Identity on the chain, helping 500,000 citizens to get loans easily | chain + identity verification
黄雪姣
2019-11-21 08:04
本文约3109字,阅读全文需要约12分钟
Circulate personal credit data on the chain to facilitate all aspects of life.

Produced | Odaily (ID: o-daily)

Produced | Odaily (ID: o-daily)

The top-level attention has brought blockchain attention again. At the same time, pyramid schemes, fraud, and illegal fundraising in the name of the blockchain are raging, but the real large-scale application of the blockchain has not been seen, which makes the public feel that the blockchain "does not know what it can do". Confuse.

Since its establishment, Odaily Sunday Daily has continued to track the development of the blockchain + industry. According to Odaily's observations, compared to two years ago, there has been a lot of progress in the implementation of the blockchain, but on the one hand, many improvements are at the bottom of the system, and users cannot directly see that the blockchain is used. It; on the one hand, some applications are still in the pilot stage, and users have not yet experienced them. In the future, blockchain is expected to be applied on a large scale and become one of the Internet infrastructures.

Therefore, Odaily launched the "Chain +" column to introduce blockchain + specific scenarios to users. The theme of this issue is "Chain + Identity Verification".

In recent years, a data leakage scandal has hit the nerves of netizens. "The man's identity information was fraudulently used, and he was innocent of the crime of 'robbing' for 7 years" "Personal information was leaked, and college students were 'loaned' to more than 500,000"...

According to a report by the China Internet Network Information Center (CNNIC), among all kinds of network security issues, Chinese netizens have the highest proportion of information leakage, reaching 28.5%.

How to effectively protect personal information in all aspects has become one of the topics that netizens are most concerned about. But the status quo is that traditional means cannot keep up with the problems of the digital age, or the solutions are inefficient and ineffective.

The blockchain, which has recently been placed with high hopes, may be able to solve this problem.

Creating a blockchain-based digital identity can encrypt user identity information from the source, and achieve the effect of "information is available but not visible" in identity verification and data transfer.

secondary title

Why is information leakage difficult to prevent?

Have you ever encountered such a situation in your life: the ID card is lost, and the ride and accommodation are affected. If you forget to bring your student ID card, you will not be able to enjoy discounts when you take a bus or go to tourist attractions. At the same time, some people fished in troubled waters with various false certificates, and even pretended to use other people's identities to commit crimes.

Why is the current system struggling to cope with this problem? Let's see why.

After the personal ID card is lost, the owner usually goes to the Public Security Bureau to report the loss. But there is a problem. The smart chip of the second-generation ID card cannot be "invalidated" by remote rewriting. Therefore, even though the owner has "cancelled" the ID card in the public security system, as long as the magnetism of the lost ID card is still there, the "valid" identity information read by various devices is still valid, and the person holding the ID card is still Use it to buy train tickets, open bank accounts, register companies, and more. In the event of an accident, the real owner of the ID card will be held accountable and bear the responsibility for the proof process to prove "that I am not me".

Coupled with Internet information leakage, many people's identities are not lost and picked up by others, but "sold" or "stolen". Some companies failed to protect the personal information uploaded by real-name users, resulting in some users' personal information being sold for loans and other scenarios.

Many people hope to eliminate this hidden danger by supervising companies that collect information. However, there are tens of thousands of companies in the world, and data transactions are in a dark area, and it is not easy to implement.

secondary title

How does blockchain solve problems?

In response to the above problems, we can try to use blockchain-based digital identities to encrypt user identities from the source, so as to get rid of the original "name + mobile phone number (+ ID number)" authentication method and protect personal privacy.

It is understood that the eID network identity operation agency under the guidance of the Third Research Institute of the Ministry of Public Security is jointly developing a "digital identity chain" with E-Link, which uses the citizen ID number as the root and issues it to Chinese citizens based on cryptographic algorithms. Since it was put into operation, the eID digital identity system has served the full lifecycle management of 100 million eIDs.

If this identity system is widely adopted, the problem of fraudulent use and abuse of personal identity information will be effectively alleviated.

Take the case of the criminal little C who wants to use the ID card of little A to apply for a mobile phone number as an example.

Little C went to China Telecom to apply for a card. If the salesperson passed the review without paying attention or with selfishness in the process of verifying his identity, this gave criminals an opportunity to take advantage of.

If the verification method is on-chain identity verification, then China Telecom sends a verification request to the public security system, asking it to verify whether the cardholder is Little A, so the public security system returns a request to Little A, asking him to enter a key/fingerprint, etc. . As a result, Little C was unable to apply for a card.

Another example is that a commercial company wants to do real-name authentication for me. The process can be as follows: I tell the company my identity—the company sends a request to query the identity on the chain—the identity chain sends the verification request to the identity chain APP ——I verify and respond to the request with one click on the APP (of course, before the verification, I need to pass the verification of identity signs such as face recognition on the APP)—the identity chain and commercial companies believe that "I am me".

Compared with the previous method of simply using the ID card as a certificate, this verification method is more secure; compared with uploading photos of the person holding the certificate, face recognition, etc., using the asymmetric encryption technology in the blockchain is more secure. Protect user privacy (personal identity sign information does not need to be uploaded to commercial companies).

In addition, the use of blockchain can improve the efficiency of information synchronization and expand the dimension of personal identity.

In the past, "identity" generally refers to the ID card information issued by the public security department, but in fact, the household registration book, real estate under the name, work status, credit records, etc. are all components of the user's identity. Now when users handle business in government affairs systems and commercial organizations, they always have to provide a lot of information.

secondary title

500,000 citizen identities have been chained

The above mentioned the "trusted identity chain" which is still in the conceived stage. Let me introduce to you two other blockchain identity authentication projects that have been reported by Odaily—Identity Chain and WeIdentity.

The identity chain is mainly used in the chain of residents' property rights information in the field of government affairs, developed by Guizhou Far East Company.

According to public information, in April 2017, Guizhou Far East was jointly funded and established by Guizhou Comprehensive Insurance Group (state-owned holding company), Far East Credit and Onchain (distributed technology), and settled in Guiyang Comprehensive Free Trade Zone. Distributed Technology is mainly engaged in the R&D and design of blockchain platforms. The founder is Da Hongfei. The released platforms include NEO, Legal Chain and Identity Chain.

At present, this identity chain has issued on-chain IDs to 500,000 citizens in Qingzhen City, Guizhou Province, and recorded the integrity traces of each person on the chain. Various applications in government affairs.

For example, as a farmer, the land and forest rights confirmation information under his name will be generated with a unique "identity chain storage certificate number", which will be confirmed online and stored throughout the subsequent transfer process; the government funds he obtains will also be It is issued through the "digital wallet" in the APP, which is transparent and supervised.

Depending on the integrity level indicated by the citizen's identity chain ID, they may enjoy different levels of benefits. The higher the integrity level, the more convenience you can enjoy. For example, in terms of handling and approval, according to the priority policies issued by various departments, the higher the corresponding level, the higher the priority.

Another identity authentication project, WeIdentity, was developed by WeBank, a mutual financial enterprise under Tencent, based on the open source blockchain underlying platform FISCO BCOS, and supports identity authentication and data cooperation between institutions.

image description

The picture is made by Odaily based on public information

All participants work together to complete the entire identity verification process.

First, an entity object (that is, a person or thing with an ID on the chain) applies for an identity certificate from several institutions; then, a user agent (such as a government department) performs KYC on the user and generates an ID on the chain. The entity's identity and data will be kept in a dedicated custodian to ensure that the entity's data is stored securely and independently. Then, the entity can choose to authorize its various data to be used by several institutions, also in a trusted environment.

In February 2019, WeBank signed an agreement with the Macau government. The two parties will upload the training certificates of Macau residents to WeIdentity for real-time authentication or authorized use of data.

image description

5 identity chain projects filed with the Cyberspace Administration of China. Organized by: Odaily

Further reading:

Further reading:

Easily prove that "your mother is your mother", "Gongyilian" and the Ministry of Public Security have developed a trusted identity chain

Helping Guizhou farmers put their land on the chain, the "identity chain" clarifies the property rights circulation process with one click

Not only do online loans, Weizhong Bank also uses "WeIdentity" to put your identity on the chain

To be a strong foundation for smart cities, blockchain enters a new market of 25 trillion yuan

False certificates helped Wu Xieyu escape for three years: 99% of lost ID cards were bought and sold, the blockchain technology of the Ministry of Public Security has beenon the way

Want to play Missing without going to jail? blockchain to help

What exactly can blockchain do?These 506 filing items tell you

黄雪姣
作者文库