDs and discover more real applications.
❸ What is the identity verification based on blockchain technology?
Specifically, it is to verify the ID card and driver's license information entered by the user, and then verify the ID card and driver's license information that have passed the verification. ID card information is marked as valid, and ID card and driver's license information that has not passed verification is marked as invalid. For more exciting application issues, you can pay attention to the SMIC Blockchain Service Platform for real-time understanding
❹ Blockchain How to verify digital identity
You should fill in your personal identity information, real name, avatar nickname, mobile phone number, Alipay, scan your face, and pay one yuan to verify your identity
❺ area The relationship between blockchain and digital identity
This article is translated from: https://www.gsma.com/identity/the-relationship-between-blockchain-and-digital-identity
The word "identity" is often used to mean subtly different things. The Oxford English Dictionary succinctly defines it as "the fact of who or what a person or thing is"; ISO29115 prefers a broader definition: "a set of attributes associated with an entity".
Thus, identity is not a single characteristic but a set of attributes that vary across relationships, and the diversity of these relationships can increase the credibility of the claimed identity through corroboration.
In the physical world, this is fairly simple. For example, a government agency can certify a citizen's photo, name, and address; this information can be corroborated through an identity check conducted by a bank or telecom provider that is regulated to "know your customer," thus enhancing the relationship with a given The credibility of identity-related attributes, thereby enhancing the credibility of the identity itself.
Digital identity needs to function in a similar way, but the nature of the digital world makes it more difficult.
In particular, some of the key challenges facing digital identity include:
These requirements are also the fundamental building blocks behind blockchain.
A user’s digital identity can be represented in the blockchain as follows:
Here, the user’s identity enters the blockchain starting as a self-declared block, which contains the user’s The identity attribute (hash) and the user's public key, all of which are signed with the user's private key. At this stage, trust in the user's identity is at a basic level.
Other entities (such as banks or electricity suppliers with which the user has a relationship) are also represented in the blockchain, with their own hash properties and sets of public keys. These entities can establish a relationship with a user by signing the specific hashed attributes of the user associated with the relationship. For example, Passport Office can sign a hashed address, name, and subject photo if the attribute value asserted by the user matches the value recorded by Passport Office.
As more and more relationships are built for a user in the blockchain, trust in the accuracy of the attributes (and therefore the identity itself) will naturally grow. Furthermore, as more transactions involve the user (other users or entities verify or trust the user's hashed properties), the "reputation capital" of the identity grows. In other words, confidence in the accuracy of the identity will increase, as will confidence in the trustworthiness of the person behind the identity based on what they do online - all of which is transparent to anyone It can be seen through the blockchain.
If any relationship between user and entity changes, a separate block with a cryptographically signed timestamp can be established in the blockchain, allowing any new validators to cryptographically Observe previous relationships and current relationships in protected sequences.
A key aspect of any service that users interact with is finding the right balance between convenience and security. As Eve Maler once pointed out, "An app that is 0% secure and 100% functional is still an app, but an app that is 100% secure and 0% functional is useless."
Blocks that represent digital identities in the blockchain are identified using a public key associated with a user, while the corresponding private key is the credential the user needs to maintain protected. So, in a sense, the public key can be considered equivalent to the user ID, while the private key is equivalent to a "password" or biometric.
However, the public key is not a convenient "user ID", and the private key is not something easily remembered (like a password) or something inherent to the user (like a biometric). Storing a private key securely to ensure it cannot be used by others, while being able to easily use it to assert relevant identities, is a real challenge.
One solution is to introduce the concept of a wallet, through which users can self-assert their properties and manage their public and private keys. This wallet can then be identified by a more convenient user ID (such as the user's MSISDN) and unlocked using traditional multi-factor authentication mechanisms. Users can then prove ownership of the private key, thereby confirming their identity.
Mobile Connect is an ideal framework to support such wallets, providing users with a simple authentication method that is both convenient and secure.
The decentralized way of mobile-connected managed wallets and blockchain-managed identities is a perfect solution to provide digital identities and provide them to users in a "convenient and secure" way.
❻ What method is used in the blockchain to determine its identity?
In the blockchain, Jinwowo Group believes that four uses public keys and private keys to identify identities. .
Public keys and private keys can also ensure the security of new point-to-point transmissions in distributed networks.
In blockchain information transmission, the encryption and decryption of the public keys and private keys of both parties often do not occur in pairs.
❼ How to set private privacy of Jack Ma’s blockchain
As a decentralized database technology, the private privacy setting of blockchain is a very important part. Jack Ma may set up the following aspects of privacy protection on his own blockchain:
1. Identity verification: On Jack Ma’s blockchain, individual users can protect their privacy through identity verification. This means that only authenticated users can access specific information.
2. Encrypted data: Jack Ma can use blockchain technology to encrypt personal data to prevent unauthorized access. This encryption technology protects user privacy by ensuring that only authorized users can access data.
3. Anonymous transactions: An anonymous transaction function can be set up on Jack Ma’s blockchain, allowing users to conduct transactions without exposing their identities. This approach can protect user privacy to the greatest extent.
4. Restrict access rights: Jack Ma can set access limits on the blockchain to only allow specific users or organizations to access specific information. This approach protects user privacy by ensuring that only authorized people have access to sensitive information.
In short, Jack Ma can protect himself through various means such as identity verification, encrypted data, anonymous transactions and restricted access rights.Blockchain private privacy. These measures ensure that users’ data and privacy are protected to the greatest extent possible.
- 上一篇: 没有数字货币区块链还可以吗
- 下一篇: 区块链论坛在珠海举行,珠海区块链上市公司