CN111787530A - Block chain digital identity management method based on SIM card - Google Patents

Block chain digital identity management method based on SIM card Download PDF

Info

Publication number
CN111787530A
CN111787530A CN202010780874.9A CN202010780874A CN111787530A CN 111787530 A CN111787530 A CN 111787530A CN 202010780874 A CN202010780874 A CN 202010780874A CN 111787530 A CN111787530 A CN 111787530A
Authority
CN
China
Prior art keywords
identity
card
user
information
verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010780874.9A
Other languages
Chinese (zh)
Other versions
CN111787530B (en
Inventor
白鑫
周政军
唐伟东
石磊
刘胜杰
赵国宝
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Unicom Xiongan Industrial Internet Co Ltd
Original Assignee
China Unicom Xiongan Industrial Internet Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Unicom Xiongan Industrial Internet Co Ltd filed Critical China Unicom Xiongan Industrial Internet Co Ltd
Priority to CN202010780874.9A priority Critical patent/CN111787530B/en
Publication of CN111787530A publication Critical patent/CN111787530A/en
Application granted granted Critical
Publication of CN111787530B publication Critical patent/CN111787530B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a block chain digital identity management method based on an SIM card, which comprises the following steps: the digital identity management App communicates with the BSIM card by calling the SDK; the user uploads user identity information through the digital identity management App, an operator performs verification and verification, and identity identification information formed by verification node information is uploaded to an identity alliance chain; generating a public and private key pair, and storing a private key in the BSIM card encryption logic unit card; when the identity is identified, the verifying party receives the application of the identity identification card, and retrieves identity identification information from the identity alliance chain according to the identity card transaction number; the user utilizes the private key in the BSIM card to authorize, and the verifying party can obtain the requested verification information after the user confirms the authorization. According to the block chain digital identity management method based on the SIM card, provided by the invention, the security of private key information is ensured through the encryption of software and hardware of the SIM card, and meanwhile, the block chain digital identity management method based on the SIM card is more convenient and fast.

Description

Block chain digital identity management method based on SIM card
Technical Field
The invention relates to the technical field of Internet identity authentication management, in particular to a block chain digital identity management method based on an SIM card.
Background
With the development of the internet of everything and the industrial internet, many new problems arise in the fields of data, asset and identity security, and the risk of identity information theft is one of them. Different from the traditional identity issuing mechanism, the difficulty of the internet in the identity generation and authentication process is high. The network user is required to authenticate the identity with real name when transacting important business, the identity faces huge risk of being stolen, the number of times of uploading the identity authentication by all Chinese internet users is more than 5 according to statistics, and the risk of identity privacy disclosure is greatly increased. Based on the problem, to thoroughly solve the problem of identity information security, a block chain technology is needed to build an identity management platform shared in the whole society based on user autonomous authorization, so that the problem of private key encryption of an identity management network based on a block chain becomes one of the main pain points in the background.
In the current industry, most private key protection is realized by using an encryption U shield or cold and hot separation of a plurality of mobile phones, so that the usability of identity management authentication is reduced, and meanwhile, the security risks in other aspects are increased. Therefore, a technical scheme for encrypting and storing the private key, which has higher security, lower hardware cost and more superior convenience, is needed at present.
Disclosure of Invention
The invention aims to provide a block chain digital identity management method based on an SIM card, which ensures the safety of private key information through the encryption of software and hardware of the SIM card and has more convenience, and a user can carry the private key information with the user for identity authentication by binding the SIM card with a mobile phone.
In order to achieve the purpose, the invention provides the following scheme:
a block chain digital identity management method based on an SIM card comprises the following steps:
s1, opening an account in a user mobile terminal, wherein the user mobile terminal is provided with a BSIM card for managing a block chain key and a digital identity management App based on the block chain, and the digital identity management App communicates with the BSIM card by calling an SDK;
s2, the user uploads the user identity information through the digital identity management App, the operator carries out audit verification, the identity identification information formed by the user identity information and the verification node information is uploaded to an identity alliance chain, and an identity card transaction number is returned;
s3, the user carries out decryption operation through the digital identity management App to generate seed, the BSIM card generates a public and private key pair in the card by using a key derivation algorithm according to the seed and stores the private key in the BSIM card encryption logic unit card, and the BSIM card returns the generated public key to the digital identity management App through the SDK and stores the public key in an identity alliance chain;
s4, when carrying out identity recognition, the verifying party receives the application of identity recognition card, according to the transaction number of identity card, retrieves the identity identification information from the identity alliance chain, finds the verification node information therein, and the operator verification node requests the user to confirm authorization;
s5, the user uses the private key in BSIM card to authorize, and the verifying party can obtain the requested verification information after the user confirms the authorization.
Optionally, in step S2, the user uploads user identity information through the digital identity management App, the operator performs audit verification, uploads identity identification information formed by the verification node information to the identity federation chain, and returns an identity card transaction number, which specifically includes:
the user uploads user identity information through the digital identity management App, the operator receives a signature identity file submitted by the user, the operator verifies the user certificate and the signature, and the identity information is verified through the operator real-name authentication system;
after the identity information is verified and verified, the operator private key is used for signing the identity file, the identity hash of the identity information after the hash algorithm and identity identification information consisting of verification node information are uploaded to an identity alliance chain by a background, and an identity card transaction number is returned.
Optionally, in step S3, the user performs a decryption operation through the digital identity management App to generate a seed, which specifically includes:
the digital identity management App calls the SDK to communicate with the BSIM card, sends a command for generating seed through a password or a living body authentication behavior input by a user, and the seed is encrypted by the user and then backed up at the cloud.
Optionally, the step S4 further includes:
the method comprises the steps that a verification party initiates an identity card request, a user provides identity verification or display to the verification party, the verification means whether service conditions are met or not, and the display means displaying specific content attributes;
the user provides a verification entrance for the verifier and issues a certificate application for identity recognition to the verifier, wherein the verification entrance is a two-dimensional code or an input text.
Optionally, the step S1 further includes filling in a name and a remark of an identity tag through the digital identity management App, selecting an identity type, and setting a security policy and security information, where the identity tag refers to different scenario identity information.
Optionally, in step S4, when performing identity recognition, the user selects a corresponding identity tag through the digital identity management App according to different application scenarios, and issues an identity recognition certification application to the verifier.
According to the specific embodiment provided by the invention, the invention discloses the following technical effects: the block chain digital identity management method based on the SIM card, provided by the invention, aims at the defects of the existing private key storage scheme, and provides a management technical scheme for storing private key information into the SIM card, the technical scheme has higher safety than the existing private key management mechanism, the security of the private key information is ensured through the encryption of software and hardware of the SIM card, and meanwhile, the SIM card is more convenient and fast, and a user can carry the private key information with him to perform identity authentication; the invention accords with the distributed multi-center identity identification protocol of the W3C DID specification, links the user identity identification (consisting of the user identity hash value and the verification node information) based on the block chain technology, provides a set of solution based on the W3C VC specification, and stores the actual identity of the main body and the content of the verifiable digital certificate under the chain.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings needed to be used in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings without inventive exercise.
FIG. 1 is a BSIM card based digital identity alliance of the present invention;
FIG. 2 is a schematic diagram of an identity enablement process and BSIM key generation according to the present invention;
fig. 3 is a schematic diagram of the process of using the identity management of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The invention aims to provide a block chain digital identity management method based on an SIM card, which ensures the safety of private key information through the encryption of software and hardware of the SIM card and has more convenience, and a user can carry the private key information with the user for identity authentication by binding the SIM card with a mobile phone.
In order to make the aforementioned objects, features and advantages of the present invention comprehensible, embodiments accompanied with figures are described in further detail below.
As shown in fig. 1 to fig. 3, the block chain digital identity management method based on a SIM card according to an embodiment of the present invention includes the following steps:
s1, opening an account in a user mobile terminal, wherein the user mobile terminal is provided with a BSIM card for managing a block chain key and a digital identity management App based on the block chain, and the digital identity management App communicates with the BSIM card by calling an SDK;
s2, the user uploads the user identity information through the digital identity management App, the operator carries out audit verification, the identity identification information formed by the user identity information and the verification node information is uploaded to an identity alliance chain, and an identity card transaction number is returned;
s3, the user carries out decryption operation through the digital identity management App to generate seed, the BSIM card generates a public and private key pair in the card by using a key derivation algorithm according to the seed and stores the private key in the BSIM card encryption logic unit card, and the BSIM card returns the generated public key to the digital identity management App through the SDK and stores the public key in an identity alliance chain;
s4, when carrying out identity recognition, the verifying party receives the application of identity recognition card, according to the transaction number of identity card, retrieves the identity identification information from the identity alliance chain, finds the verification node information therein, and the operator verification node requests the user to confirm authorization;
s5, the user uses the private key in BSIM card to authorize, and the verifying party can obtain the requested verification information after the user confirms the authorization.
In step S2, the user uploads user identity information through the digital identity management App, the operator performs audit verification, uploads identity identification information formed by the user identity information and verification node information to the identity federation chain, and returns an identity card transaction number, which specifically includes:
the user uploads user identity information through the digital identity management App, the operator receives a signature identity file submitted by the user, the operator verifies the user certificate and the signature, and the identity information is verified through the operator real-name authentication system;
after the identity information is verified and verified, the operator private key is used for signing the identity file, the identity hash of the identity information after the hash algorithm and identity identification information consisting of verification node information are uploaded to an identity alliance chain by a background, and an identity card transaction number is returned.
In step S3, the user performs decryption operation through the digital identity management App to generate a seed, which specifically includes:
the digital identity management App calls the SDK to communicate with the BSIM card, sends a command for generating seed through a password or a living body authentication behavior input by a user, and the seed is encrypted by the user and then backed up at the cloud.
The step S4 further includes:
the method comprises the steps that a verification party initiates an identity card request, a user provides identity verification or display to the verification party, the verification means whether service conditions are met or not, and the display means displaying specific content attributes;
the user provides a verification entrance for the verifier and issues a certificate application for identity recognition to the verifier, wherein the verification entrance is a two-dimensional code or an input text.
The step S1 further includes filling in names and remarks of identity labels through the digital identity management App, selecting identity types, and setting security policies and security information, where the identity labels refer to different scenario identity information.
In the step S4, when performing identity recognition, the user selects a corresponding identity tag through the digital identity management App according to different application scenarios, and issues an identity recognition certificate application to the verifier.
In the above technical solution, the present invention provides a scheme for performing digital identity management through an SIM card, which includes an SIM card (BSIM card for short) having an intelligent security system guarantee and managing a block chain key, a block chain-based digital identity management App (identity App for short), a set of SDKs (SDKs for short) for interaction between the identity App and the BSIM card, and a set of digital identity block chain alliance networks (identity alliance chains for short).
The identity alliance participant comprises a BSIM card issuer, an identity holder (user) and an identity identification verifier.
The issuer: the identity authentication and issuing operators usually have certain qualification and authority, such as the telecom operators for the real-name authentication of users.
The identity holder: the subject of identity authentication may be a person or an object or an organization.
Identity identification and verification: the scenario refers to a specific service requirement, such as a scenario requiring an admission mechanism or a scenario requiring a differentiated service subject. The identification party usually needs procedures of pre-identity identification, authentication and the like when providing admission or service.
The issuer prepares the federation node operating environment and generates the CA certificate. The identity holder generates a blockchain key pair. The block chain alliance management system registers information of an issuer and an identity holder and configures a CA certificate, and public keys of the issuer and the holder can be inquired as public information and the authority of a digital signature of the issuer can be verified by the public keys in the future.
A user installs a BSIM card on a smart device (e.g., a cell phone). The identity private key is not taken out of the card, encryption, decryption and signature operation are all executed in the card, and the security level of the hardware wallet level is achieved. The seed belongs to high-risk level data, and an operator provides seed ciphertext storage and management service so as to better serve customers to prevent the user from being unable to retrieve the asset after losing the BSIM card. Therefore, it is necessary to ensure that the operator cannot recover the seed unilaterally by multiple encryption means. In the future, when the client needs to restore the seed plaintext, the operator can only provide the seed ciphertext of the entrusted storage management, and then the user restores the seed ciphertext by himself; if the user does not enable the operator seed cryptograph storage service, the operator ensures that the risk notification is in place and signs corresponding disclaimer.
The user can log in the identity App and select an identity label (identity information of different scenes); the identification verifier retrieves and obtains a transaction ciphertext (or cache) from the digital identity alliance chain according to the selected identity tag; the App carries out identity authorization by using a private key in the SIM card; and the App generates a two-dimensional code from the verification entry, and provides the two-dimensional code for the identification party to read and verify.
The block chain digital identity management method based on the SIM card, provided by the invention, aims at the defects of the existing private key storage scheme, and provides a management technical scheme for storing private key information into the SIM card, the technical scheme has higher safety than the existing private key management mechanism, the security of the private key information is ensured through the encryption of software and hardware of the SIM card, and meanwhile, the SIM card is more convenient and fast, and a user can carry the private key information with him to perform identity authentication; the invention accords with the distributed multi-center identity identification protocol of the W3C DID specification, links the user identity identification (consisting of the user identity hash value and the verification node information) based on the block chain technology, provides a set of solution based on the W3C VC specification, and stores the actual identity of the main body and the content of the verifiable digital certificate under the chain.
The principles and embodiments of the present invention have been described herein using specific examples, which are provided only to help understand the method and the core concept of the present invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, the specific embodiments and the application range may be changed. In view of the above, the present disclosure should not be construed as limiting the invention.

Claims (6)

1. A block chain digital identity management method based on an SIM card is characterized by comprising the following steps:
s1, opening an account in a user mobile terminal, wherein the user mobile terminal is provided with a BSIM card for managing a block chain key and a digital identity management App based on the block chain, and the digital identity management App communicates with the BSIM card by calling an SDK;
s2, the user uploads the user identity information through the digital identity management App, the operator carries out audit verification, the identity identification information formed by the user identity information and the verification node information is uploaded to an identity alliance chain, and an identity card transaction number is returned;
s3, the user carries out decryption operation through the digital identity management App to generate seed, the BSIM card generates a public and private key pair in the card by using a key derivation algorithm according to the seed and stores the private key in the BSIM card encryption logic unit card, and the BSIM card returns the generated public key to the digital identity management App through the SDK and stores the public key in an identity alliance chain;
s4, when carrying out identity recognition, the verifying party receives the application of identity recognition card, according to the transaction number of identity card, retrieves the identity identification information from the identity alliance chain, finds the verification node information therein, and the operator verification node requests the user to confirm authorization;
s5, the user uses the private key in BSIM card to authorize, and the verifying party can obtain the requested verification information after the user confirms the authorization.
2. The method according to claim 1, wherein in step S2, the user uploads user identity information through a digital identity management App, the operator performs audit verification, uploads identity identification information formed by the verification node information to an identity federation chain, and returns an identity card transaction number, and the method specifically includes:
the user uploads user identity information through the digital identity management App, the operator receives a signature identity file submitted by the user, the operator verifies the user certificate and the signature, and the identity information is verified through the operator real-name authentication system;
after the identity information is verified and verified, the operator private key is used for signing the identity file, the identity hash of the identity information after the hash algorithm and identity identification information consisting of verification node information are uploaded to an identity alliance chain by a background, and an identity card transaction number is returned.
3. The method for managing a blockchain digital identity based on a SIM card according to claim 1, wherein in the step S3, the user performs a decryption operation through a digital identity management App to generate a seed, specifically comprising:
the digital identity management App calls the SDK to communicate with the BSIM card, sends a command for generating seed through a password or a living body authentication behavior input by a user, and the seed is encrypted by the user and then backed up at the cloud.
4. The SIM card-based blockchain digital identity management method according to claim 1, wherein the step S4 further comprises:
the method comprises the steps that a verification party initiates an identity card request, a user provides identity verification or display to the verification party, the verification means whether service conditions are met or not, and the display means displaying specific content attributes;
the user provides a verification entrance for the verifier and issues a certificate application for identity recognition to the verifier, wherein the verification entrance is a two-dimensional code or an input text.
5. The method for managing a blockchain digital identity of a SIM card according to claim 1, wherein the step S1 further includes filling in a name and a remark of an identity tag, selecting an identity type, and setting a security policy and security information through a digital identity management App, wherein the identity tag refers to different scenario identity information.
6. The method for managing digital identities of blockchains based on SIM cards according to claim 5, wherein in step S4, when performing identity recognition, the user selects a corresponding identity tag through a digital identity management App according to different application scenarios, and issues an identity recognition certification application to the verifier.
CN202010780874.9A 2020-08-06 2020-08-06 Block chain digital identity management method based on SIM card Active CN111787530B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010780874.9A CN111787530B (en) 2020-08-06 2020-08-06 Block chain digital identity management method based on SIM card

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010780874.9A CN111787530B (en) 2020-08-06 2020-08-06 Block chain digital identity management method based on SIM card

Publications (2)

Publication Number Publication Date
CN111787530A true CN111787530A (en) 2020-10-16
CN111787530B CN111787530B (en) 2024-01-09

Family

ID=72765867

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010780874.9A Active CN111787530B (en) 2020-08-06 2020-08-06 Block chain digital identity management method based on SIM card

Country Status (1)

Country Link
CN (1) CN111787530B (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112199448A (en) * 2020-12-04 2021-01-08 南京星链高科技发展有限公司 Industrial and commercial registration method and system based on block chain
CN112637855A (en) * 2020-12-15 2021-04-09 中国联合网络通信集团有限公司 Machine-card binding method based on block chain and server
CN112862481A (en) * 2021-01-25 2021-05-28 联通雄安产业互联网有限公司 Block chain digital asset key management method and system based on SIM card
CN112989381A (en) * 2021-03-24 2021-06-18 中国电子科技集团公司第三十研究所 Block chain anti-association-based uniform heterogeneous identity identification method
CN113014676A (en) * 2021-04-21 2021-06-22 联通雄安产业互联网有限公司 System and method for storing Internet of things data into block chain based on SIM card
CN113159800A (en) * 2021-04-07 2021-07-23 支付宝(杭州)信息技术有限公司 Identity authentication processing method and device
CN113163013A (en) * 2021-04-27 2021-07-23 中国工商银行股份有限公司 Block chain digital identity customizable generation method and device
CN114268511A (en) * 2022-03-03 2022-04-01 北京溪塔科技有限公司 Multi-communication network charging method and device based on block chain
CN114567881A (en) * 2022-04-24 2022-05-31 江苏益捷思信息科技有限公司 SIM card information security protection method and system
CN115002761A (en) * 2021-04-27 2022-09-02 中移互联网有限公司 Data processing method and device and electronic equipment

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1437375A (en) * 2002-02-08 2003-08-20 泰康亚洲(北京)科技有限公司 Confirmation method for safe mobile e-business platform digital certificate
US20140032898A1 (en) * 2012-07-26 2014-01-30 Shenzhen Skyworth-RGB electronics Co. Ltd. Authentication system and method for digital televisions
CN103747443A (en) * 2013-11-29 2014-04-23 厦门盛华电子科技有限公司 Multi-security domain device based on mobile phone user identification card and authentication method thereof
CN107820238A (en) * 2016-09-12 2018-03-20 国民技术股份有限公司 SIM card, block chain application security module, client and its method for safely carrying out
CN108012268A (en) * 2017-12-08 2018-05-08 北京虎符信息技术有限公司 A kind of mobile phone terminal SIM card and the method for safe handling App, medium
CN109767215A (en) * 2018-12-29 2019-05-17 杭州趣链科技有限公司 A kind of online block chain identity identifying method based on a variety of private key storage modes
CN109936569A (en) * 2019-02-21 2019-06-25 领信智链(北京)科技有限公司 A kind of decentralization digital identity login management system based on ether mill block chain
US20200076606A1 (en) * 2018-08-31 2020-03-05 Hewlett Packard Enterprise Development Lp Blockchain key storage on sim devices
WO2020061923A1 (en) * 2018-09-27 2020-04-02 区链通网络有限公司 Blockchain-based account management system and management method, and storage medium
US10637665B1 (en) * 2016-07-29 2020-04-28 Workday, Inc. Blockchain-based digital identity management (DIM) system
CN111182525A (en) * 2019-12-25 2020-05-19 中国联合网络通信集团有限公司 Method and device for storing data
CN111859348A (en) * 2020-07-31 2020-10-30 上海微位网络科技有限公司 Identity authentication method and device based on user identification module and block chain technology

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1437375A (en) * 2002-02-08 2003-08-20 泰康亚洲(北京)科技有限公司 Confirmation method for safe mobile e-business platform digital certificate
US20140032898A1 (en) * 2012-07-26 2014-01-30 Shenzhen Skyworth-RGB electronics Co. Ltd. Authentication system and method for digital televisions
CN103747443A (en) * 2013-11-29 2014-04-23 厦门盛华电子科技有限公司 Multi-security domain device based on mobile phone user identification card and authentication method thereof
US10637665B1 (en) * 2016-07-29 2020-04-28 Workday, Inc. Blockchain-based digital identity management (DIM) system
CN107820238A (en) * 2016-09-12 2018-03-20 国民技术股份有限公司 SIM card, block chain application security module, client and its method for safely carrying out
CN108012268A (en) * 2017-12-08 2018-05-08 北京虎符信息技术有限公司 A kind of mobile phone terminal SIM card and the method for safe handling App, medium
US20200076606A1 (en) * 2018-08-31 2020-03-05 Hewlett Packard Enterprise Development Lp Blockchain key storage on sim devices
WO2020061923A1 (en) * 2018-09-27 2020-04-02 区链通网络有限公司 Blockchain-based account management system and management method, and storage medium
CN109767215A (en) * 2018-12-29 2019-05-17 杭州趣链科技有限公司 A kind of online block chain identity identifying method based on a variety of private key storage modes
CN109936569A (en) * 2019-02-21 2019-06-25 领信智链(北京)科技有限公司 A kind of decentralization digital identity login management system based on ether mill block chain
CN111182525A (en) * 2019-12-25 2020-05-19 中国联合网络通信集团有限公司 Method and device for storing data
CN111859348A (en) * 2020-07-31 2020-10-30 上海微位网络科技有限公司 Identity authentication method and device based on user identification module and block chain technology

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
刘千仞;薛淼;任梦璇;王光全;: "基于区块链的数字身份应用与研究", 邮电设计技术, no. 04 *
梁峥;刘豪;: "区块链业务创新:数字身份认证", 通信企业管理, no. 11 *
王柏华;孙长杰;李照川;王伟兵;: "远程办公中基于区块链技术的身份认证方法", 信息安全研究, no. 04 *

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112199448A (en) * 2020-12-04 2021-01-08 南京星链高科技发展有限公司 Industrial and commercial registration method and system based on block chain
CN112637855A (en) * 2020-12-15 2021-04-09 中国联合网络通信集团有限公司 Machine-card binding method based on block chain and server
CN112637855B (en) * 2020-12-15 2022-11-29 中国联合网络通信集团有限公司 Machine-card binding method based on block chain and server
CN112862481A (en) * 2021-01-25 2021-05-28 联通雄安产业互联网有限公司 Block chain digital asset key management method and system based on SIM card
CN112862481B (en) * 2021-01-25 2024-05-14 联通雄安产业互联网有限公司 Block chain digital asset key management method and system based on SIM card
CN112989381A (en) * 2021-03-24 2021-06-18 中国电子科技集团公司第三十研究所 Block chain anti-association-based uniform heterogeneous identity identification method
CN112989381B (en) * 2021-03-24 2022-03-22 中国电子科技集团公司第三十研究所 Block chain anti-association-based uniform heterogeneous identity identification method
CN113159800A (en) * 2021-04-07 2021-07-23 支付宝(杭州)信息技术有限公司 Identity authentication processing method and device
CN113014676A (en) * 2021-04-21 2021-06-22 联通雄安产业互联网有限公司 System and method for storing Internet of things data into block chain based on SIM card
CN113014676B (en) * 2021-04-21 2023-11-03 联通雄安产业互联网有限公司 System and method for storing data of Internet of things into blockchain based on SIM card
CN113163013B (en) * 2021-04-27 2022-09-27 中国工商银行股份有限公司 Block chain digital identity customizable generation method and device
CN115002761A (en) * 2021-04-27 2022-09-02 中移互联网有限公司 Data processing method and device and electronic equipment
CN115002761B (en) * 2021-04-27 2023-09-05 中移互联网有限公司 Data processing method and device and electronic equipment
CN113163013A (en) * 2021-04-27 2021-07-23 中国工商银行股份有限公司 Block chain digital identity customizable generation method and device
CN114268511A (en) * 2022-03-03 2022-04-01 北京溪塔科技有限公司 Multi-communication network charging method and device based on block chain
CN114567881B (en) * 2022-04-24 2022-07-19 江苏益捷思信息科技有限公司 SIM card information security protection method and system
CN114567881A (en) * 2022-04-24 2022-05-31 江苏益捷思信息科技有限公司 SIM card information security protection method and system

Also Published As

Publication number Publication date
CN111787530B (en) 2024-01-09

Similar Documents

Publication Publication Date Title
CN111787530B (en) Block chain digital identity management method based on SIM card
CN109862041B (en) Digital identity authentication method, equipment, device, system and storage medium
US9860751B2 (en) Secure short message service (SMS) communications
US8335925B2 (en) Method and arrangement for secure authentication
CN111275419B (en) Block chain wallet signature right confirming method, device and system
CN111147432B (en) KYC data sharing system with confidentiality and method thereof
CN101103358A (en) Security code production method and methods of using the same, and programmable device therefor
CN109660534B (en) Multi-merchant-based security authentication method and device, electronic equipment and storage medium
CN109412812A (en) Data safe processing system, method, apparatus and storage medium
CN111131416A (en) Business service providing method and device, storage medium and electronic device
CN112232814A (en) Encryption and decryption method of payment key, payment authentication method and terminal equipment
CN109257416A (en) A kind of block chain cloud service network information management system
CN104951939A (en) Electronic bank card system and application method thereof as well as electronic method of bank card
CN112765626A (en) Authorization signature method, device and system based on escrow key and storage medium
CN109600296A (en) A kind of certificate chain instant communicating system and its application method
CN104125064A (en) Dynamic password authentication method, client and authentication system
CN106656955A (en) Communication method and system and user terminal
CN108234126B (en) System and method for remote account opening
US20230016488A1 (en) Document signing system for mobile devices
US20200259815A1 (en) User enrollment and authentication across providers having trusted authentication and identity management services
US20150302506A1 (en) Method for Securing an Order or Purchase Operation Means of a Client Device
CN113868713A (en) Data verification method and device, electronic equipment and storage medium
CN110086627B (en) Quantum communication service station key negotiation method and system based on asymmetric key pool pair and time stamp
Fourar-Laidi A smart card based framework for securing e-business transactions in distributed systems
US8621231B2 (en) Method and server for accessing an electronic safe via a plurality of entities

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant