[go: up one dir, main page]

TWM644096U - Data exchange system - Google Patents

Data exchange system Download PDF

Info

Publication number
TWM644096U
TWM644096U TW112201784U TW112201784U TWM644096U TW M644096 U TWM644096 U TW M644096U TW 112201784 U TW112201784 U TW 112201784U TW 112201784 U TW112201784 U TW 112201784U TW M644096 U TWM644096 U TW M644096U
Authority
TW
Taiwan
Prior art keywords
service node
user
node
certificate
verifiable
Prior art date
Application number
TW112201784U
Other languages
Chinese (zh)
Inventor
翁仲和
Original Assignee
金壹金融科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 金壹金融科技有限公司 filed Critical 金壹金融科技有限公司
Priority to TW112201784U priority Critical patent/TWM644096U/en
Publication of TWM644096U publication Critical patent/TWM644096U/en

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

A data exchange system at least includes a user node, a first service node, and a second service node, wherein both the first service node and the second service node are informationally connected to the user node. The user node holds a public key and a private key. The first service node keeps a user data, and uses the public key provided by the user node to process the user data, so as to generate a verifiable certificate (VC) and a certificate data, wherein the certificate data is sent to the user node for storage. The second service node obtains the VC through the certificate data, and then requires the user node to verify a credibility of the VC with the private key thereof. If the user node successfully verifies the credibility of the VC, the second service node can obtain at least a part of the user data.

Description

資料交換系統data exchange system

本創作關於一種分享資料的方法,尤指一種基於身分自主權(Self-sovereign identity,SSI)架構的資料交換系統。This work is about a method of sharing data, especially a data exchange system based on the framework of Self-sovereign identity (SSI).

在Web 2.0時代,數位身份的驗證係以平台為中心,例如臉書(Facebook)和谷歌(Google)都提供有相關服務,能替第三方單位代為驗證使用者的身份。但是中心化管理的數位身份所有資訊皆由平台負責管理,其安全性幾乎完全仰賴中心化平台維護,在商業實體應用方面具有安全風險,且即使風險再低,個人資料仍有機會在集中驗證的過程中受到直接或間接識別。In the era of Web 2.0, the verification of digital identity is centered on the platform. For example, Facebook (Facebook) and Google (Google) both provide related services, which can verify the identity of users on behalf of third-party units. However, all the information of the digital identity under centralized management is managed by the platform, and its security is almost entirely dependent on the maintenance of the centralized platform. It has security risks in commercial entity applications, and even if the risk is low, personal data still has the opportunity to be verified centrally. The process is directly or indirectly identified.

為進一步降低此一風險,有些技術開發單位提議使用碎片化的個人資料,輔以區塊鏈技術進行分散式驗證。然而,透過區塊鏈進行分散式驗證,需要耗費更多的算力,也會額外產生區塊鏈的服務費(gas fee),因此雖然降低了風險,但卻提高了成本。In order to further reduce this risk, some technology development units propose to use fragmented personal data, supplemented by blockchain technology for decentralized verification. However, decentralized verification through the blockchain requires more computing power and additional blockchain service fees (gas fee). Therefore, although the risk is reduced, the cost is increased.

目前亦有基於單一區塊鏈架構,搭配去中心化身份(Decentralized Identity,DID)及可驗證憑證(Verifiable Credential,VC)進行驗證的做法,能夠有效提高安全性,不過卻有區塊鏈整體網路負擔過大、VC檔案可能肥大,以及VC可能乘載機敏資料等問題,在實際運用層面上無法達成經濟效益,無法滿足現行金融法規及個資保護法規的要求,是以缺乏產業上的利用價值。At present, there are also verification methods based on a single blockchain architecture with decentralized identity (Decentralized Identity, DID) and verifiable credentials (Verifiable Credential, VC), which can effectively improve security. The road load is too heavy, VC files may be fat, and VC may carry sensitive information, etc., in terms of practical application, it cannot achieve economic benefits and cannot meet the requirements of current financial regulations and personal data protection regulations, so it lacks industrial use value .

另外,使用者的資料常常由不同公司分別管理,資料內容多有重複,也可能有不一致之處。若在公司之間需要進行資料同步或交換,通常會牽涉到許多手動進行的程序,資料流通既不安全,操作起來更是費時,不符合網路世代對便利性及安全性的要求。 In addition, user data is often managed separately by different companies, and the content of the data is often repeated or inconsistent. If it is necessary to synchronize or exchange data between companies, it usually involves many manual procedures. Data circulation is not safe, and the operation is time-consuming, which does not meet the convenience and security requirements of the Internet generation.

有鑑於此,本創作欲提供一種資料交換系統,能夠結合集中驗證與分散驗證的優點,成為一個可重複實施且經濟安全的驗證手段,並能夠有效地交換資料。 In view of this, this creation intends to provide a data exchange system that can combine the advantages of centralized verification and decentralized verification to become a repeatable and economical and safe verification method, and can exchange data effectively.

根據一實施例,本創作揭露一種資料交換系統,至少包含有一用戶節點、一第一服務節點,以及一第二服務節點。該用戶節點持有一公鑰及一私鑰,其中該公鑰及該私鑰為對應。該第一服務節點與該用戶節點資訊連接,且保管有一用戶資料;該第一服務節點使用該用戶節點提供的該公鑰以及該用戶資料產生一可驗證憑證(Verifiable Credential,VC)以及一憑證資訊,並將該憑證資訊傳送給該用戶節點留存。該第二服務節點與該用戶節點資訊連接;該第二服務節點利用該用戶節點提供的該憑證資訊取得該可驗證憑證,進而要求該用戶節點使用該私鑰驗證該可驗證憑證的可信度。若該用戶節點遵照該第二服務節點之要求而成功驗證該可驗證憑證的可信度,該第二服務節點獲准取得該第一服務節點所保管之該用戶資料的至少一部份。 According to an embodiment, the invention discloses a data exchange system, which at least includes a user node, a first service node, and a second service node. The user node holds a public key and a private key, wherein the public key and the private key are corresponding. The first service node is informationally connected with the user node, and keeps a user data; the first service node uses the public key provided by the user node and the user data to generate a verifiable certificate (Verifiable Credential, VC) and a certificate information, and send the credential information to the user node for storage. The second service node is informationally connected to the user node; the second service node uses the credential information provided by the user node to obtain the verifiable certificate, and then requires the user node to use the private key to verify the authenticity of the verifiable certificate . If the user node successfully verifies the authenticity of the verifiable certificate according to the request of the second service node, the second service node is allowed to obtain at least a part of the user information stored by the first service node.

於一實施例中,該可驗證憑證包含有一驗證訊息,且該第二服務節點在要求該用戶節點驗證該可驗證憑證的可信度時,係以該公鑰加密該可驗證憑證的該驗證訊息後傳送給該用戶節點,該用戶節點使用該私鑰解出該可驗證憑證的該驗證訊息,再回傳給該第二服務節點比對,若比對正確,則該用戶節點的一數位身份得到驗證。 In one embodiment, the verifiable certificate includes a verification message, and the second service node encrypts the verification of the verifiable certificate with the public key when requesting the user node to verify the authenticity of the verifiable certificate After the message is sent to the user node, the user node uses the private key to solve the verification message of the verifiable certificate, and then sends it back to the second service node for comparison. If the comparison is correct, a digit of the user node Identity is verified.

於一實施例中,該第一服務節點更將該可驗證憑證上鏈至一聯盟鏈,且該憑證資訊即是該可驗證憑證的一區塊鏈位址;該第二服務節點係利用該區塊鏈位址於該聯盟鏈取得該可驗證憑證。In one embodiment, the first service node further links the verifiable certificate to a consortium chain, and the certificate information is a block chain address of the verifiable certificate; the second service node uses the The blockchain address obtains the verifiable certificate in the consortium chain.

於一實施例中,該聯盟鏈採用權威共識證明(proof-of-authority,POA)為其共識演算法。In one embodiment, the consortium chain adopts proof-of-authority (POA) as its consensus algorithm.

於一實施例中,該聯盟鏈另透過一側鏈與一公鏈連接。In one embodiment, the consortium chain is connected to a public chain through a side chain.

於一實施例中,該第一服務節點係將該可驗證憑證保存於一星際檔案系統(InterPlanetary File System,IPFS),且該憑證資訊是該可驗證憑證的一內容辨識碼(content identifier,CID);該第二服務節點係利用該內容辨識碼取得該可驗證憑證。In one embodiment, the first service node stores the verifiable certificate in an InterPlanetary File System (IPFS), and the certificate information is a content identifier (CID) of the verifiable certificate ); the second service node obtains the verifiable certificate by using the content ID.

於一實施例中,該第一服務節點所保管之該用戶資料的至少一部份係包含於該可驗證憑證中;該第二服務節點係由該可驗證憑證中取得該用戶資料的該至少一部份。In one embodiment, at least a part of the user data kept by the first service node is included in the verifiable certificate; the second service node obtains the at least part of the user data from the verifiable certificate a part.

於一實施例中,該第一服務節點所保管之該用戶資料的至少一部份係透過一加密通道或使用一加密信封傳送給該第二服務節點。In one embodiment, at least a part of the user data stored by the first service node is transmitted to the second service node through an encrypted channel or an encrypted envelope.

於一實施例中,該第一服務節點係將該用戶資料保存於一星際檔案系統(InterPlanetary File System,IPFS),該第二服務節點係由該星際檔案系統取得該用戶資料的至少一部份。In one embodiment, the first service node saves the user data in an InterPlanetary File System (IPFS), and the second service node obtains at least a part of the user data from the InterPlanetary File System .

於一實施例中,該用戶節點所持有的該公鑰為一實體金鑰。In one embodiment, the public key held by the user node is a physical key.

前述的資料交換系統能夠滿足現行相關法規及個資保護的需求,且其安全性高,亦有效減輕於區塊鏈上運作的負擔;另外,本系統能夠安全方便地進行資料的交換,省去不必要的手動程序。有關本創作之前述及其他技術內容、特點與功效,在以下配合參考圖式之實施例的詳細說明中,將可清楚地呈現。The aforementioned data exchange system can meet the current relevant laws and regulations and the needs of personal information protection, and its security is high, and it can also effectively reduce the burden of operating on the blockchain; in addition, this system can exchange data safely and conveniently, eliminating the need for Unnecessary manual procedures. The aforementioned and other technical contents, features and functions of this creation will be clearly presented in the following detailed description of the embodiments with reference to the drawings.

為使本領域技術人員能更進一步瞭解本創作,以下特列舉本創作的優選實施例,並配合附圖詳細說明本創作的構成內容及所欲達成的功效。In order to enable those skilled in the art to have a better understanding of the invention, the preferred embodiments of the invention are listed below, and the composition and the desired effect of the invention are described in detail with reference to the accompanying drawings.

請參閱第1圖,為本創作一實施例之資料交換系統100的示意圖,包含有一用戶節點10、一第一服務節點20,以及一第二服務節點30,其中用戶節點10於本實施例中係以手機APP為例,但並不以此為限,實務上亦可以是由使用者操作的電腦軟體、網頁瀏覽器、雲端工具,或是通用型或客制化的智慧裝置;只要能夠執行如後文所述之用戶節點10的各項功能者,皆應視為落入本創作的範圍之內。第一服務節點20與第二服務節點30於本實施例中則皆為終端伺服器,但這同樣不是本創作的限制所在;於其他實施例中,第一服務節點20與第二服務節點30也可能是其他種類的計算設備,或甚至由多台計算設備組成,例如分散在有線或無線網路不同位置的多個模組、元件或裝置等等,應皆屬於本創作的等效範圍之內。Please refer to Fig. 1, which is a schematic diagram of a data exchange system 100 according to an embodiment of this invention, including a user node 10, a first service node 20, and a second service node 30, wherein the user node 10 is in this embodiment The mobile APP is used as an example, but it is not limited to this. In practice, it can also be a computer software, a web browser, a cloud tool, or a general-purpose or customized smart device operated by the user; as long as it can execute All functions of the user node 10 as described below should be considered as falling within the scope of this creation. In this embodiment, the first service node 20 and the second service node 30 are all terminal servers, but this is not the limitation of this invention; in other embodiments, the first service node 20 and the second service node 30 It may also be other types of computing equipment, or even consist of multiple computing equipment, such as multiple modules, components, or devices scattered in different locations on wired or wireless networks, etc., should all fall within the equivalent scope of this creation Inside.

其中,第一服務節點20與第二服務節點30都是構成一聯盟鏈(consortium blockchain)C的節點,唯需說明的是,實務上一個聯盟鏈通常不會只包含二個節點,此處所示例只是為了便於說明,並非暗示聯盟鏈C具有任何節點數量上的限制。本創作所提供的資料交換系統100係基於W3C提出的可驗證憑證(verifiable credential,VC)協議而運作,而在本實施例中提及的第一服務節點20與第二服務節點30之命名係以其在協議中所扮演的角色區分,更明確來說,第一服務節點20扮演的是可驗證憑證核發者(VC issuer),而第二服務節點30扮演的則是可驗證憑證驗證者(VC verifier)。換句話說,在任何可驗證憑證協議運作的情境下,負責可驗證憑證核發者之工作者,即為本創作所稱的第一服務節點20;而負責可驗證憑證驗證者之工作者,則為本創作所稱的第二服務節點30。需清楚理解的是,由於同一個終端伺服器於實務上可能同時俱備可驗證憑證核發者及可驗證憑證驗證者之功能,因此當其在一使用情境下做為可驗證憑證核發者時,即視為本創作的第一服務節點20;但當其在另一使用情境轉為擔任可驗證憑證驗證者時,同一個終端伺服器則轉而被視為本創作的第二服務節點30。此些敘述,純粹為解釋本創作元件命名的背後邏輯,是以,於解讀本創作之範圍時,不應囿於第一服務節點20及第二服務節點30的相關說明,進而錯誤地認定凡做為第一服務節點20者便不可能在另一情境下成為第二服務節點30,或者第二服務節點30便沒有在另一情境下轉為第一服務節點20之可能,合先敘明。Among them, the first service node 20 and the second service node 30 are nodes that constitute a consortium blockchain (consortium blockchain) C. What needs to be explained is that in practice, a consortium blockchain usually does not contain only two nodes. The example shown here It is just for the convenience of explanation, and does not imply that the alliance chain C has any restrictions on the number of nodes. The data exchange system 100 provided by this creation operates based on the verifiable credential (VC) protocol proposed by W3C, and the naming system of the first service node 20 and the second service node 30 mentioned in this embodiment Distinguished by their roles in the protocol, more specifically, the first service node 20 acts as a verifiable certificate issuer (VC issuer), while the second service node 30 acts as a verifiable certificate verifier (VC issuer) VC verifier). In other words, in the context of any verifiable certificate protocol operation, the worker responsible for the issuer of the verifiable certificate is called the first service node 20 in this creation; and the worker responsible for the verifier of the verifiable certificate is It is the second service node 30 referred to in this creation. It should be clearly understood that since the same terminal server may have the functions of a verifiable certificate issuer and a verifiable certificate verifier in practice, when it is used as a verifiable certificate issuer in a usage scenario, That is, it is regarded as the first service node 20 of this invention; but when it is changed to be a verifiable certificate verifier in another usage scenario, the same terminal server is then regarded as the second service node 30 of this invention. These descriptions are purely for explaining the logic behind the naming of the components of this creation. Therefore, when interpreting the scope of this creation, one should not be limited to the relevant descriptions of the first service node 20 and the second service node 30, and then mistakenly assume that all As the first service node 20, it is impossible to become the second service node 30 in another situation, or the second service node 30 has no possibility of turning into the first service node 20 in another situation, let’s explain first .

用戶節點10持有成對的一公鑰12及一私鑰14,較佳者,為提供更高的安全性,公鑰12可以是一實體金鑰,例如經過特殊設計的硬體晶片或USB裝置,但其實際實作方式並不以此處所舉例為限。另外,用戶節點10亦持有一數位身份16,其中數位身份16可以對應至用戶節點10使用者的身份證字號或真實姓名,亦可以是用戶節點10本身的機碼或序號,同樣不以此處所述為限;於本實施例中,數位身份16係為一去中心化身份(Decentralized Identity,DID)。需說明的是,數位身份16係對應至用戶節點10的使用者;換言之,也就是真實存在的使用者於本創作提供的資料交換系統100內所使用的對應身份,在本系統100內即代表了該位使用者。該去中心化身份以及與其對應的一去中心化身份文件(DID document,圖未示)可以共同或分別儲存於多種儲存媒介上,例如用戶節點10所具有的一分散金鑰管理系統(Distributed Key Management System,DKMS,圖未示)、本地或遠端伺服器上的一星際檔案系統(InterPlanetary File System,IPFS),或一般資料庫等等,較佳者,可儲存並映射於一區塊鏈,其中該去中心化身份文件是一個描繪該去中心化身份所識別之對象(即用戶節點10的使用者)的後設資料,亦包含認證方式之說明,供不特定第三方用以認證該去中心化身份之用。The user node 10 holds a pair of a public key 12 and a private key 14. Preferably, in order to provide higher security, the public key 12 can be a physical key, such as a specially designed hardware chip or USB device, but its actual implementation is not limited to the example here. In addition, the user node 10 also holds a digital identity 16, wherein the digital identity 16 can correspond to the ID card number or real name of the user of the user node 10, and can also be the machine code or serial number of the user node 10 itself. The description here is limited; in this embodiment, the digital identity 16 is a decentralized identity (Decentralized Identity, DID). It should be noted that the digital identity 16 corresponds to the user of the user node 10; in other words, the corresponding identity used by a real user in the data exchange system 100 provided by this creation represents the user. The decentralized identity and its corresponding decentralized identity document (DID document, not shown) can be stored together or separately on various storage media, such as a distributed key management system (Distributed Key Management System, DKMS, not shown in the figure), an InterPlanetary File System (InterPlanetary File System, IPFS) on a local or remote server, or a general database, etc., preferably, can be stored and mapped to a blockchain , wherein the decentralized identity file is meta-data describing the object identified by the decentralized identity (ie, the user of the user node 10), and also includes a description of the authentication method, which is used by an unspecified third party to authenticate the For decentralized identity purposes.

第一服務節點20與用戶節點10資訊連接(亦即,二元件之間可以有資訊上的聯絡及流通),且保管有一用戶資料22。此處所述的用戶資料22指的是與用戶節點10的使用者有關的不特定資料,實務上可以是該使用者的醫療資料、保單資料、金融資料,或基本個人資料,其種類並不以此處所示例為限。實務上,前述用戶節點10所持有的該去中心化身份及對應的該去中心化身份文件可以是由第一服務節點20所產生,或者也可能是透過某個主管機關或權威單位產生,但此些技術相關並非本創作的重點所在。如前所述,第一服務節點20所扮演的便是可驗證憑證核發者的角色,更明確來說,第一服務節點20係使用用戶節點10所提供的公鑰12及該用戶資料22而產生一可驗證憑證24,同時亦對應產生一憑證資訊26,並傳送予用戶節點10留存。較佳者,第一服務節點20產生可驗證憑證24及憑證資訊26的動作係由用戶節點10所發動,舉例來說,可以是用戶節點10提出需要可驗證憑證24的請求,並傳送數位身份16(該去中心化身份)及公鑰12予第一服務節點20;第一服務節點20參照對應的該去中心化身份文件所載的認證方法,對該去中心化身份加以認證,並在認證成功、確定該去中心化身份確實代表用戶節點10的使用者後,再去產生可驗證憑證24及憑證資訊26;其中可驗證憑證24可以包含用戶資料22全部或部份之內容,並且可以包含或不包含該去中心化身份,端視需求而定。在本實施例中,第一服務節點20係將可驗證憑證24上鏈至聯盟鏈C,達成替可驗證憑證24存證之目的,而憑證資訊26就是可驗證憑證24的一區塊鏈位址。用戶節點10收到第一服務節點20傳來的憑證資訊26(此例中為區塊鏈位址)後,便將其留存,留待日後對可驗證憑證24的可信度進行驗證之用。需說明的是,用戶節點10可以將憑證資訊26保存於內部的一儲存空間(例如前述的該DKMS),亦可視情況保存於外部的一虛擬空間,其實際的儲存方式並不是本創作的限制所在。The first service node 20 is informationally connected with the user node 10 (that is, there can be information communication and circulation between the two elements), and keeps a user data 22 . The user data 22 mentioned here refers to unspecific data related to the user of the user node 10. In practice, it can be the user's medical data, insurance policy data, financial data, or basic personal data. Limit the examples shown here. In practice, the decentralized identity held by the aforementioned user node 10 and the corresponding decentralized identity file may be generated by the first service node 20, or may be generated by a certain competent authority or authoritative unit, But these technical correlations are not the focus of this creation. As mentioned above, the first service node 20 plays the role of verifiable certificate issuer. More specifically, the first service node 20 uses the public key 12 and the user information 22 provided by the user node 10 to A verifiable certificate 24 is generated, and a certificate information 26 is correspondingly generated, and sent to the user node 10 for storage. Preferably, the action of the first service node 20 to generate the verifiable certificate 24 and the certificate information 26 is initiated by the user node 10. For example, the user node 10 may make a request for the verifiable certificate 24 and transmit the digital identity 16 (the decentralized identity) and the public key 12 to the first service node 20; the first service node 20 refers to the authentication method contained in the corresponding decentralized identity file to authenticate the decentralized identity, and After the authentication is successful and the decentralized identity is determined to represent the user of the user node 10, the verifiable credential 24 and credential information 26 are generated; the verifiable credential 24 can contain all or part of the user data 22, and can Inclusion or exclusion of this decentralized identity depends on the needs. In this embodiment, the first service node 20 links the verifiable certificate 24 to the consortium chain C to achieve the purpose of depositing the verifiable certificate 24, and the certificate information 26 is a block chain bit of the verifiable certificate 24 site. After the user node 10 receives the credential information 26 (block chain address in this example) from the first service node 20, it saves it for future verification of the verifiable credential 24's credibility. It should be noted that the user node 10 can save the credential information 26 in an internal storage space (such as the aforementioned DKMS), or in an external virtual space as the case may be, and the actual storage method is not a limitation of this invention where.

於另一實施例中,第一服務節點20並不是將可驗證憑證24上鏈至聯盟鏈C,而是將其保存於一星際檔案系統(InterPlanetary File System,IPFS)。在這樣的實施例中,憑證資訊26自然就不是一個區塊鏈位址,取而代之的是可驗證憑證24的一內容辨識碼(content identifier,CID)。同樣地,當用戶節點10收到第一服務節點20回傳的憑證資訊26(本例中為該內容辨識碼),用戶節點10便將憑證資訊26保存起來留待日後使用。另值得一提的是,第一服務節點20可以進一步利用一去中心化身份解析器(DID resolver)對可驗證憑證24進行雜湊運算以產生一雜湊值,並將該雜湊值上鏈至聯盟鏈C,如此除了可以替可驗證憑證24存證,還能藉由解析包含在可驗證憑證24中的該去中心化身份而找出該去中心化身份文件。In another embodiment, the first service node 20 does not link the verifiable certificate 24 to the consortium chain C, but saves it in an InterPlanetary File System (IPFS). In such an embodiment, the certificate information 26 is naturally not a blockchain address, but a content identifier (CID) that verifies the certificate 24 instead. Similarly, when the user node 10 receives the certificate information 26 (in this example, the content identification code) returned by the first service node 20, the user node 10 saves the certificate information 26 for future use. It is also worth mentioning that the first service node 20 can further use a decentralized identity resolver (DID resolver) to perform a hash operation on the verifiable credential 24 to generate a hash value, and upload the hash value to the alliance chain C. In this way, in addition to storing evidence for the verifiable certificate 24, the decentralized identity file can also be found by analyzing the decentralized identity contained in the verifiable certificate 24.

當需要對可驗證憑證24的可信度進行驗證時,便是前述扮演可驗證憑證驗證者的第二服務節點30運作的時候。第二服務節點30同樣與用戶節點10資訊連接,二元件之間亦能進行資訊上的聯絡及流動,是以,第二服務節點30可以藉由用戶節點10所留存的憑證資訊26取得可驗證憑證24。更明確來說,在憑證資訊26為該區塊鏈位址的實施例中,第二服務節點30便是利用該區塊鏈位址於聯盟鏈C上取得可驗證憑證24;而在憑證資訊26為該內容辨識碼的實施例中,第二服務節點30則是利用該內容辨識碼,於第一服務節點20使用的該星際檔案系統中取得可驗證憑證24。當然,第一服務節點20也可能使用其他方式保存可驗證憑證24,但無論其所採用的方式為何,皆應可以對應產出憑證資訊26,使第二服務節點30能夠據以取得可驗證憑證24。When the authenticity of the verifiable credential 24 needs to be verified, it is when the aforementioned second service node 30 acting as a verifier of the verifiable credential operates. The second service node 30 is also informationally connected with the user node 10, and information communication and flow can also be carried out between the two components. Therefore, the second service node 30 can obtain verifiable information through the certificate information 26 retained by the user node 10. credential24. More specifically, in the embodiment where the certificate information 26 is the blockchain address, the second service node 30 uses the blockchain address to obtain the verifiable certificate 24 on the consortium chain C; and in the certificate information In the embodiment where 26 is the content identification code, the second service node 30 uses the content identification code to obtain the verifiable certificate 24 in the interstellar file system used by the first service node 20 . Of course, the first service node 20 may also use other methods to save the verifiable certificate 24, but no matter what the method is, it should be able to correspond to the output certificate information 26, so that the second service node 30 can obtain the verifiable certificate according to it twenty four.

其中,可驗證憑證24包含有一驗證訊息24A,當第二服務節點30要驗證可驗證憑證24的可信度時,第二服務節點30便使用用戶節點10所提供的公鑰12對驗證訊息24A進行加密,並將加密後的驗證訊息24A傳送給用戶節點10,要求用戶節點10進行解密。由於用戶節點10持有對應的私鑰14,用戶節點10能夠使用私鑰14解開加密後的驗證訊息24A,進而得知驗證訊息24A的內容。待用戶節點10解出驗證訊息24A,便可以將驗證訊息24A回傳給第二服務節點30進行比對,若比對正確,即證明用戶節點10為持有私鑰14的正確使用者,也就是驗證了可驗證憑證24的可信度。Wherein, the verifiable certificate 24 includes a verification message 24A, when the second service node 30 wants to verify the authenticity of the verifiable certificate 24, the second service node 30 uses the public key 12 provided by the user node 10 to verify the verification message 24A Encrypt, and send the encrypted verification message 24A to the user node 10, requesting the user node 10 to decrypt. Since the user node 10 holds the corresponding private key 14, the user node 10 can use the private key 14 to decrypt the encrypted verification message 24A, and then obtain the content of the verification message 24A. After the user node 10 solves the verification message 24A, it can return the verification message 24A to the second service node 30 for comparison. If the comparison is correct, it proves that the user node 10 is the correct user holding the private key 14, and also That is, the credibility of the verifiable certificate 24 is verified.

若第二服務節點30成功驗證可驗證憑證24的可信度,那麼便獲准取得第一服務節點20所保管之用戶資料22的至少一部份,藉此可以將用戶資料22的至少一部份交換給第二服務節點30,供第二服務節點30進行資料更新或同步等用途。其中,在該用戶資料22的至少一部份已包含於可驗證憑證24的情況下,第二服務節點30可直接由可信度已通過驗證的可驗證憑證24中取得;或者,第二服務節點30也可以透過其他方式,自第一服務節點20處取得所需資料。可以理解的是,若用戶節點10的使用者不希望讓第二服務節點30得知用戶資料22中的某些部份,該使用者可以透過操作用戶節點10,要求第一服務節點20只把部份的用戶資料22製成可驗證憑證24,如此便能在不透露不必要資訊的情況下將必要資訊傳送給第二服務節點30,藉此達到自主掌控用戶資料22揭露程度的目的,實務上更可能可以達成零知識證明(Zero Knowledge Proof)的需求;反過來說,本系統100實際的運作方式,當然也有可能是由第二服務節點30主動要求某些部份的用戶資料22,再由用戶節點10轉達給第一服務節點20,使得第一服務節點20能夠據以產生可驗證憑證24,並在其中只包含第二服務節點30所要求的該些部份的用戶資料22,如此也能避免過度透露資訊的情況。於本實施例中,第一服務節點20所保管的用戶資料22的至少一部份係透過一加密通道T傳送給第二服務節點30,其中加密通道T可以具有(但不限於)三層防護,其第一層防護為採用AES 256加密通道,第二層防護係對用戶資料22進行AES 256之文件加密,而第三層防護則是採用非開放式的通道協定。於另一實施例中,第一服務節點20也可以將用戶資料22保存於該星際檔案系統,而第二服務節點30則是透過該星際檔案系統取得用戶資料22的至少一部份。需理解的是,當然也可能有其他交換資料的實作方法,只要用戶資料22的至少一部份能夠安全傳送至第二服務節點30即可,並不以此處所示例者為限。If the second service node 30 successfully verifies the authenticity of the verifiable credential 24, then it is allowed to obtain at least a part of the user data 22 kept by the first service node 20, whereby at least a part of the user data 22 can be It is exchanged to the second service node 30 for the second service node 30 to update or synchronize data and other purposes. Wherein, in the case that at least a part of the user information 22 has been included in the verifiable certificate 24, the second service node 30 can directly obtain it from the verifiable certificate 24 whose credibility has been verified; or, the second service The node 30 can also obtain the required data from the first service node 20 in other ways. It can be understood that if the user of the user node 10 does not want the second service node 30 to know some parts of the user information 22, the user can request the first service node 20 to only Part of the user information 22 is made into a verifiable certificate 24, so that the necessary information can be transmitted to the second service node 30 without disclosing unnecessary information, thereby achieving the purpose of autonomously controlling the disclosure degree of the user information 22, practical It is more likely that the requirements of Zero Knowledge Proof can be met; conversely, the actual operation mode of the system 100 is of course also possible that the second service node 30 actively requests some user information 22, and then Referred to by the user node 10 to the first service node 20, so that the first service node 20 can generate a verifiable credential 24 accordingly, and only include the user information 22 of these parts required by the second service node 30, so It also avoids overdisclosure of information. In this embodiment, at least a part of the user data 22 stored by the first service node 20 is transmitted to the second service node 30 through an encrypted channel T, wherein the encrypted channel T may have (but not limited to) three layers of protection , the first layer of protection is to use AES 256 encrypted channel, the second layer of protection is to encrypt user data 22 with AES 256 file encryption, and the third layer of protection is to use a non-open channel protocol. In another embodiment, the first service node 20 may also save the user information 22 in the interstellar file system, and the second service node 30 obtains at least a part of the user information 22 through the interstellar file system. It should be understood that, of course, there may also be other implementation methods for exchanging data, as long as at least a part of the user data 22 can be safely transmitted to the second service node 30 , it is not limited to the example shown here.

另外,為了確保聯盟鏈C上的所有節點皆參與運算及記錄,較佳者,聯盟鏈C係採用權威共識證明(proof-of-authority,POA)為其共識演算法。若需要進一步提高聯盟鏈C的開放性,聯盟鏈C也可以另外透過一側鏈S與一公鏈P連接,其中公鏈P可以是比特幣或以太幣所運作之區塊鏈,但並不以此為限。In addition, in order to ensure that all nodes on the alliance chain C participate in the calculation and recording, preferably, the alliance chain C adopts proof-of-authority (POA) as its consensus algorithm. If it is necessary to further improve the openness of the alliance chain C, the alliance chain C can also be connected to a public chain P through a side chain S, where the public chain P can be a blockchain operated by Bitcoin or Ethereum, but it does not This is the limit.

亦需說明的是,雖然在前述說明中只有用戶節點10具有該非中心化身份,但這並不是本創作的限制所在;實務上在聯盟鏈C上的所有節點也可以都具有一個以上的非中心化身份,便於本系統100中的各個參與者能夠互相確認彼此之身份。不過非中心化身份的申請及取得並非本創作的重點所在,容此略過不述。It should also be noted that although only the user node 10 has the decentralized identity in the foregoing description, this is not the limitation of this creation; in practice, all nodes on the alliance chain C can also have more than one decentralized identity. It is convenient for each participant in the system 100 to confirm each other's identity. However, the application and acquisition of decentralized identities is not the focus of this creation, so let’s skip it here.

以下,本創作將以兩個使用情境來說明資料交換系統100的實際運作方式。請先參照第2圖,為第一種使用情境的步驟流程圖,其係在不同的保險公司之間傳送保戶個人資料之情境,其中用戶節點10為一保戶所使用的手機APP,第一服務節點20為一保險公司(下文稱保險公司A)之終端伺服器,第二服務節點30則為另一保險公司(下文稱保險公司B)之終端伺服器,而保戶希望透過本系統100將第一服務節點20上保存的用戶資料22傳送至第二服務節點30,此處所述的用戶資料22可以包含該保戶的身份證字號、基本個人資料,以及去中心化身份(DID)等等,但並不以此為限。Hereinafter, this creation will use two scenarios to illustrate the actual operation of the data exchange system 100 . Please refer to Figure 2 first, which is a flow chart of the steps of the first usage scenario, which is the scenario of transmitting policyholder personal data between different insurance companies, wherein the user node 10 is a mobile phone APP used by a policyholder, and the first One service node 20 is the terminal server of an insurance company (hereinafter referred to as insurance company A), and the second service node 30 is the terminal server of another insurance company (hereinafter referred to as insurance company B), and policyholders wish to use this system 100 transmits the user information 22 stored on the first service node 20 to the second service node 30, where the user information 22 may include the policyholder's ID number, basic personal information, and decentralized identity (DID ), etc., but not limited to this.

最初始的步驟S11是本系統100首次運作之時,於此時點尚不存在有可驗證憑證24,故尚需要由扮演可驗證憑證核發者的第一服務節點20負責產生可驗證憑證24。為達到此一目的,該保戶操作用戶節點10產生一對金鑰,即前文所稱之公鑰12及私鑰14,並將公鑰12傳送給保險公司A所擁有的第一服務節點20;於步驟S12,第一服務節點20使用用戶節點10傳送過來的公鑰12,將其所保存的用戶資料22製成可驗證憑證24。接下來,第一服務節點20於步驟S13,利用該去中心化身份解析器運算出可驗證憑證24的該雜湊值,並將該雜湊值上鏈至聯盟鏈C,藉以對可驗證憑證24進行存證。The initial step S11 is when the system 100 operates for the first time, and there is no verifiable certificate 24 at this point, so the first service node 20 acting as the verifiable certificate issuer is still responsible for generating the verifiable certificate 24 . In order to achieve this purpose, the policyholder operates the user node 10 to generate a pair of keys, namely the aforementioned public key 12 and private key 14, and transmits the public key 12 to the first service node 20 owned by the insurance company A ; In step S12, the first service node 20 uses the public key 12 sent by the user node 10 to make a verifiable certificate 24 from the stored user information 22. Next, in step S13, the first service node 20 uses the decentralized identity resolver to calculate the hash value of the verifiable certificate 24, and uploads the hash value to the alliance chain C, so as to verify the verifiable certificate 24 Deposit evidence.

請參照緊接的步驟S14,這個使用情境中的第一服務節點20係將可驗證憑證24保存於該星際檔案系統,因此憑證資訊26便是可驗證憑證24位於該星際檔案系統內的該內容辨識碼,且第一服務節點20會將該內容辨識碼傳送給用戶節點10留存,留待後續對用戶節點10所代表的該數位身份進行驗證時使用。在步驟S15,該保戶操作用戶節點10要求進行身份驗證,因此用戶節點10便將公鑰12以及該內容辨識碼傳送至保險公司B所擁有的第二服務節點30;藉由該內容辨識碼,第二服務節點30於第一服務節點20所使用的該星際檔案系統取得可驗證憑證24。接著,於步驟S16,第二服務節點30取出可驗證憑證24中所包含的驗證訊息24A,使用公鑰12對其加密,再將加密後的結果傳送給用戶節點10,要求用戶節點10協助驗證可驗證憑證24的可信度。Please refer to the next step S14, the first service node 20 in this usage scenario saves the verifiable certificate 24 in the interstellar file system, so the certificate information 26 is the content that the verifiable certificate 24 is located in the interstellar file system identification code, and the first service node 20 will transmit the content identification code to the user node 10 for storage, and it will be used when verifying the digital identity represented by the user node 10 in the future. In step S15, the policyholder operates the user node 10 to request identity verification, so the user node 10 transmits the public key 12 and the content identification code to the second service node 30 owned by the insurance company B; , the second service node 30 obtains the verifiable certificate 24 from the interstellar file system used by the first service node 20 . Next, in step S16, the second service node 30 takes out the verification message 24A contained in the verifiable certificate 24, encrypts it with the public key 12, and then transmits the encrypted result to the user node 10, requesting the user node 10 to assist in verification The authenticity of the credential 24 may be verified.

由於用戶節點10係正確的身份持有人,因此自然具有對應的私鑰14。在步驟S17,用戶節點10便使用私鑰14解出驗證訊息24A,再回傳給第二服務節點30。接下來的步驟S18,第二服務節點30比對自己持有的驗證訊息24A與用戶節點10回傳的驗證訊息24A,若二者完全相同,就證明了用戶節點10確實持有私鑰14,為具有合格身份者,因此可驗證憑證24的可信度便得到了驗證。最後在步驟19,第二服務節點30透過加密通道T自第一服務節點20取得用戶資料22的至少一部份或全部,至此成功完成了資料的交換。Since the user node 10 is the correct identity holder, it naturally has the corresponding private key 14 . In step S17 , the user node 10 uses the private key 14 to decrypt the verification message 24A, and then sends it back to the second service node 30 . In the next step S18, the second service node 30 compares the verification message 24A held by itself with the verification message 24A sent back by the user node 10. If the two are identical, it proves that the user node 10 indeed holds the private key 14. As a qualified person, the authenticity of the verifiable credential 24 is therefore verified. Finally, in step 19, the second service node 30 obtains at least a part or all of the user data 22 from the first service node 20 through the encrypted channel T, and thus the data exchange is successfully completed.

基於這樣的運作邏輯,本系統100還可以進行更複雜的動作。舉例來說,該保戶可以對保險公司B的終端伺服器所保存的用戶資料加以更動,並在用戶節點10(即手機APP)上勾選將更動的資料同步至又另一保險公司(下稱保險公司C)的終端伺服器。需清楚理解的是,在進行此一動作時,是由保險公司B的終端伺服器負責對更動後的用戶資料生成可驗證憑證,而保險公司C的終端伺服器則負責身份驗證,因此保險公司B的終端伺服器此時應視為前文所述的第一服務節點20,而保險公司C的終端伺服器則成為前文所述的第二服務節點30。這一輪動作的第一服務節點20與第二服務節點30進行的各項步驟概如前述,請容此不再贅述,總之當保險公司C的終端伺服器(即此輪的第二服務節點30)完成身份驗證後,即可透過加密通道向保險公司B的終端伺服器(即此輪的第一服務節點20)取得更新後的用戶資料,以此進行資料的同步更動。由此例和第2圖所示之前例中可發現,保險公司B的終端伺服器在不同的情境下先後扮演了第二服務節點30及第一服務節點20;事實上,這樣具備雙重身份的節點並非特例,在實務操作上,聯盟鏈C上的所有節點都可以同時具有可驗證憑證核發者及可驗證憑證驗證者的功能,如此能更便利於實際的使用情境。Based on such operation logic, the system 100 can also perform more complicated actions. For example, the policyholder can modify the user information stored in the terminal server of insurance company B, and check on the user node 10 (i.e., the mobile phone APP) to synchronize the changed information to another insurance company (below Call the terminal server of the insurance company C). It should be clearly understood that when performing this action, the terminal server of insurance company B is responsible for generating a verifiable certificate for the changed user information, while the terminal server of insurance company C is responsible for identity verification, so the insurance company At this time, the terminal server of B should be regarded as the first service node 20 mentioned above, and the terminal server of insurance company C becomes the second service node 30 mentioned above. The various steps performed by the first service node 20 and the second service node 30 in this round of action are generally as described above, please do not repeat them here. ) after completing the identity verification, the updated user information can be obtained from the terminal server of insurance company B (that is, the first service node 20 of this round) through an encrypted channel, so as to perform synchronous modification of the data. From this example and the previous example shown in FIG. 2, it can be found that the terminal server of insurance company B plays the role of the second service node 30 and the first service node 20 successively in different situations; Nodes are not a special case. In practice, all nodes on the consortium chain C can have the functions of verifiable certificate issuer and verifiable certificate verifier at the same time, which is more convenient for actual use scenarios.

再請參照第3圖,為第二種使用情境的步驟流程圖,其係一保戶於一醫院完成治療後向一保險公司申請理賠,其中該保戶所使用的手機APP為前述的用戶節點10,醫院的終端伺服器為第一服務節點20,而保險公司的端終伺服器則為第二服務節點30。同樣地,在最初始的步驟S21之時點尚不存在有可驗證憑證24,需由第一服務節點20負責核發之。為達此一目的,該保戶操作用戶節點10,使其產生成對的公鑰12及私鑰14,且用戶節點10將公鑰12傳送至第一服務節點20。接著,在步驟S22,第一服務節點20便使用公鑰12及其所保存的用戶資料22產生可驗證憑證24,其中用戶資料22於此一使用情境中可能包含該保戶的身份證字號、基本個人資料、病歷、診斷證明,以及去中心化身份(DID)等等,但並不以此為限。Please refer to Figure 3 again, which is a flow chart of the steps of the second usage scenario, which is that an insured person applies for a claim to an insurance company after completing treatment in a hospital, wherein the mobile phone APP used by the insured person is the aforementioned user node 10. The terminal server of the hospital is the first service node 20 , and the terminal server of the insurance company is the second service node 30 . Likewise, there is no verifiable certificate 24 at the time of the initial step S21, and the first service node 20 is responsible for issuing it. To achieve this purpose, the policyholder operates the user node 10 to generate a pair of public key 12 and private key 14 , and the user node 10 transmits the public key 12 to the first service node 20 . Next, in step S22, the first service node 20 generates a verifiable credential 24 using the public key 12 and the stored user information 22, wherein the user information 22 may include the policyholder's ID number, Basic personal data, medical records, diagnosis certificates, and decentralized identity (DID), etc., but not limited to.

與前一使用情境不同的是,於步驟S23,第一服務節點20係將用戶資料22保存於該星際檔案系統,接著於步驟S24將可驗證憑證24上鏈至聯盟鏈C,而此時回傳給用戶節點10的憑證資訊26就是可驗證憑證24的區塊鏈位址。當保險公司收到該保戶的理賠申請,保險公司便需要對用戶節點10代表的該數位身份進行驗證,是以,在步驟S25,用戶節點10傳送公鑰12及憑證資訊26(於此例中為區塊鏈網址)給第二服務節點30,而第二服務節點30則透過憑證資訊26,於聯盟鏈C上取得可驗證憑證24。在取得可驗證憑證24之後,第二服務節點30於其中取出驗證訊息24A,並在步驟S26使用公鑰12對驗證訊息24A進行加密,將結果傳送給用戶節點10。The difference from the previous usage scenario is that in step S23, the first service node 20 saves the user information 22 in the interstellar file system, and then in step S24 uploads the verifiable certificate 24 to the alliance chain C, and at this time returns The certificate information 26 transmitted to the user node 10 is the blockchain address of the verifiable certificate 24 . When the insurance company receives the policyholder's claim settlement application, the insurance company needs to verify the digital identity represented by the user node 10. Therefore, in step S25, the user node 10 transmits the public key 12 and the certificate information 26 (in this example middle is the blockchain URL) to the second service node 30, and the second service node 30 obtains the verifiable certificate 24 on the consortium chain C through the certificate information 26. After obtaining the verifiable certificate 24 , the second service node 30 retrieves the verification message 24A from it, encrypts the verification message 24A with the public key 12 in step S26 , and sends the result to the user node 10 .

用戶節點10持有對應的私鑰14,因此可以在步驟S27解出驗證訊息24A的內容,並回傳給第二服務節點30。接下來的步驟S28,第二服務節點30比對用戶節點10回傳的驗證訊息24A以及自身持有的驗證訊息24A,若二者完全相同,即可證明用戶節點所持有的私鑰14確實與其公鑰12成對,換言之,用戶節點10具有合格的身份,可驗證憑證24的可信度得到驗證。最後的步驟S29,第二服務節點30獲准由第一服務節點20的星際檔案系統取得用戶資料22的至少一部份或全部,做為後續理賠之判斷依據。當然,保險公司的終端伺服器(即第二服務節點30)也可以與前一使用情境一樣,透過加密通道T自醫院的終端伺服器(即第一服務節點20)取得用戶資料;換言之,實際的資料交換方式於其他使用情境中也可以有更多的變化。The user node 10 holds the corresponding private key 14 , so it can decrypt the content of the verification message 24A in step S27 and send it back to the second service node 30 . In the next step S28, the second service node 30 compares the verification message 24A returned by the user node 10 with the verification message 24A held by itself. If the two are identical, it can prove that the private key 14 held by the user node is authentic Paired with its public key 12, in other words, the user node 10 has a qualified identity, the authenticity of the verifiable credential 24 is verified. In the final step S29, the second service node 30 is allowed to obtain at least a part or all of the user information 22 from the interstellar file system of the first service node 20, as a basis for determining subsequent claims. Of course, the terminal server of the insurance company (ie, the second service node 30) can also obtain user information from the terminal server of the hospital (ie, the first service node 20) through the encrypted channel T as in the previous usage scenario; in other words, the actual There may be more changes in the data exchange method in other usage scenarios.

依據此處所述的使用情境,應能清楚理解,若該保戶同時於二家以上的保險公司投保,那麼其餘保險公司亦可以透過同樣或同理的步驟,向醫院取得用戶資料22。另外,為認證理賠申請動作為該保戶本人授權,實務上還可以選用自然人憑證、晶片金融卡,或MID行動身分識別加上生物特徵辨識之雙因認證等等,皆可整合至本創作所提供的資料交換系統100。值得一提的是,若依照習用的理賠申請程序,保戶需視投保之保險公司數量,向醫院申請多份診斷證明書紙本,再透過郵寄或業務人員代送等手動程序才能完成理賠送件,對照之下,本系統100能提供更安全、更隱私,也更便利的解決方案。Based on the usage scenarios described here, it should be clear that if the insured person is insured by two or more insurance companies at the same time, other insurance companies can also obtain user information from the hospital through the same or similar steps22. In addition, in order to authorize the claim application action to be authorized by the policyholder himself, in practice, natural person certificates, chip financial cards, or MID mobile identity identification plus biometric identification of two-factor authentication, etc. can be integrated into this creation A data exchange system 100 is provided. It is worth mentioning that, according to the usual claim application procedure, the policyholder needs to apply to the hospital for multiple paper diagnosis certificates depending on the number of insurance companies insured, and then complete the claim settlement through manual procedures such as mailing or delivery by business personnel. software, in contrast, the system 100 can provide a safer, more private, and more convenient solution.

接著請參照第4圖,為本案第三種使用情境的步驟流程圖,同樣是一保戶於一醫院完成治療後向一保險公司申請理賠的情境。為方便日後的各種操作,該保戶可以加入一服務平台而成為其會員,再使用平台會員身分登入多家保險公司,分別成為各家保險公司之會員。該保戶所使用的手機APP就是前述的用戶節點10,該服務平台的一平台主機則為前述的第一服務節點20,至於各家保險公司的終端伺服器皆可分別視為前述的第二服務節點30。於步驟S31,該平台主機(即第一服務節點20)使用保戶手機APP(即用戶節點10)提供的公鑰12,將其所保存的用戶資料22生成可驗證憑證24及對應的憑證資訊26。其中可驗證憑證24的內容包含了用戶節點10所持有的該去中心化身、該平台主機的一去中心化身份,以及用戶資料22的至少一部份,包含但不限於該保戶是否為平台會員、是否已年滿十八歲、是否擁有會員公司保險紀錄等相關資訊。於本例中,憑證資訊26的內容為用戶節點10所指定的一去中心化身份地址,可驗證憑證24依照指示傳送至該去中心化身份地址,如步驟S32所述,憑證資訊26交由用戶節點10保存。當任何一家保險公司欲檢查該保戶的會員身份時,便於步驟S33,由其終端伺服器(即第二服務節點30)向用戶節點10要求憑證資訊,並據以取得可驗證憑證24。接著於步驟S34,第二服務節點30要求用戶節點10協助使用其私鑰14對可驗證憑證的可信度加以驗證,若驗證通過,在步驟S35,第二服務節點30就可以根據可驗證憑證24的內容,確認使用用戶節點10的該保戶是否為公司會員。Next, please refer to Figure 4, which is a flow chart of the steps of the third usage scenario in this case, which is also the scenario where an insured household applies for a claim to an insurance company after completing treatment in a hospital. In order to facilitate various operations in the future, the policyholder can join a service platform to become a member, and then use the platform membership to log in to multiple insurance companies and become members of each insurance company. The mobile phone APP used by the policyholder is the aforementioned user node 10, a platform host of the service platform is the aforementioned first service node 20, and the terminal servers of each insurance company can be regarded as the aforementioned second node respectively. Service node 30. In step S31, the platform host (i.e. the first service node 20) uses the public key 12 provided by the insurer's mobile APP (i.e. the user node 10) to generate a verifiable certificate 24 and corresponding certificate information from the user data 22 stored in it 26. The content of the verifiable credential 24 includes the decentralized avatar held by the user node 10, a decentralized identity of the platform host, and at least a part of the user information 22, including but not limited to whether the policyholder is Platform members, whether they have reached the age of 18, whether they have insurance records of member companies, and other related information. In this example, the content of the certificate information 26 is a decentralized identity address specified by the user node 10, and the verifiable certificate 24 is sent to the decentralized identity address according to the instructions. As described in step S32, the certificate information 26 is handed over to The user node 10 saves. When any insurance company wants to check the policyholder's membership status, in step S33, its terminal server (ie, the second service node 30 ) requests the user node 10 for credential information, and obtains the verifiable credential 24 accordingly. Then in step S34, the second service node 30 requires the user node 10 to assist in verifying the authenticity of the verifiable certificate by using its private key 14. If the verification is passed, in step S35, the second service node 30 can use the verifiable certificate 24, confirm whether the insured user who uses the user node 10 is a company member.

第5圖為本創作第四種使用情境的步驟流程圖,此一使用情境的背景係接續前一使用情境,惟此時是該保戶於完成治療後意欲申請理賠之時。在這樣的情境下,醫院的一醫療主機便成為前述的第一服務節點20,該保戶所使用的手機APP同樣是用戶節點10,而保險公司的終端伺服器也同樣是做為第二服務節點30。於步驟S41,該醫療主機(即第一服務節點20)製作電子診斷,並發行這一次的可驗證憑證24,其中可驗證憑證24包含用戶節點10的該去中心化身份、該醫療主機的一去中心化身份,以及用戶資料22的至少一部份,包含但不限於事故發生月份、該保戶是否已痊癒、是否使用健保看診、是否有自費用藥等資訊。於此例中,可驗證憑證24對應的憑證資訊26同樣是用戶節點10指定的一去中心化身份地址,憑證資訊26於步驟S42交由用戶節點10保管。接著於步驟S43,保險公司的終端伺服器(即第二服務節點30)根據憑證資訊26取得可驗證憑證24,並於接下來的步驟S44要求用戶節點10協助以其私鑰14驗證可驗證憑證24的可信度。一旦可信度得到驗證,保險公司的終端伺服器便能進行以下動作,包含但不限於進入該醫療主機資料集查詢可驗證憑證24的簽發紀錄、查詢該保戶的該去中心化身份、驗證該醫療主機金鑰簽章等等,之後便放行並進行保險公司內部的理賠收件流程。至於理賠服務所需要的個人醫療隱私資料(即用戶資料22的其中一部份),則於步驟S45透過一加密信封,由該醫療主機(第一服務節點20)出發,經由前述的該平台主機,送抵保險公司的終端伺服器(第二服務節點30)。Figure 5 is a flow chart of the steps of the fourth usage scenario of this creation. The background of this usage scenario is the continuation of the previous usage scenario, but this time is when the policyholder intends to apply for a claim after completing the treatment. In such a situation, a medical host in the hospital becomes the aforementioned first service node 20, the mobile APP used by the policyholder is also the user node 10, and the terminal server of the insurance company also serves as the second service node. Node 30. In step S41, the medical host (that is, the first service node 20) makes an electronic diagnosis, and issues a verifiable credential 24 this time, wherein the verifiable credential 24 includes the decentralized identity of the user node 10, a Decentralized identity, and at least a part of user information 22, including but not limited to the month of the accident, whether the insured has recovered, whether to use health insurance to see a doctor, whether to have out-of-pocket medicine and other information. In this example, the credential information 26 corresponding to the verifiable credential 24 is also a decentralized identity address specified by the user node 10, and the credential information 26 is handed over to the user node 10 for safekeeping in step S42. Then in step S43, the terminal server of the insurance company (i.e. the second service node 30) obtains the verifiable certificate 24 according to the certificate information 26, and in the next step S44 requests the user node 10 to assist in verifying the verifiable certificate with its private key 14 24 credibility. Once the credibility is verified, the insurance company's terminal server can perform the following actions, including but not limited to entering the medical host data set to query the issuance record of the verifiable certificate 24, querying the policyholder's decentralized identity, verifying The medical host key is signed, etc., and then it is released and the insurance company's internal claim settlement process is carried out. As for the personal medical privacy data (that is, a part of the user data 22) required for the claim settlement service, in step S45, through an encrypted envelope, it starts from the medical host (the first service node 20) and passes through the aforementioned platform host , sent to the insurance company's terminal server (the second service node 30).

同樣依據第5圖所示意的流程,實務上還可以延續前二種使用情境進行後續動作,例如該保戶要求已接受理賠的該保險公司將理賠資料轉給另一保險公司。在這樣的情境下,已接受理賠的該保險公司的終端伺服器成為前述的第一服務節點20,該保戶使用的手機APP仍然是擔任用戶節點10,至於要接受資料轉達的該另一保險公司的終端伺服器自然就成為前述的第二服務節點30。一樣如步驟S41所示,已接受理賠的該保險公司的終端伺服器(第一服務節點20)使用用戶節點10的公鑰12來產生可驗證憑證24,其中可驗證憑證24包含該用戶節點10所持有的該去中心化身份、第一服務節點20所持有的一去中心化身份,以及用戶資訊22的至少一部份,包含但不限於是否為副本理賠、理賠金額是否未超過新台幣一百萬元等等。本例中的憑證資料26仍然是用戶節點10指定的一去中心化身份地址,憑證資訊26同樣於步驟S42交由用戶節點10保管,且可驗證憑證24依照指示儲存於憑證資料26所示的該去中心化身份地址。藉此,當該保戶要求將理賠資料傳送給該另一保險公司時,該另一保險公司的終端伺服器(即第二服務節點30)便可藉由憑證資料26按圖索驥取得可驗證憑證24,如步驟S43所述。緊接著,第二服務節點30於步驟S44要求用戶節點10使用其私鑰14協助確認可驗證憑證24的可信度,一旦得到驗證,第二服務節點30便可進行以下動作,包括但不限於進入第一服務節點20的資料集查詢可驗證憑證24的簽發紀錄、查詢用戶節點10的該去中心化身份,以及驗證前一使用情境所提及的醫療主機的金鑰等等。接著此處所述的該另一保險公司便放行並進行系統理賠流程。同樣地,理賠流程所需要的個人醫療隱私資料,如步驟S45所示,採用一加密信封由第一服務節點20(接受理賠的該保險公司的終端伺服器)發出,經由前述的該平台主機,再送達第二服務節點30(預備接受資料轉移的該另一保險公司的終端伺服器)。Also according to the process shown in Figure 5, in practice, the first two usage scenarios can be continued for follow-up actions, for example, the policyholder requests the insurance company that has accepted the claim to transfer the claim data to another insurance company. In such a situation, the terminal server of the insurance company that has accepted the claim becomes the aforementioned first service node 20, and the mobile phone APP used by the policyholder is still serving as the user node 10. The company's terminal server naturally becomes the aforementioned second service node 30 . Also as shown in step S41, the terminal server (first service node 20) of the insurance company that has accepted the claim uses the public key 12 of the user node 10 to generate a verifiable certificate 24, wherein the verifiable certificate 24 contains the user node 10 The decentralized identity held by the first service node 20, a decentralized identity held by the first service node 20, and at least a part of the user information 22, including but not limited to whether it is a duplicate claim, whether the claim amount does not exceed the new One million Taiwan dollars and so on. The certificate data 26 in this example is still a decentralized identity address specified by the user node 10. The certificate information 26 is also kept by the user node 10 in step S42, and the verifiable certificate 24 is stored in the certificate data 26 according to the instructions. The decentralized identity address. In this way, when the policyholder requests to transmit the claim information to the other insurance company, the terminal server of the other insurance company (that is, the second service node 30 ) can obtain the verifiable certificate 24 according to the certificate data 26 , as described in step S43. Next, the second service node 30 requests the user node 10 to use its private key 14 to assist in confirming the authenticity of the verifiable credential 24 in step S44. Once verified, the second service node 30 can perform the following actions, including but not limited to The data set query entering the first service node 20 can verify the issuance record of the certificate 24, query the decentralized identity of the user node 10, and verify the key of the medical host mentioned in the previous usage scenario, etc. The other insurance company described here then releases and proceeds with the system claims process. Similarly, the personal medical privacy data required for the claims process, as shown in step S45, is sent by the first service node 20 (the terminal server of the insurance company that accepts claims) in an encrypted envelope, via the aforementioned platform host, Then it is delivered to the second service node 30 (the terminal server of the other insurance company that is ready to accept data transfer).

再請參照第6圖,為本創作第五種使用情境的流程示意圖,其係應用於保險業務員遠距簽署保單之需求。依現行法規,保險業務員在處理保單簽署時,需要親晤親簽或視訊簽署,但由於本創作提供的資料交換系統100系基於身分自主權(SSI)架構而設計,因此可以藉以驗證線上的保戶為本人,進而達到本人親簽的法律效力。假設在聯盟鏈C內有一保險公司(下稱保險公司A)已經完成一保戶的詳盡KYC流程,並將相關資料結構化存放在公司內部的一伺服器內。若此時同一保戶欲向另一保險公司(下稱保險公司B)購買保險產品,保險公司B的業務員需要驗證該保戶是否為本人,該業務員可以透過一手持裝置(如平板電腦)發送要求驗證項目至該保戶的手機,這時該手機可以依序、同時或擇一執行以下三個動作:Please refer to Figure 6 again, which is a schematic flow diagram of the fifth usage scenario, which is applied to the needs of insurance salesmen to sign insurance policies remotely. According to current laws and regulations, insurance salespersons need to sign in person or via video when processing insurance policies. However, since the data exchange system 100 provided by this creation is designed based on the identity autonomy (SSI) framework, it can be used to verify online The policyholder is the person himself, thus achieving the legal effect of his signature. Assume that an insurance company (hereinafter referred to as insurance company A) in the alliance chain C has completed the detailed KYC process of a policyholder and stored the relevant data in a server within the company in a structured manner. If the same policyholder wants to purchase insurance products from another insurance company (hereinafter referred to as insurance company B), the clerk of insurance company B needs to verify whether the policyholder is himself or not. The clerk can use a handheld device (such as a tablet computer) ) to send the required verification items to the policyholder’s mobile phone, at this time the mobile phone can perform the following three actions sequentially, simultaneously or alternatively:

一、檢查聯盟鏈C上有無相同驗證的上鏈紀錄,若有,便將公鑰提供予保險公司B業務員的該手持裝置,供其進行驗證運算,若驗算成功,便可認證為本人。1. Check whether there is an on-chain record with the same verification on the consortium chain C. If there is, provide the public key to the handheld device of the salesman of insurance company B for verification calculation. If the verification is successful, you can authenticate yourself.

二、檢查手機自身儲存空間有無可做為驗證的可驗證憑證,若有,便傳送給保險公司B業務員的該手持裝置,此時該手持裝置會要求該手機以其私鑰解密,解密後的文本若確認為同,則確認為本人。2. Check whether there is a verifiable certificate in the storage space of the mobile phone itself. If there is, it will be sent to the handheld device of the salesman of insurance company B. At this time, the handheld device will ask the mobile phone to decrypt it with its private key. After decryption If the text of the document is confirmed as the same, it is confirmed as the person.

三、使用本創作所提供的資料交換系統100,亦即,該手機為前述的用戶節點10、保險公司A的伺服器為前述的第一服務節點20,而保險公司B業務員的該手持裝置則成為前述的第二服務節點30。於步驟S51,用戶節點10要求第一服務節點20產生合適的可驗證憑證24,此一可驗證憑證24包含用戶節點10所持有的該去中心化身份,以及用戶資料22的其中一部份,包括但不限於前述的KYC流程相關資料、有無既往症、有無購買其他保險公司保險產品、理賠總額度是否超過新台幣三百萬元等等。步驟S52,第一服務節點20遂使用用戶節點的公鑰12製作可驗證憑證24;於步驟S53,可驗證憑證24儲存至用戶節點10指定的一去中心化身份地址(此即為本例中的憑證資訊26)。接下來的步驟S54中,第二服務節點30根據憑證資訊26取得可驗證憑證24;步驟S55中,第二服務節點30要求用戶節點10以其私鑰12協助驗證可驗證憑證24的可信度,若驗證成功,則同樣可以確認為本人。3. Use the data exchange system 100 provided by this creation, that is, the mobile phone is the aforementioned user node 10, the server of insurance company A is the aforementioned first service node 20, and the handheld device of the salesman of insurance company B Then it becomes the aforementioned second service node 30 . In step S51, the user node 10 requests the first service node 20 to generate a suitable verifiable credential 24, and this verifiable credential 24 includes the decentralized identity held by the user node 10 and a part of the user profile 22 , including but not limited to the aforementioned KYC process-related information, whether there are past diseases, whether to purchase insurance products from other insurance companies, whether the total claim amount exceeds NT$3 million, etc. In step S52, the first service node 20 uses the public key 12 of the user node to produce a verifiable certificate 24; in step S53, the verifiable certificate 24 is stored in a decentralized identity address specified by the user node 10 (this is the credential information 26). In the next step S54, the second service node 30 obtains the verifiable certificate 24 according to the certificate information 26; in step S55, the second service node 30 requests the user node 10 to assist in verifying the authenticity of the verifiable certificate 24 with its private key 12 , if the verification is successful, it can also be confirmed as the person.

最後,請參照第7圖,為本創作第六種使用情境的流程示意圖,其情境係關於保險招攬市場上的業務員資格驗證機制,目的在於克服業務員與保戶間的資訊不對等問題,並有助於保戶挑選良好的業務員。業務員的水準能夠透過金融法規要求的相關資格、共同考試而確保,法規也要求業務需要每年進行教育訓練,取得證照後才能招攬業務。傳統的驗證方法雖可幫助保戶確定業務員的資格,但卻會過度曝露業務員的個人隱私資料,對業務員而言是一種權利侵害,而這個問題能夠透過使用本創作提供的資料交換系統100得到解決。Finally, please refer to Figure 7 to create a flow diagram of the sixth usage scenario. The scenario is about the qualification verification mechanism for salespersons in the insurance recruitment market. The purpose is to overcome the information unequal problem between salespersons and policyholders. And help policyholders choose good salesmen. The level of salespersons can be ensured through the relevant qualifications and common examinations required by financial regulations. The regulations also require that businesses need to undergo education and training every year, and they can only attract business after obtaining a certificate. Although the traditional verification method can help policyholders to determine the qualifications of the salesperson, it will over-expose the personal privacy information of the salesperson, which is a kind of rights infringement for the salesperson, and this problem can be solved by using the data exchange system provided by this creation 100 were resolved.

假設現在有一業務員於一考試及訓練機構通過考試,並完成相關教育訓練,此時該業務員所使用的手機APP即為前述的用戶節點10,而該考試及訓練機構的終端伺服器便可扮演前述的第一服務節點20,並且就該業務員的考試及訓練結果,使用用戶節點10的公鑰12製作可驗證憑證24(步驟S61),其中可驗證憑證24的內容包含該業務員的一非中心化身份以及其用戶資料的至少一部份,包括但不限於某年度業務員資格考試結果、某年度金融市場與道德考試結果、某年度投資型保單業務員資格考試結果、某年度法遵六小時教育訓練結果等等。於步驟S62,可驗證憑證24係傳送至該業務員使用的手機APP(用戶節點10)而留存於該處。Assuming that a salesman passes the examination in an examination and training institution and completes relevant education and training, the mobile phone APP used by the salesman is the aforementioned user node 10, and the terminal server of the examination and training institution can Act as the aforementioned first service node 20, and use the public key 12 of the user node 10 to make a verifiable credential 24 based on the salesman's examination and training results (step S61), wherein the content of the verifiable credential 24 includes the salesman's A decentralized identity and at least part of its user information, including but not limited to the results of a certain annual salesperson qualification examination, the results of a certain annual financial market and moral examination, the results of a certain annual investment insurance policy salesman qualification examination, the results of a certain annual legal Obey the results of six hours of education and training, etc. In step S62, the verifiable certificate 24 is sent to the mobile phone APP (user node 10) used by the salesperson and stored there.

若現在有一保戶欲驗證該業務員之資格,該保戶所使用的手機APP即為前述的第二服務節點30。此一需求可以簡單透過掃描第一服務節點20產生的QR code而完成,或者,在步驟S63,第二服務節點30要求用戶節點10提供可驗證憑證24,接著在步驟S64,第二服務節點30要求用戶節點10以其私鑰14驗證可驗證憑證24的可信度。若可驗證憑證24的可信度得到驗證,那麼第二服務節點30便能從中取得用戶資料22的至少一部份(步驟S65),藉此確認該業務員是否為合格。除此之外,為加強該保戶的信任,還可以進一步利用聯盟鏈C對該業務員的數位證書進行驗證,二次確認發證方(該考試及訓練機構)的資格。If a policyholder wants to verify the qualification of the salesperson, the mobile phone APP used by the policyholder is the aforementioned second service node 30 . This requirement can be accomplished simply by scanning the QR code generated by the first service node 20, or, in step S63, the second service node 30 requires the user node 10 to provide a verifiable certificate 24, and then in step S64, the second service node 30 The user node 10 is required to verify the authenticity of the verifiable credential 24 with its private key 14 . If the authenticity of the verifiable credential 24 is verified, then the second service node 30 can obtain at least a part of the user profile 22 therefrom (step S65 ), thereby confirming whether the salesperson is qualified. In addition, in order to strengthen the trust of the policyholder, the alliance chain C can be further used to verify the digital certificate of the salesman, and to confirm the qualification of the certificate issuer (the examination and training institution) for the second time.

實務上,因應使用者欲進行之動作可能具有不一樣的安全需求等級,用戶節點10也可以具有多層的安全架構,在不同的層級上套用本創作所提供的資料交換系統100。舉例來說,檢視保單或查看存摺等動作一般來說對安全的需求較低,用戶節點10可以透過FIDO(Fast IDentity Online)架構搭配前述身份驗證方法或其它身份自主權(Self-sovereign identity,SSI)做法進行驗證;理賠或小額支付等動作相對需要較高一些的安全等級,用戶節點10可以對應加上區塊鏈金鑰驗證;最後,保單購買、大額轉帳及支付等動作需要最高的安全等級,那麼用戶節點除了區塊鏈金鑰驗證,還可以再加上基於時間的一次性密碼演算法(Time-based One-Time Password,TOTP)來進行驗證。這裡以實際的使用情境略加說明:若有一保戶欲向一保險公司投保,習用的做法需經過業務員或電銷客服協助填寫個人資料,轉送核保部門進行紙本審核;即使轉用較新的線上投保流程,投保產品較為受限,且仍需要耗時填入個人資料,而驗證手段多採用MID行動身分識別,驗證時間長,成本又高。In practice, because the user's desired actions may have different levels of security requirements, the user node 10 may also have a multi-layered security architecture, applying the data exchange system 100 provided by the present invention at different levels. For example, actions such as checking an insurance policy or checking a passbook generally have low security requirements. The user node 10 can use the FIDO (Fast IDentity Online) architecture with the aforementioned identity verification method or other self-sovereign identity (SSI) ) method for verification; actions such as claim settlement or micropayment require relatively higher security levels, and user nodes 10 can be verified by corresponding blockchain keys; finally, actions such as policy purchases, large-amount transfers, and payments require the highest level of security level, in addition to the blockchain key verification, the user node can also be verified by a time-based one-time password algorithm (Time-based One-Time Password, TOTP). Here is a brief explanation based on the actual usage situation: If a policyholder wants to insure with an insurance company, the usual practice needs to be assisted by a salesperson or telemarketing customer service to fill in personal information, and then transfer it to the underwriting department for paper review; In the new online insurance application process, the insurance products are relatively limited, and it still takes time to fill in personal information, and the verification method mostly uses MID mobile identification, which takes a long time and costs high.

相較之下,該保戶可以先經過詳細的KYC流程,接著採用本創作提供的資料交換系統100,保戶使用的用戶節點10能向保險公司的終端伺服器(即第一服務節點20)傳送高階交易金鑰中的公鑰12、身份證字號等資訊,再由第一服務節點20產生可驗證憑證24。若現有另一保險公司欲取得該保戶的用戶資料22,便可透過其終端伺服器(即第二服務節點30)進行身份驗證,再向第一服務節點20取得,俾利於進行其後續的內部核保作業。In contrast, the policyholder can first go through the detailed KYC process, and then use the data exchange system 100 provided by this creation, the user node 10 used by the policyholder can send the insurance company’s terminal server (ie, the first service node 20 ) The information such as the public key 12 and the ID number in the high-level transaction key are transmitted, and then the first service node 20 generates a verifiable certificate 24 . If another insurance company wants to obtain the user information 22 of the policyholder, it can perform identity verification through its terminal server (ie, the second service node 30), and then obtain it from the first service node 20, so as to facilitate its subsequent Internal underwriting operations.

另外,僅管上述所有使用情境中的資料交換行為皆發生在單一聯盟鏈C上,實務上當然不能排除有跨鏈驗證之需求。詳細來說,在目前的商業應用下,為兼顧隱私及法規要求,有時會有一項完整服務需要仰賴超過一個以上的聯盟鏈之情形,例如醫療資料可能存證在一醫療聯盟鏈上、教育憑證存證在一教育鏈上、KYC認證則存證在一金融鏈上等等,各種資料有可能需要跨鏈驗證。在不同的聯盟鏈上會有不同的資料結構,有可能透過妥善利用本創作提供的資料交換系統100,在不需要散佈個人資料的狀況下進行整個區塊鏈網路和發證方的背書認證。In addition, even though all the data exchange behaviors in the above usage scenarios occur on a single consortium chain C, the need for cross-chain verification cannot be ruled out in practice. In detail, under the current commercial application, in order to take into account privacy and legal requirements, sometimes a complete service needs to rely on more than one alliance chain, for example, medical data may be stored on a medical alliance chain, education Credentials are stored on an education chain, KYC certification is stored on a financial chain, etc. Various materials may require cross-chain verification. There will be different data structures on different consortium chains, and it is possible to properly utilize the data exchange system 100 provided by this creation to carry out the endorsement certification of the entire blockchain network and the issuing party without distributing personal data .

總結來說,本創作所提供的資料交換系統100可以在滿足現行法規及個資保護的前提下,以安全便利的方式進行身份驗證,並能有效交換資料,且由於其運作於聯盟鏈C上,還可以減輕使用公鍵P的負擔,節省區塊鏈使用的服務費,實為一自動化、高安全性、適用情境廣泛,且成本低廉的良好解決方案。To sum up, the data exchange system 100 provided by this creation can carry out identity verification in a safe and convenient way under the premise of meeting the current regulations and personal data protection, and can exchange data effectively, and because it operates on the alliance chain C , can also reduce the burden of using the public key P, and save the service fee of the blockchain. It is a good solution with automation, high security, wide application scenarios, and low cost.

以上所述僅為本創作較佳可行實施例而已,舉凡應用本創作說明書及申請專利範圍所為之等效結構或方法變化,理應包含在本創作之專利範圍內。The above description is only a preferable feasible embodiment of this creation, and any equivalent structure or method changes made by applying this creation instruction manual and the scope of the patent application should be included in the scope of the patent of this creation.

100:資料交換系統 10:用戶節點 12:公鑰 14:私鑰 20:第一服務節點 22:用戶資料 24:可驗證憑證 24A:驗證訊息 26:憑證資訊 30:第二服務節點 C:聯盟鏈 S:側鏈 P:公鏈 T:加密通道 S11-S19:步驟 S21-S29:步驟 S31-S35:步驟 S41-S45:步驟 S51-S55:步驟 S61-S65:步驟100: Data Exchange System 10: User node 12: public key 14: Private key 20: The first service node 22: User Profile 24: Verifiable Credentials 24A: Verification message 26: Voucher Information 30: Second service node C: alliance chain S: side chain P: public chain T: encrypted channel S11-S19: Steps S21-S29: Steps S31-S35: Steps S41-S45: Steps S51-S55: Steps S61-S65: Steps

第1圖為本創作一實施例之資料交換系統的示意圖; 第2圖為本創作第一種使用情境的步驟流程圖; 第3圖為本創作第二種使用情境的步驟流程圖; 第4圖為本創作第三種使用情境的步驟流程圖; 第5圖為本創作第四種使用情境的步驟流程圖; 第6圖為本創作第五種使用情境的步驟流程圖;以及 第7圖為本創作第六種使用情境的步驟流程圖。 Fig. 1 is a schematic diagram of a data exchange system of an embodiment of the invention; Figure 2 is a flow chart of the steps for the first usage scenario of this creation; Figure 3 is a flow chart of the steps for the second use scenario of this creation; Figure 4 is a flow chart of the steps of the third usage scenario of this creation; Figure 5 is a flow chart of the steps of the fourth usage scenario of this creation; Figure 6 is a flow chart of the steps of the fifth usage scenario of this creation; and Figure 7 is a flow chart of the steps for creating the sixth usage scenario.

100:資料交換系統 100: Data Exchange System

10:用戶節點 10: User node

12:公鑰 12: public key

14:私鑰 14: Private key

16:數位身份 16: Digital Identity

20:第一服務節點 20: The first service node

22:用戶資料 22: User Profile

24:可驗證憑證 24: Verifiable Credentials

24A:驗證訊息 24A: Verification message

26:憑證資訊 26: Voucher Information

30:第二服務節點 30: Second service node

C:聯盟鏈 C: alliance chain

S:側鏈 S: side chain

P:公鏈 P: public chain

T:加密通道 T: encrypted channel

Claims (10)

一種資料交換系統,至少包含有:一用戶節點,持有一公鑰及一私鑰,其中該公鑰及該私鑰為對應;一第一服務節點,與該用戶節點資訊連接,且保管有一用戶資料;該第一服務節點使用該用戶節點提供的該公鑰以及該用戶資料產生一可驗證憑證(Verifiable Credential,VC)以及一憑證資訊,並將該憑證資訊傳送給該用戶節點留存;以及一第二服務節點,與該用戶節點資訊連接;該第二服務節點利用該用戶節點提供的該憑證資訊取得該可驗證憑證,進而要求該用戶節點使用該私鑰驗證該可驗證憑證的可信度;其中,若該用戶節點遵照該第二服務節點之要求而成功驗證該可驗證憑證的可信度,該第二服務節點獲准取得該第一服務節點所保管之該用戶資料的至少一部份。 A data exchange system at least includes: a user node, holding a public key and a private key, wherein the public key and the private key are corresponding; a first service node, connected with the user node information, and keeping a User information; the first service node uses the public key provided by the user node and the user information to generate a verifiable certificate (Verifiable Credential, VC) and a certificate information, and transmits the certificate information to the user node for storage; and A second service node is informationally connected to the user node; the second service node obtains the verifiable certificate by using the certificate information provided by the user node, and then requires the user node to use the private key to verify the authenticity of the verifiable certificate Wherein, if the user node successfully verifies the authenticity of the verifiable credential in accordance with the requirements of the second service node, the second service node is allowed to obtain at least a part of the user data kept by the first service node share. 如請求項1所述之資料交換系統,其中該可驗證憑證包含有一驗證訊息,且該第二服務節點在要求該用戶節點驗證該可驗證憑證的可信度時,係以該公鑰加密該可驗證憑證的該驗證訊息後傳送給該用戶節點,該用戶節點使用該私鑰解出該可驗證憑證的該驗證訊息,再回傳給該第二服務節點比對,若比對正確,則該用戶節點的一數位身份得到驗證。 The data exchange system as described in claim 1, wherein the verifiable certificate includes a verification message, and when the second service node requests the user node to verify the authenticity of the verifiable certificate, it encrypts the certificate with the public key The verification message of the verifiable certificate is sent to the user node, and the user node uses the private key to decrypt the verification message of the verifiable certificate, and then sends it back to the second service node for comparison. If the comparison is correct, then A digital identity of the user node is verified. 如請求項1所述之資料交換系統,其中該第一服務節點更將該可驗證憑證上鏈至一聯盟鏈(consortium blockchain),且該憑證資訊即是該可驗證憑證的一區塊鏈位址;該第二服務節點係利用該區塊鏈位址於該聯盟鏈取得該可驗證憑證。 The data exchange system as described in Claim 1, wherein the first service node further links the verifiable certificate to a consortium blockchain, and the certificate information is a block chain bit of the verifiable certificate address; the second service node uses the block chain address to obtain the verifiable certificate in the consortium chain. 如請求項3所述之資料交換系統,其中該聯盟鏈採用權威共識證明(proof-of-authority,POA)為其共識演算法。 The data exchange system as described in Claim 3, wherein the consortium chain adopts proof-of-authority (POA) as its consensus algorithm. 如請求項3所述之資料交換系統,其中該聯盟鏈另透過一側鏈(sidechain)與一公鏈(public chain)連接。The data exchange system as described in Claim 3, wherein the consortium chain is connected to a public chain through a side chain. 如請求項1所述之資料交換系統,其中該第一服務節點係將該可驗證憑證保存於一星際檔案系統(InterPlanetary File System,IPFS),且該憑證資訊是該可驗證憑證的一內容辨識碼(content identifier,CID);該第二服務節點係利用該內容辨識碼取得該可驗證憑證。The data exchange system as described in Claim 1, wherein the first service node stores the verifiable certificate in an InterPlanetary File System (IPFS), and the certificate information is a content identification of the verifiable certificate code (content identifier, CID); the second service node obtains the verifiable certificate by using the content identifier. 如請求項1所述之資料交換系統,其中該第一服務節點所保管之該用戶資料的至少一部份係包含於該可驗證憑證中;該第二服務節點係由該可驗證憑證中取得該用戶資料的該至少一部份。The data exchange system as described in Claim 1, wherein at least a part of the user data kept by the first service node is included in the verifiable certificate; the second service node is obtained from the verifiable certificate the at least a portion of the user profile. 如請求項1所述之資料交換系統,其中該第一服務節點所保管之該用戶資料的至少一部份係透過一加密通道或使用一加密信封傳送給該第二服務節點。The data exchange system as described in Claim 1, wherein at least a part of the user data stored by the first service node is transmitted to the second service node through an encrypted channel or an encrypted envelope. 如請求項1所述之資料交換系統,其中該第一服務節點係將該用戶資料保存於一星際檔案系統(InterPlanetary File System,IPFS),該第二服務節點係由該星際檔案系統取得該用戶資料的至少一部份。The data exchange system as described in Claim 1, wherein the first service node saves the user data in an InterPlanetary File System (IPFS), and the second service node obtains the user from the InterPlanetary File System at least part of the data. 如請求項1所述之資料交換系統,其中該用戶節點所持有的該公鑰為一實體金鑰。The data exchange system as described in Claim 1, wherein the public key held by the user node is an entity key.
TW112201784U 2023-03-01 2023-03-01 Data exchange system TWM644096U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW112201784U TWM644096U (en) 2023-03-01 2023-03-01 Data exchange system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW112201784U TWM644096U (en) 2023-03-01 2023-03-01 Data exchange system

Publications (1)

Publication Number Publication Date
TWM644096U true TWM644096U (en) 2023-07-21

Family

ID=88148856

Family Applications (1)

Application Number Title Priority Date Filing Date
TW112201784U TWM644096U (en) 2023-03-01 2023-03-01 Data exchange system

Country Status (1)

Country Link
TW (1) TWM644096U (en)

Similar Documents

Publication Publication Date Title
US11271754B2 (en) Data authorization based on decentralized identifiers
US11093933B1 (en) Data authorization based on decentralized identifiers
US12113849B2 (en) Data processing method, apparatus, and device, blockchain system, and computer-readable storage medium
US20220020001A1 (en) Decisional Architectures in Blockchain Environments
US10484178B2 (en) Systems and methods for providing a universal decentralized solution for verification of users with cross-verification features
US9419951B1 (en) System and method for secure three-party communications
JP2023527811A (en) Method, apparatus, and computer readable medium for authentication and authorization of networked data transactions
US20170140408A1 (en) Transparent self-managing rewards program using blockchain and smart contracts
JP2020071617A (en) Transaction method, program, verifying apparatus and creating method
US20160132877A1 (en) Secure authorizations using independent communications and different one-time-use encryption keys for each party to a transaction
CN112991045B (en) Medical health consumption financing method, device, equipment and medium based on blockchain
EP3883204B1 (en) System and method for secure generation, exchange and management of a user identity data using a blockchain
CN114266069B (en) House transaction electronic data sharing system and method based on blockchain technology
JP2025510779A (en) A unified platform for digital asset registration, tracking and authentication
WO2019209286A1 (en) Systems and methods for providing a universal decentralized solution for verification of users with cross-verification features
US20060174335A1 (en) Systems and methods of establishment of secure, trusted dynamic environments and facilitation of secured communication exchange networks
CA2892457C (en) Secure authorizations using independent communications and different one-time-use encryption keys for each party to a transaction
TWM644096U (en) Data exchange system
TWI838145B (en) Data exchange system
CN117557360A (en) Digital creditor certificate generation method and device, computer equipment and storage medium
CN116862508A (en) Machine learning model transaction system based on alliance blockchain
KR102346085B1 (en) Method for Trading Ownership of Products
Umoren et al. Enhancing user verification and data security scheme for fog computing using self sovereign identification
KR102320103B1 (en) Method for Authenticating Genuineness by Substituting the Autograph of the Work
Gavrilov et al. BLOCKCHAIN TECHNOLOGY FOR AUTHENTICATION, AUTHORIZATION AND IMMUTABILITY OF HEALTHCARE DATA IN PROCESS OF RECIPES PRESCRIPTIONS.

Legal Events

Date Code Title Description
MM4K Annulment or lapse of a utility model due to non-payment of fees