web3.0和区块链 区块链web应用

Web 2.0中的身份验证是通过身份验证的对象通过显示身份密钥来证明其身份的过程。DID记录包含大量数据,包括DID号,比较字符名称和公共密钥以及关联身份密钥。似乎不熟悉DID的学生也可能会对DID号码仅仅是随机的感到惊讶。


当您在物理世界中时,不需要身份验证。如果有人认识您,他们也会知道您的身份。您无需坐下来就可以证明自己是谁。

但是,在数字世界中并非如此。登录网站时,通常使用用户名和密码登录。这是为了一个人的安全和隐私。

一个人可以是公民,驾驶员,视频站点的用户,丈夫,儿子以及其他各种东西。使用身份文档模型,可以轻松地了解各种情况下的身份认证,并且也可以以统一的方式进行。

Web 2.0:身份验证

身份证明文件包含两个存储在可信介质中的数据。这两个数据是身份名称和身份密钥。Web 2.0中的身份验证是通过身份验证的对象通过显示身份密钥来证明其身份的过程。

传统上,身份认证表示确认物理身份和社会角色之间的绑定关系。但是抽象模型还适用于被认证的事物是与某人(例如互联网站点,设备或机器人)分离的个体的情况。

身份文件阅读模型充分说明了登录到官方网站以实现身份认证的当前过程。

要验证的人是应用程序,因此要验证的对象是用户。为何难以伪造密码的原因并不是因为密码太复杂,而是因为其他人不知道密码。

分散的自治身份认证过程

DID活动的前提是DID报告,该报告保存在区块链中。区块链是一种永久性的存储介质,受到全球个人的信任。

DID记录包含大量数据,包括DID号,比较字符名称和公共密钥以及关联身份密钥。

DID操作的基础是DID文档,该文档存储在区块链中。区块链是一种不可变的存储介质,受到世界各地人们的信任。

DID文件包含许多信息,包括DID号,对应的标识名称以及公共密钥,对应的标识密钥。

基于DID的身份验证还有其他各种特征。首先,DID文档中的身份密钥是公共的。此外,在认证过程中,被认证的人没有持有存储在文档中的身份密钥。关于基于加密的身份验证的DID的想法并不是一个新的创造。

认证和授权是分不开的。似乎不熟悉DID的学生也可能会对DID号码仅仅是随机的感到惊讶。由于大多数时候,身份和权力是捆绑在一起的。也可以说身份是由权力和义务定义的。

最后,结合各种讨论,人们发现,无论是数字空间还是物理空间,无论是集中式还是分散式,身份通常都抽象为存储在可信介质上的身份。这些文档是包含身份名称和身份密钥的文档。


Authentication in Web 2.0 is the process by which an authenticated object proves its identity by revealing an identity key. DID records contain a large amount of data, including DID numbers, comparison character names and public keys, and associated identity keys. Students who seem unfamiliar with DID may also be surprised that DID numbers are merely random.


Authentication is not required when you are in the physical world. If someone knows you, they will also know who you are. You don’t have to sit down to prove who you are.

However, this is not the case in the digital world. When logging into a website, you usually log in with a username and password. This is for a person's safety and privacy.

A person can be a citizen, a driver, a user of a video site, a husband, a son and various other things. Using the identity document model, authentication in various scenarios can be easily understood and also done in a unified manner.

Web 2.0: Authentication

The identity document contains two pieces of data stored in a trusted medium. These two pieces of data are the identity name and the identity key. Authentication in Web 2.0 is the process by which an authenticated object proves its identity by revealing an identity key.

Traditionally, identity authentication means confirming the binding relationship between physical identity and social role. But the abstract model also applies to situations where the thing being authenticated is an individual separate from someone (such as an internet site, a device, or a bot).

The identity document reading model fully explains the current process of logging into the official website to achieve identity authentication.

The person to be authenticated is the application, so the object to be authenticated is the user. The reason why passwords are difficult to forge is not because they are too complex, but because other people don’t know them.

Decentralized autonomous identity authentication process

The prerequisite for DID activities is the DID report, which is saved in the blockchain. Blockchain is a permanent storage medium that is trusted by individuals around the world.

DID records contain a large amount of data, including DID numbers, comparison character names and public keys and associated identity keys.

The basis of DID operations is the DID document, which is stored in the blockchain. Blockchain is an immutable storage medium trusted by people around the world.

DID files contain a lot of information, including the DID number, the corresponding identification name, and the public key, the corresponding identification key.

There are various other features of DID-based authentication. First, the identity keys in the DID document are public. Furthermore, during the authentication process, the person being authenticated does not hold the identity key stored in the document. The idea of ​​DID for cryptographic-based authentication is not a new creation.

Authentication and authorization are inseparable. Students who seem unfamiliar with DID may also be surprised that DID numbers are merely random. Because most of the time, identity and power are tied together. Also known asIdentity is defined by rights and obligations.

Finally, combined with various discussions, it was found that whether it is a digital space or a physical space, whether it is centralized or decentralized, identity is usually abstracted as an identity stored on a trusted medium. These documents are documents that contain identity names and identity keys.

本文来源: 网络 文章作者: 网络投稿
    下一篇