Академический Документы
Профессиональный Документы
Культура Документы
Of
Blockchain based Dynamic Multi-Dimension Identification
1
Table of Content
2
1、Project Background
Two smart contracts (certification contract and payment contract) have been
developed in the MVP phase, which have been released on the NEO testnet.
Check certification contract scrip harsh value:
0x33ee36c712b37df8acfbda4a1beb165e100ed3e0
Check payment contract scrip hasvalue:
0x2e05dc2c1d5780b3b7698944d0a59b3dc51efde3
2、Business Scenarios
The application scenario for the development is the mobile medical insurance
payment in Kaifeng, China. Study on technical feasibility will be conducted on core
3
technologies of BDMI and key links of the THEKEY ecosystem, according to the
White Paper.The eight working steps set by the BDMI technology application in this
MVP development work are:
• The hospital, as the service provider, triggers an IDV request for certain aspects of
a given individual user’s medical history as requested by the medical insurance
agency.
• The individual user (i) accepts and confirms the IDV request by confirming his /
her biometric data through THEKEY application or through terminal device
reader equipment provided at the hospital and (ii) approves the Smart Contract
between the hospital, THEKEY and himself / herself.
• THEKEY then reviews the IDV data request sent by the hospital against the Know
Your Customer (KYC) policy of the relevant industry to justify if the data request
is reasonable.
• THEKEY will compare and check the biometric data provided by the user against
the relevant comparable data validated by the government and it will also cross
check that biometric data against the latest Personal Identity Information (PII)
data, behavior data as well as the location data of the given user. These are all
automatically settled through encrypted interfaces.
• Once THEKEY has verified the validity of the user’s ID, the IDV process will
continue. Relevant PII like the user’s medical history will be collected as outlined
by the Smart Contract. THEKEY will then provide its verification of the result on
the blockchain, so that the medical insurance agency can then use it for its Claim
Processing Automation (CPA).
• The Smart Contract will be settled by TKY Tokens.
• At the same time, all previous calculations and checks will be recorded for any
future data audit.
• The credit of the user will be regularly evaluated and calculated through the
above-mentioned data audit.
Three key parts for the MVP developing task in the build of the THEKEY Ecosystem
are as follows:
Components Key Elements Descriptions
4
Participants Validator THEKEY
Statutory Medical
Insurance Bureau
Public Security Bureau
Politics and Law
Committee
Telecommunication
company
User Users covered by the
statutory medical insurance.
Service Provider Hospital
Smart Contract Authorization Center Authentication
Authorization
KYC Protection Policy
Data Security Center Personal Privacy
Protection
State confidential
information protection
Other Chinese law
compliance.
Payment Center Hospital to THEKEY
THEKEY to other
validator.
TKY Token Users use TKY to pay for
medical bills in hospital
3、Technical Implementation
According to the White Paper, THEKEY adopted the NEO blockchain framework and
built a private NEO simulation environment, and for future work of our private
backbone chain, with private hardware, open source NEO packages as well as our
own development instead of using NEO public chain platform.
5
c) IDV Terminal: including THKEY APP and hospital integrated machine.
NEO node software package Neo-cli (and release smart contract) and IPFS distributed
data storage software package are respectively deployed on the AWS server side. The
NEO wallet client and DAPP were deployed on our private Tsinghua Unigroup
servers, while the NEO node software package Neo-cli was also deployed. However,
it does not participate in the consensus mechanism in the chain and is only used for
the dynamic code of the user account.
b) DAPP of THEKEY obtains user information for IDV and feedback results.
7
①DAPP of THEKEY after receiving the notification from the hospital DAPP,
call NEO's API to obtain the corresponding encrypted hash value;
②THEKEY DAPP decrypts the hash value and retrieves user related data from
the IPFS system.
③ THEKEY DAPP invokes the industry rules inspection interface in the
certification contract to retrieve the validation rules;
④THEKEY DAPP calls the interface for verification based on the validation
rules;
⑤ THEKEY DAPP triggers the payment contract to complete the token
allocation;
⑥The payment contract then pays the operator, THEKEY the corresponding
TKY;
⑦ THEKEY DAPP uploads the verification result and prescription ledger
information to the IPFS system and returns the IPFS hash value;
⑧ THEKEY DAPP invokes the authentication feedback interface in the
certification contract, encrypts and broadcasts the IPFS hash on the blockchain;
⑨THEKEY DAPP notifies the hospital DAPP of the transaction identifier on the
chain.
8
c) The hospital DAPP obtains the verification result and the prescription ledger
information, and the user pays the bill and then generates the settlement slip
on the chain.
①The hospital DAPP retrieves the IPFS hash from the blockchain;
②The hospital DAPP retrieves the verification result and prescription ledger
information from the IPFS system;
③The hospital DAPP displays prescription ledger information in the terminal;
④The user selects a prescription and use TKY to pay the hospital;
⑤The hospital DAPP uploads the payment result settlement slip to IPFS and get
the hash value.
⑥ The hospital DAPP invokes the settlement certificate interface in the
certification contract, encrypts and broadcasts the IPFS hash on the blockchain;
⑦Hospital DAPP notifies THEKEY DAPP of the transaction identifier on the
blockchain.
9
According to the White Paper, THEKEY uses NEO Contract as a smart contract
system. The contract mainly implements three aspects of business: data security,
authentication and authorization, and token circulation.
a) Data Security Center
For personal data, we have conducted data security protection at the Data
Security Center, which is mainly reflected in the desensitization of sensitive
data that may be related to people or data sources. In accordance with the
rules set out in some Chinese laws, sensitive data involving state secrets are
removed.
b) Authorization Center
10
THEKEY receives the authentication request initiated by the service provider,
authorizes it according to the industry (application scenario) multidimensional
cross-validation rules, and obtains information verification and feedback
information.
11
Hospital DAPP initiates verification of 3 TKY transfers to the payment
contract. The payment contract temporarily stores TKY.
The THEKEY DAPP triggers the payment contract to complete the
assignment of the Token based on the result of the call of interface.
If all multidimensional authentication interface calls are successful (return
the result), the payment contract transfers 2 TKYs to THEKEY, otherwise
returns 2 TKYs to the hospital.
If the location information interface call succeeds (returning the result),
the payment contract transfers 1 TKY to the operator, and conversely
returns 1 TKY to the hospital.
Each user (hospital, THEKEY, data source) can install NEO's wallet software on his
terminal to query TKY in his account.
12
The user can operate on the terminal machine to query prescription information, as
well as TKY payment and balance inquiry functions. In order to ensure the security of
the user's digital assets, we authenticate the user when opening an account. After the
user passes the authentication, he creates a digital wallet bound to his real identity,
which is called a Real-ID Wallet. Each payment operation of the user requires identity
authentication through biological information. After the certification is passed, the
private key is triggered and the payment action is completed. This fundamentally
eliminates the malicious use of fraudulent use or theft of private keys, and ensures the
safety of the user's assets to the greatest extent.
4、Business Flowchart
1. The hospital, as the service provider, triggers an IDV request for certain aspects
of a given individual user’s medical history as requested by the medical insurance
agency.
2. The individual user (i) accepts and confirms the IDV request by confirming his /
her biometric data through THEKEY application or through terminal device
reader equipment provided at the hospital and (ii) approves the Smart Contract
between the hospital, THEKEY and himself / herself.
3. THEKEY then reviews the IDV data request sent by the hospital against the
Know Your Customer (KYC) policy of the relevant industry to justify if the data
request is reasonable.
4. THEKEY will compare and check the biometric data provided by the user against
the relevant comparable data validated by the government and it will also cross
check that biometric data against the latest Personal Identity Information (PII)
data, behavior data as well as the location data of the given user. These are all
automatically settled through encrypted interfaces.
5. Once THEKEY has verified the validity of the user’s ID, the IDV process will
continue. Relevant PII like the user’s medical history will be collected as outlined
by the Smart Contract. THEKEY will then provide its verification of the result on
the blockchain, so that the medical insurance agency can then use it for its Claim
Processing Automation (CPA).
6. The Smart Contract will be settled by TKY Tokens.
7. At the same time, all previous calculations and checks will be recorded for any
13
future data audit.
8. The credit of the user will be regularly evaluated and calculated through the
above-mentioned data audit.
14
5、Conclusion
Through the development and testing of the MVP, we came to the following initial
conclusions:
• First, “undeniable” and “unalterable” online IDV results were generated for
the first time in the world through BDMI technology. BDMI embraces 6
elements simultaneously to realize EA5 (e-authentication-5) level IDV
services. Since IDV is fundamental to establish mutual trust in the digital
world, we believe that BDMI will become an underlying layer that will
facilitate the development of blockchain technology and the digital economy.
• Third, for the first time, we were able to integrate IDV and digital wallets to
form a real identity wallet (RIW). We believe this real identity wallet
technology will play an important role in anti-money laundering applications,
which can lay a solid foundation for the healthy development of
cryptocurrencies and the digital economy.
In this phase, we focused on establishing the baseline technical feasibility proof. For
the next stage, we will focus on improving the performance, efficiency and reliability
of BDMI technology. In addition, we understand the vital need to have equipment
which is trusted and secure to underpin any of the work BDMI technology will be
based on, and thus we look to develop exclusive hardware devices in the future.
15
We began this process to ensure we build a superior product for our investors and our
community. This is just the first step in our journey. I thank you all for the support
you have given to THEKEY and me. With it, we will continue to work hard to
accomplish what we set out in the beginning.
https://github.com/thekeygithub/MVP
a) Mobile-APP: source code of Android APP in the android smartphone
b) Hospital-DAPP: hospital DAPP server code
c) Hospital-terminal-APP: source code of Android APP in the All-in-one terminal
d) IPFS-api: source code of IPFS private network data access API service
e) THEKEY-DAPP: THEKEY DAPP service source code
f) NEO: Smart Contract Code, including certification contract, payment contract
g) NEO-cli-ebao: modified source code of the neo-cli code for the wallet transfer
interface
16