CN115811412A - Communication method and device, SIM card, electronic equipment and terminal equipment - Google Patents

Communication method and device, SIM card, electronic equipment and terminal equipment Download PDF

Info

Publication number
CN115811412A
CN115811412A CN202210837363.5A CN202210837363A CN115811412A CN 115811412 A CN115811412 A CN 115811412A CN 202210837363 A CN202210837363 A CN 202210837363A CN 115811412 A CN115811412 A CN 115811412A
Authority
CN
China
Prior art keywords
user
identity information
sim card
virtual
metastic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210837363.5A
Other languages
Chinese (zh)
Inventor
梁伟
卢毅
刘岩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Telecom Corp Ltd
Original Assignee
China Telecom Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Telecom Corp Ltd filed Critical China Telecom Corp Ltd
Priority to CN202210837363.5A priority Critical patent/CN115811412A/en
Priority to PCT/CN2022/142033 priority patent/WO2024011863A1/en
Publication of CN115811412A publication Critical patent/CN115811412A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols

Abstract

The embodiment of the disclosure provides a communication method and device, a SIM card, electronic equipment and terminal equipment, and relates to the technical field of a meta universe. The system comprises a metas application module, a SIM card and a user interface module, wherein the metas application module is used for sending an identity information request to the SIM card when needing to access a metas platform; and the terminal is further used for sending an authentication request to the metastic platform based on the virtual identity information so that the metastic platform authenticates the authentication request based on the virtual identity information. The SIM card is used for acquiring the locally recorded virtual identity information and sending the virtual identity information to the metachronic application module when receiving the identity information request; wherein, the virtual identity information is: when a first user logging in the metachrosis application module registers an SIM card, the SIM card is generated and obtained based on a private key of the first user; the private key of the first user is obtained by performing hash calculation on a preset random number. The risk of virtual identity information leakage can be reduced, and privacy protection of users is facilitated.

Description

Communication method, communication device, SIM card, electronic equipment and terminal equipment
Technical Field
The present disclosure relates to the field of meta universe technologies, and in particular, to a communication method and apparatus, a SIM card, an electronic device, and a terminal device.
Background
The metase (Metaverse) is a virtual world that maps to and interacts with the real world. Based on the metauniverse, the virtual world and the real world can be fused on an economic system, a social system and an identity system, and users are allowed to produce contents and edit the world.
In the related art, a user may register through an internet platform, and the internet platform may generate virtual identity information that the user uses to access the metasma, and further, the user may access the metasma platform based on the virtual identity information.
However, in the related art, the internet platform may record the virtual identity information of the user, and the virtual identity information lacks privacy protection, so that the risk of leakage of the virtual identity information exists, and the privacy protection of the user is not facilitated.
Disclosure of Invention
The disclosed embodiments aim to provide a communication method, a communication device, a SIM card, an electronic device and a terminal device, which can reduce the risk of virtual identity information leakage and are beneficial to privacy protection of users. The specific technical scheme is as follows:
in a first aspect of the embodiments of the present disclosure, a terminal device is provided first, where the terminal device includes: a Subscriber Identity Module (SIM) card; and installing a metastic application module, wherein:
the metastic application module is used for sending an identity information request to the SIM card when the metastic platform is required to be accessed;
the SIM card is used for acquiring locally recorded virtual identity information and sending the virtual identity information to the metastic application module when receiving the identity information request; wherein the virtual identity information is: when a first user logging in the metas application Module registers a Subscriber Identity Module (SIM) card, the SIM card is generated based on a private key of the first user; the private key of the first user is obtained by carrying out Hash calculation on a preset random number;
the metas application module is further configured to send an authentication request to the metas platform based on the virtual identity information, so that the metas platform authenticates the authentication request based on the virtual identity information.
In a second aspect of the embodiments of the present disclosure, a communication method is provided, where the method is applied to a metastic application module in a terminal device, the terminal device further includes a SIM card, and the method includes:
when a metas platform needs to be accessed, sending an identity information request to the SIM card, so that the SIM card obtains locally recorded virtual identity information when receiving the identity information request, and sends the virtual identity information to the metas application module; wherein the virtual identity information is: when a first user logging in the metastic application module registers the SIM card, the SIM card is generated and obtained based on a private key of the first user; the private key of the first user is obtained by carrying out hash calculation on a preset random number;
based on the virtual identity information, sending an authentication request to the meta universe platform so that the meta universe platform authenticates the authentication request based on the virtual identity information.
In some embodiments, the method further comprises:
acquiring a transaction record of the first user in the meta-universe platform;
sending the transaction record to the SIM card so that the SIM card carries out encryption processing on the transaction record based on a private key of the first user to obtain a corresponding digital signature, and sending the digital signature to the metas application module;
and acquiring the digital signature from the SIM card, and sending the transaction record and the digital signature to the metastic platform.
In some embodiments, the method further comprises:
when detecting that the first user acquires the virtual asset in the metastic platform, sending the virtual asset to the SIM card, so that the SIM card generates a unique identifier of the virtual asset based on the virtual identity information, and locally and correspondingly recording the virtual asset and the unique identifier.
In a third aspect of the embodiments of the present disclosure, a communication method is provided, where the method is applied to a SIM card in a terminal device, the terminal device further includes a metastic application module, and the method includes:
when an identity information request is received, acquiring locally recorded virtual identity information; the identity information request is sent to the SIM card when the metastic application module needs to access a metastic platform;
sending the virtual identity information to the metastic application module; wherein the virtual identity information is: when a first user logging in the meta universe application module registers the SIM card, the SIM card is generated and obtained based on a private key of the first user; the private key of the first user is obtained by carrying out Hash calculation on a preset random number; so that the metastic application module sends an authentication request to the metastic platform based on the virtual identity information, so that the metastic platform authenticates the authentication request based on the virtual identity information.
In some embodiments, the method further comprises:
receiving a transaction record sent by the metastic application module; wherein the transaction record is a transaction record of the first user in the metastic platform;
encrypting the transaction record based on the private key of the first user to obtain a corresponding digital signature;
sending the digital signature to the metastic application module to cause the metastic application module to send the transaction record and the digital signature to the metastic platform.
In some embodiments, the method further comprises:
receiving the virtual assets sent by the metastic application module; wherein the virtual asset is acquired by the first user in the meta-universe platform;
and generating a unique identifier of the virtual asset based on the virtual identity information, and locally and correspondingly recording the virtual asset and the unique identifier.
In some embodiments, the generating of the virtual identity information comprises:
generating a random number;
calculating a hash value of the random number based on a preset hash algorithm to obtain a private key of the first user;
generating a DID (Decentralized Identity) of the first user as the virtual Identity information of the first user based on the private key of the first user.
In some embodiments, the method further comprises:
when the user identity of a user to be verified needs to be verified, acquiring a user password and user real identity information provided by the user to be verified;
determining an encrypted random number and an operator password corresponding to the user real identity information provided by the user to be authenticated based on the corresponding relationship among the user real identity information, the encrypted random number and the operator password which are recorded in advance; wherein the encrypted random number recorded in the correspondence is: the password is obtained by encrypting based on a user password provided by a registered user and a corresponding operator password;
judging whether the determined encrypted random number can be successfully decrypted or not based on the determined operator password and the user password provided by the user to be authenticated;
if so, determining that the user to be authenticated passes the identity authentication;
if not, determining that the user to be authenticated does not pass the identity authentication.
In a fourth aspect of the embodiments of the present disclosure, a communication apparatus is provided, where the apparatus is applied to a metastic application module in a terminal device, the terminal device further includes a SIM card, and the apparatus includes:
an identity information request sending module, configured to send an identity information request to the SIM card when a metas platform needs to be accessed, so that the SIM card obtains locally recorded virtual identity information when receiving the identity information request, and sends the virtual identity information to the metas application module; wherein the virtual identity information is: when a first user logging in the metastic application module registers the SIM card, the SIM card is generated and obtained based on a private key of the first user; the private key of the first user is obtained by carrying out Hash calculation on a preset random number;
and the authentication request sending module is used for sending an authentication request to the metastic platform based on the virtual identity information so that the metastic platform authenticates the authentication request based on the virtual identity information.
In some embodiments, the apparatus further comprises:
the transaction record acquisition module is used for acquiring the transaction record of the first user in the meta-universe platform;
a transaction record sending module, configured to send the transaction record to the SIM card, so that the SIM card performs encryption processing on the transaction record based on the private key of the first user to obtain a corresponding digital signature, and sends the digital signature to the metas application module;
and the digital signature acquisition module is used for acquiring the digital signature from the SIM card and sending the transaction record and the digital signature to the meta-space platform.
In some embodiments, the apparatus further comprises:
and the virtual asset sending module is used for sending the virtual asset to the SIM card when detecting that the first user obtains the virtual asset in the metastic platform, so that the SIM card generates a unique identifier of the virtual asset based on the virtual identity information, and locally and correspondingly records the virtual asset and the unique identifier.
In a fifth aspect of the embodiments of the present disclosure, a communication apparatus is provided, where the apparatus is applied to a SIM card in a terminal device, the terminal device further includes a metastic application module, and the apparatus includes:
the virtual identity information acquisition module is used for acquiring the locally recorded virtual identity information when receiving the identity information request; the identity information request is sent to the SIM card when the metas application module needs to access a metas platform;
a virtual identity information sending module, configured to send the virtual identity information to the metas application module; wherein the virtual identity information is: when a first user logging in the metastic application module registers the SIM card, the SIM card is generated and obtained based on a private key of the first user; the private key of the first user is obtained by carrying out Hash calculation on a preset random number; so that the metastic application module sends an authentication request to the metastic platform based on the virtual identity information, so that the metastic platform authenticates the authentication request based on the virtual identity information.
In some embodiments, the apparatus further comprises:
the transaction record receiving module is used for receiving the transaction record sent by the metacavity application module; wherein the transaction record is a transaction record of the first user in the metastic platform;
the digital signature generation module is used for encrypting the transaction record based on the private key of the first user to obtain a corresponding digital signature;
a digital signature sending module to send the digital signature to the metastic application module to cause the metastic application module to send the transaction record and the digital signature to the metastic platform.
In some embodiments, the apparatus further comprises:
the virtual asset receiving module is used for receiving the virtual assets sent by the meta universe application module; wherein the virtual asset is acquired by the first user in the meta-universe platform;
and the unique identifier generating module is used for generating a unique identifier of the virtual asset based on the virtual identity information and locally and correspondingly recording the virtual asset and the unique identifier.
In some embodiments, the apparatus further comprises:
the random number generating module is used for generating random numbers;
the private key generation module is used for calculating a hash value of the random number based on a preset hash algorithm to obtain a private key of the first user;
and the DID generation module is used for generating a decentralized identity DID of the first user as the virtual identity information of the first user based on the private key of the first user.
In some embodiments, the apparatus further comprises:
the first acquisition module is used for acquiring a user password and user real identity information provided by a user to be authenticated when the user identity of the user to be authenticated needs to be authenticated;
the first determining module is used for determining an encrypted random number and an operator password corresponding to the user real identity information provided by the user to be authenticated based on the corresponding relation of the user real identity information, the encrypted random number and the operator password which are recorded in advance; wherein, the encrypted random number recorded in the corresponding relationship is: the password is obtained by encrypting based on a user password provided by a registered user and a corresponding operator password;
the first judgment module is used for judging whether the determined encrypted random number can be successfully decrypted or not based on the determined operator password and the user password provided by the user to be authenticated; if so, determining that the user to be authenticated passes identity authentication; if not, determining that the user to be authenticated does not pass the identity authentication.
In a sixth aspect of the disclosed embodiments, a SIM card is provided, which includes a computing chip, a communication module, and a SIM card module;
the computing chip is used for carrying out data communication with a meta universe application module in the terminal equipment through the communication module so as to realize any one of the communication method steps applied to the SIM card.
A seventh aspect of the disclosed embodiment provides an electronic device, which is characterized by comprising a processor, a communication interface, a memory and a communication bus, wherein the processor, the communication interface and the memory complete mutual communication through the communication bus;
a memory for storing a computer program;
and the processor is used for realizing any communication method step when the program stored in the memory is executed.
Embodiments of the present disclosure also provide a computer program product containing instructions that, when run on a computer, cause the computer to perform any of the above-described communication methods.
The embodiment of the disclosure has the following beneficial effects:
the terminal equipment provided by the embodiment of the disclosure comprises a subscriber identity module SIM card and a metastic application module, wherein: the system comprises a metasma application module, a SIM (subscriber identity Module) and a user identity module, wherein the metasma application module is used for sending an identity information request to the SIM when needing to access a metasma platform; the SIM card is used for acquiring the locally recorded virtual identity information and sending the virtual identity information to the metachronic application module when receiving the identity information request; wherein, the virtual identity information is: when a first user logging in the meta universe application module registers an SIM card, the SIM card is generated and obtained based on a private key of the first user; the private key of the first user is obtained by carrying out Hash calculation on a preset random number; and the metastic application module is further used for sending an authentication request to the metastic platform based on the virtual identity information so that the metastic platform authenticates the authentication request based on the virtual identity information.
Based on the terminal equipment provided by the embodiment of the disclosure, the virtual identity information of the user can be generated and stored in the SIM card when the user registers the SIM card, and subsequently, based on the virtual identity information recorded in the SIM card, the user can access the metacavic platform without recording the virtual identity information of the user on each Internet platform, so that the risk of virtual identity information leakage is reduced, and the privacy protection of the user is facilitated.
Of course, not all advantages described above need to be achieved at the same time to practice any one product or method of the present disclosure.
Drawings
In order to more clearly illustrate the embodiments of the present disclosure or the technical solutions in the prior art, the drawings used in the embodiments or the prior art descriptions will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present disclosure, and other embodiments can be obtained by those skilled in the art according to the drawings.
Fig. 1 is an architecture diagram of a terminal device according to an embodiment of the present disclosure;
fig. 2 is a structural diagram of a SIM card according to an embodiment of the present application;
fig. 3 is a schematic diagram of a hardware structure of a BSIM card according to an embodiment of the disclosure;
fig. 4 is an interaction diagram of a communication method according to an embodiment of the present disclosure;
FIG. 5 is a schematic diagram of an access metascaps platform provided by an embodiment of the present disclosure;
FIG. 6 is an interaction diagram of another communication method provided by embodiments of the present disclosure;
fig. 7 is an interaction diagram of another communication method provided by an embodiment of the present disclosure;
fig. 8 is a flowchart of a generation process of virtual identity information according to an embodiment of the present disclosure;
fig. 9 is a flowchart of a user authentication process provided by an embodiment of the present disclosure;
fig. 10 is a schematic diagram illustrating authentication of a user to be authenticated according to an embodiment of the present disclosure;
fig. 11 is a schematic view of communication between an operating system of a smart terminal and a SIM card according to an embodiment of the present disclosure;
fig. 12 is a schematic diagram illustrating virtual asset management performed by a SIM card according to an embodiment of the present disclosure;
FIG. 13 is a schematic diagram illustrating a process for managing meta-space assets provided by an embodiment of the present disclosure;
fig. 14 is a block diagram of a communication device provided in an embodiment of the present disclosure;
fig. 15 is a block diagram of yet another communication device provided by an embodiment of the present disclosure;
fig. 16 is a structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present disclosure will be described clearly and completely with reference to the drawings in the embodiments of the present disclosure, and it is obvious that the embodiments described are only some embodiments of the present disclosure, rather than all embodiments. All other embodiments that can be derived from the disclosure by one of ordinary skill in the art based on the embodiments in the disclosure are intended to be within the scope of the disclosure.
In the related art, the internet platform can record the virtual identity information of the user, so that the risk of leakage of the virtual identity information exists, and the privacy protection of the user is not facilitated.
In order to solve the above problem, an embodiment of the present disclosure provides a terminal device, and referring to fig. 1, fig. 1 is an architecture diagram of a terminal device provided in an embodiment of the present disclosure, the terminal device includes a SIM (Subscriber Identity Module) card 101 and a metastic application Module 102, where:
a metastic application module 102, configured to send an identity information request to the SIM card 101 when it is necessary to access the metastic platform.
The SIM card 101 is configured to, when receiving the identity information request, obtain locally recorded virtual identity information, and send the virtual identity information to the metas application module 102.
Wherein, the virtual identity information is: when a first user who logs in the metas application module 102 registers an SIM card, the SIM card 101 is generated based on a private key of the first user; the private key of the first user is obtained by performing hash calculation on a preset random number.
The metas application module 102 is further configured to send an authentication request to the metas platform based on the virtual identity information, so that the metas platform authenticates the authentication request based on the virtual identity information.
The terminal equipment provided by the embodiment of the disclosure can generate the virtual identity information of the user when the user registers the SIM card, store the virtual identity information in the SIM card, and subsequently, based on the virtual identity information recorded in the SIM card, the user can access the metas platform without recording the virtual identity information of the user on each Internet platform, so that the risk of virtual identity information leakage is reduced, and the privacy protection of the user is facilitated.
The terminal device provided by the embodiment of the disclosure can be applied to different scenes, for example, the terminal device can be a mobile phone, and a user can communicate with the metas platform through the mobile phone. Accordingly, the SIM card in the terminal device represents a SIM card built in the mobile phone, and the metastic application module may include an application installed in the mobile phone for accessing a metastic platform.
An embodiment of the present disclosure further provides a SIM card, as shown in fig. 2, fig. 2 is a structural diagram of a SIM card provided in an embodiment of the present application, including: a computing chip 201, a SIM card module 202 and a communication module 203;
and the computing chip 201 is used for carrying out data communication with a metastic application module in the terminal equipment through the communication module 203.
The SIM card in the present disclosure may also be referred to as a BSIM (block chain Subscriber Identity Module) card. The metastables platform application module may be metastables software installed for the terminal device.
In one implementation, as shown in fig. 3, fig. 3 is a schematic diagram of a hardware structure of a BSIM card according to an embodiment of the present disclosure. In fig. 3, the BSIM card includes a SIM card module 301, a bluetooth module 302, a computing chip 303, and an interface module 304. The SIM card module 301 includes the hardware structure of a conventional SIM card, the bluetooth module 302 is the communication module in the above embodiment, and the interface module 304 includes a specific interface described later. The computing chip 303 is configured to generate virtual identity information of a user, sign a transaction record, generate a unique identifier of a virtual asset, and verify the identity of the user, and specifically, will be received in detail in the following embodiments. The computing chip 303 has a financial security level.
In one implementation, the BSIM card may support block chain algorithms such as ECC-secp256k1 (Elliptic Curve Algorithm, elliptic Curve Cryptography), AES (Advanced Encryption Standard), ECDSA-secp256k1 (Elliptic Curve Digital Signature Algorithm ), HMAC-SHA512 (Hash-based Message Authentication Code), and the like. The BSIM card supports a blockchain digital currency protocol such as BIP32 (a wallet layering scheme), BIP44 (a wallet mnemonic creation scheme) and the like. The storage space in the BSIM card is more than 1M, and the user space is more than 450K; the signature speed is less than 150ms. The user space is used for storing virtual identity information, virtual assets, a mobile phone number, an encryption seed and a private key of a user.
In one implementation, the BSIM may be implemented by the following architecture: the system comprises a JAVA application layer, a JAVA platform, a hardware interface layer and a hardware layer. The JAVA application layer is used for realizing block chain application logic in the BSIM card, and comprises seed generation, public and private key generation, encryption storage, digital signature generation, private key recovery, backup and the like. The JAVA platform layer can realize JAVACARD virtual machine and card content management functions and provide a JAVA interface called by an application. The BSIM card communicates with the metastables through a JAVA interface. The hardware interface layer can call a hardware interface based on the C language to generate virtual identity information of the user, sign a transaction record, generate a unique identifier of a virtual asset, verify the identity of the user and the like. The hardware layer can improve the performance of the algorithm through the hardware algorithm IP coprocessor. The hardware algorithm IP coprocessor is the computing chip in the above embodiments.
Based on the same inventive concept, the embodiment of the present disclosure further provides a communication method, which may be applied to an SIM card and a metastic application module in a terminal device. The SIM card and the metastic application module may be the SIM card 101 and the metastic application module 102, respectively, in the terminal device in fig. 1. Referring to fig. 4, fig. 4 is an interaction diagram of a communication method provided by an embodiment of the present disclosure, where the method may include the following steps:
s401: when the metastic platform needs to be accessed, the metastic application module sends an identity information request to the SIM card.
S402: and when the SIM card receives the identity information request, the SIM card acquires the locally recorded virtual identity information and sends the virtual identity information to the metacavic application module.
Wherein, the virtual identity information is: when a first user logging in the metachrosis application module registers an SIM card, the SIM card is generated and obtained based on a private key of the first user; the private key of the first user is obtained by performing hash calculation on a preset random number.
S403: and the metas application module sends an authentication request to the metas platform based on the virtual identity information so that the metas platform authenticates the authentication request based on the virtual identity information.
According to the communication method provided by the embodiment of the disclosure, the virtual identity information of the user can be generated and stored in the SIM card when the user registers the SIM card, and subsequently, based on the virtual identity information recorded in the SIM card, the user can access the meta platform without recording the virtual identity information of the user on each Internet platform, so that the risk of virtual identity information leakage is reduced, and the privacy protection of the user is facilitated.
In addition, in the related art, the virtual assets and virtual identities are the core of the meta universe and bear the asset interests and social identities of the users in the meta universe. However, since the virtual identity interpretation right of the user is in the Internet platform mechanism, the ownership attribute is not clear, and the development of the meta universe is hindered.
Based on the method of the embodiment of the present disclosure, the virtual identity information of the user is recorded in the SIM card registered by the user, so that the user can have ownership of the virtual identity information, that is, ownership of the virtual identity information can be made clear, and the development of the meta universe is promoted.
For step S401, the metastables platform corresponds to a metastables application module, i.e., a user may access different metastables platforms through different metastables application modules.
In one implementation, when a user starts a metastic application module in a smart terminal, the metastic application module may send an identity information request to a SIM card. For example, the metas application module may call an SDK (Software Development Kit) through a specific interface, and then, send an identity information request to the SIM card through the SDK to obtain the identity information stored in the SIM card. The specific interface can be an interface provided by an operating system of the intelligent terminal.
With respect to step S402, the first user is a user who needs to access the metastables through the metastables application module when using the smart terminal currently. In one implementation, the first user may apply for registering the SIM card with the operator, and the SIM card may generate virtual identity information of the first user when registering the SIM card.
For step S403, in one implementation, the virtual identity information of the first user may include a DID. That is, when a first user registers a SIM card, an operator may store the DID of the first user into a blockchain constructed by the operator. Accordingly, the metastables application module may generate a DID verifiable claim based on the DID of the first user and send an authentication request carrying the DID verifiable claim to the metastables platform. Correspondingly, the metastic platform can acquire the DID of the first user stored in the block chain constructed by the operator, and verify the DID verifiable statement based on the DID, and thus can authenticate the authentication request. Wherein the authentication request, i.e. the first user, is authenticated.
For example, the DID may contain a DID identifier and a DID document including: the public key of the first user, a set of encryption protocols, a set of service endpoints, a creation timestamp of the DID document, and a JSON-LD (JavaScript Object notification-Linked Data, a method for representing and transmitting interlinked Data based on JSON) signature. Wherein the JSON-LD signature is used for verifying the legality of the DID document. The public key of the first user corresponds to a private key of the first user mentioned later.
In one implementation, the metastic platform may verify the DID verifiable claim carried in the authentication request based on the DID specification of W3C (World Wide Web Consortium). For example, it may be determined whether the signature in the DID-verifiable claim is legitimate, or it may be determined whether the DID in the DID-verifiable claim is a DID trusted by the metastables platform, i.e., whether the DID identifier and DID document characterized by the DID-verifiable claim are stored in a carrier-built blockchain. That is, when the first user accesses the metastables through the metastables application module, the metastables platform may obtain a DID verifiable statement of the first user, and if the DID verifiable statement passes the verification, it may be determined that the first user is successfully authenticated; otherwise, it is determined that the authentication of the first user fails.
In one implementation, referring to fig. 5, fig. 5 is a schematic diagram for accessing a meta universe platform according to an embodiment of the present disclosure. Each meta space in fig. 5 represents a meta space platform, and after a natural person (i.e., a user) performs real name authentication by an operator, the meta space platform can be logged in, and a plurality of different meta space platforms can be switched to be accessed. The operator stores the DID key (namely DID) of the user in the BSIM card chip, the metaspace platform can acquire the DID of the user from the operator, and subsequently, when the user accesses the metaspace platform, the metaspace platform can analyze and verify the DID verifiable statement, so as to authenticate the user. The DID identification specification definition based on the W3C can realize interconnection, intercommunication and mutual recognition of DIDs with unified specifications among the meta-universe platforms, and users can realize seamless switching among a plurality of meta-universe platforms, namely, the users can access different meta-universe platforms based on one DID without registering different DIDs in different meta-universe platforms. The blockchain infrastructure is a network operating based on blockchain technology, and an operator can participate in the construction of the blockchain infrastructure, and simultaneously, the blockchain can also store the DID. Additionally, a transaction record for each DID in the metastables platform may also be stored in the blockchain. The BSIM card is used for storing the virtual identity information of the user, digital identities among a plurality of meta-universe platforms can be communicated, a uniform identity authentication protocol across the meta-universe platforms is realized, and an authoritative, standard and credible user identity system infrastructure is constructed for the cloud universe platform.
In one implementation, referring to fig. 6, fig. 6 is an interaction diagram of another communication method provided by the embodiment of the present disclosure, and on the basis of fig. 4, the method may include the following steps:
s404: the metastic application module acquires a transaction record of the first user in the metastic platform.
S405: the metastic application module sends a transaction record to the SIM card.
S406: and the SIM card encrypts the transaction record based on the private key of the first user to obtain a corresponding digital signature and sends the digital signature to the metas application module.
S407: the metastic application module obtains a digital signature from the SIM card and sends the transaction record and the digital signature to the metastic platform.
The metastables may use blockchains as infrastructure, e.g., the metastables may publish virtual assets based on blockchains.
When a user purchases or sells a piece of virtual asset in the metaspace platform, the metaspace platform may generate a transaction record to represent that the first user conducts a transaction of the virtual asset in the metaspace platform. For example, the transaction record may contain the time of the transaction, virtual identity information of the parties to the transaction, and the native identification of the virtual asset of the transaction. The original identifier of the virtual asset represents the identifier obtained when the virtual asset is generated.
In one implementation, the SIM card may process the transaction record based on a digital digest algorithm to obtain a string of fixed length, and then encrypt the string based on a private key of the first user to form a digital signature. The SIM card may send the digital signature to the metas application module through the blockchain interface. For example, the digital digest algorithm may be a Hash algorithm. The block link interface can be a hardware interface provided by the SIM card, and the SIM card can access the block link corresponding to each metastic platform through the hardware interface.
The metas application module may obtain a digital signature based on a block link interface in the SIM card and send the digital signature and its corresponding transaction record to the metas platform.
According to the communication method provided by the embodiment of the disclosure, when the user conducts virtual asset transaction, the transaction record is signed by using the private key of the first user stored in the SIM card, and the obtained digital signature and the transaction record are sent to the metas platform, so that the transaction record of the user can be prevented from being tampered, and the transaction cost is low and is not limited by time and space.
In an implementation manner, referring to fig. 7, fig. 7 is an interaction diagram of another communication method provided by an embodiment of the present disclosure, and on the basis of fig. 4, the method may include the following steps:
s408: and when detecting that the first user acquires the virtual assets in the metastic platform, the metastic application module sends the virtual assets to the SIM card.
S409: and the SIM card generates a unique identifier of the virtual asset based on the virtual identity information, and locally and correspondingly records the virtual asset and the unique identifier.
The first user can purchase virtual assets and exchange the virtual assets in the metastic platform through the metastic application module, and accordingly the metastic application module can send the virtual assets obtained by the first user to the SIM card.
In one implementation, the first user may use credits to purchase NFT (Non-homogeneous Token) digital merchandise such as digital artwork, game items, and the like. The integral can be a virtual asset obtained by recharging the first user on a service operation platform of an operator; or, the virtual assets given to the user by the operator according to the historical consumption records of the user can also be given.
In one implementation, the SIM card may splice the virtual identity information and the original identifier of the virtual asset, as the unique identifier of the virtual asset.
In the related art, virtual assets and virtual identities are the core of the meta-universe and bear the asset interests and social identities of users in the meta-universe. However, the data such as the virtual identity information and the derived related assets and activities lack privacy, which is not beneficial to protecting the privacy of the user. According to the communication method provided by the embodiment of the disclosure, unique identifiers can be generated for different assets in different metas based on the virtual identity information stored in the SIM card, so that the management of virtual assets by a user is facilitated, and further, the creation of metas trade ecology and the privacy protection of the user are facilitated.
In an implementation manner, as shown in fig. 8, fig. 8 is a flowchart of a generation process of virtual identity information provided in the embodiment of the present disclosure, where the process of generating virtual identity information by a SIM card includes:
s801: a random number is generated.
S802: and calculating the hash value of the random number based on a preset hash algorithm to obtain the private key of the first user.
S803: and generating the DID of the first user based on the private key of the first user as the virtual identity information of the first user.
In one implementation, upon registration of the SIM card by the first user, the SIM card may generate a Random Number of specified bytes through a hardware Random Number Generator (TRNG). And processing the random number based on a preset hash algorithm to obtain the private key of the first user.
And processing the private key of the first user based on a Hash algorithm to obtain a character string with a fixed length as a first Hash value. And acquiring bytes with a first numerical length of the first hash value, and taking the bytes with the first numerical length as a second hash value. And adding a DID role type byte before the second hash value, and taking the second hash value after the DID role type byte is added as a third hash value. And calculating the third hash value based on a hash algorithm to obtain a fourth hash value. And acquiring bytes with the second numerical value length of the fourth hash value, splicing the bytes with the second numerical value length with the third hash value, and taking the obtained spliced value as a fifth hash value. And coding the fifth hash value to obtain a DID corresponding to the first user as the virtual identity information of the first user.
The first byte may be the first 20 bytes, and the second byte may be the first 4 bytes. The Hash Algorithm may be SHA-512 (Secure Hash Algorithm-512, secure Hash Algorithm). The DID role type byte represents a role type represented by the DID, wherein the role type may be an application, a person or a device, etc. The encoding process of the fifth hash value may use a Base58 encoding method of bitcoin.
The designated byte can be 64 bytes, the length of the private key can be 512 bits, so that 512-power different private keys with 2 can exist, namely, the number of the private keys is close to 150-power of 10, the probability that the randomly selected private keys are the same is one-150-power of 10 and is close to 0, and further, the uniqueness and the safety of the private keys can be improved.
The communication method provided by the embodiment of the disclosure can generate the private key of the first user based on the random number, so that the uniqueness and the security of the private key are ensured, the virtual identity information of the user is generated when the user registers the SIM card, the ownership of the virtual identity information of the user is determined, the virtual identity interpretation right of the user is ensured to be on the user and not on an Internet platform, the privacy protection of the user is facilitated, and the development of the metauniverse is promoted.
In one implementation, when the SIM card is lost or damaged, the user can recover the SIM card, and accordingly, the user identity can be verified. As shown in fig. 9, fig. 9 is a flowchart of a user authentication process provided in an embodiment of the present disclosure, where the process includes:
s901: when the user identity of the user to be verified needs to be verified, the user password and the user real identity information provided by the user to be verified are obtained.
S902: and determining the encrypted random number and the operator password corresponding to the user real identity information provided by the user to be verified based on the corresponding relationship among the pre-recorded user real identity information, the encrypted random number and the operator password.
Wherein, the encrypted random number recorded in the corresponding relation is: the password is obtained by encrypting based on a user password provided by the registered user and a corresponding operator password.
S903: judging whether the determined encrypted random number can be successfully decrypted or not based on the determined operator password and the user password provided by the user to be verified; if yes, go to step S904; if not, go to step S905.
S904: and determining that the user to be authenticated passes the identity authentication.
S905: and determining that the user to be authenticated does not pass the authentication.
In this disclosure, the random number may also be referred to as a seed and the encrypted random number may also be referred to as an encryption seed.
In one implementation, the user password may be provided when the user registers the SIM card. For example, the user password may be a fixed length string. In addition, the user may provide real identity information. The real identity information may include the user's name and identification number. The carrier password is generated by the carrier when the user registers the SIM card. The operator passwords corresponding to different users may be the same or different. For each user, when the user registers the SIM card, the SIM card can store the encrypted random number corresponding to the user, the operator password, and the real identity information provided by the user in the service operation platform of the operator after obtaining the corresponding encrypted random number.
The user to be verified is the user needing user identity verification at present, and when the user identity of the user to be verified needs verification, the SIM card can acquire the encrypted random number and the operator password which are recorded in the service operation platform and correspond to the real identity information provided by the user to be verified. Then, the SIM card decrypts the encrypted random number by combining a user password and an operator password provided by the user to be authenticated; if the decryption is successful, determining that the user to be verified passes the identity verification; and if the decryption is not successful, determining that the user to be authenticated does not pass the identity authentication.
According to the communication method provided by the embodiment of the disclosure, because the service operation platform stores the encrypted seed and does not store the user password of the user, the operator cannot obtain the seed, the private key and the asset of the user only based on the operator password, so that the security of the user asset is ensured, and the privacy protection of the user is facilitated.
In an implementation manner, referring to fig. 10, fig. 10 is a schematic diagram of authentication of a user to be authenticated according to an embodiment of the present disclosure. In fig. 10, when the SIM card is lost or damaged, the user to be authenticated may apply for a recovery card from the operator. The operator can write the recorded encryption seed and operator password corresponding to the real identity information such as the mobile phone number provided by the user to be authenticated into the SIM card. In addition, the SIM card can obtain the user password input by the user to be authenticated, and then the SIM card decrypts the encrypted seed based on the operator password and the user password, and if the decryption is successful, it is determined that the user to be authenticated passes the authentication, and correspondingly, the operator can recover the SIM card for the user to be authenticated, that is, the user to be authenticated obtains a new card, and retrieves the wallet (that is, the private key of the user to be authenticated); and if the decryption is not successful, determining that the user to be authenticated does not pass the identity authentication.
In an implementation manner, referring to fig. 11, fig. 11 is a schematic view of communication between an operating system of an intelligent terminal and a SIM card according to an embodiment of the present disclosure. As shown in fig. 11, the smart terminal may be a mobile phone, and an OS (operating system) of the mobile phone may call an SDK (Software Development Kit) through a specific interface to communicate with a SIM card, where the SIM card stores a mobile phone number, an encryption seed, a private key, an encrypted digital asset, and a SIM card calculation program of a user. The SIM card computing program can generate virtual identity information of a user, sign a transaction record, generate a unique identifier of a virtual asset and verify the identity of the user.
In one implementation, referring to fig. 12, fig. 12 is a schematic diagram illustrating a SIM card managing virtual assets according to an embodiment of the present disclosure. In fig. 12, a BSIM card may store a user identity (i.e., virtual identity information) of a user, a user asset (virtual asset), a native asset (credit issued by an operator), FT (homogeneous Token), and NFT (Non-homogeneous Token). Wherein, FT may include game gold, and NFT may include: digital artwork, game props, meta-space assets, and the like. The blockchain-based approach may enable authentication of digital identities, building digital asset trading malls (e.g., point trading platforms), and trading digital art (including music, videos, pictures, etc.), game assets (including equipment, items, capabilities, skins, etc.), and metastic assets. For example, for digital artwork, ownership and usage rights may be defined; the rights and assets of the meta-universe can be managed, and the assets attribution and value are guaranteed to be widely confirmed in the meta-universe without boundaries. The block link points include: the system comprises alliance chain block chain nodes, block chain consensus nodes, copyright protection nodes, cross-link nodes and the like, wherein each node respectively realizes different service functions based on intelligent contracts.
In one implementation, as shown in fig. 13, fig. 13 is a schematic diagram of a metastic asset management process according to an embodiment of the present disclosure. In fig. 13, the BSIM card can be used as an entry device of the metasphere, and based on the BSIM card, the authentication of the blockchain distributed digital identity, the metasphere digital asset management, and the digital asset transaction based on the certificate can be realized. The constructed metauniverse can serve data rights and interests and asset circulation, and the digital identity and asset transaction ecology of the metauniverse are created. The BSIM card has the advantages of supporting various block chain algorithms, high performance, good safety, convenient use and the like. The method is favorable for drawing the 5G large-network traffic income, digital assets on the block chain are not easy to migrate, user stickiness is provided, and the method is favorable for the operation of the existing high-net-value users and attracting users in different networks.
Based on the same inventive concept, an embodiment of the present disclosure further provides a communication apparatus, referring to fig. 14, fig. 14 is a structural diagram of a communication apparatus provided in an embodiment of the present disclosure, the apparatus is applied to a metastic application module in a terminal device, the terminal device further includes a SIM card, and the apparatus includes:
an identity information request sending module 1401, configured to send an identity information request to the SIM card when the metas platform needs to be accessed, so that the SIM card obtains locally recorded virtual identity information when receiving the identity information request, and sends the virtual identity information to the metas application module; wherein, the virtual identity information is: when a first user logging in the meta universe application module registers an SIM card, the SIM card is generated and obtained based on a private key of the first user; the private key of the first user is obtained by carrying out Hash calculation on a preset random number;
an authentication request sending module 1402, configured to send an authentication request to the meta-universe platform based on the virtual identity information, so that the meta-universe platform authenticates the authentication request based on the virtual identity information.
In some embodiments, the apparatus further comprises:
the transaction record acquisition module is used for acquiring the transaction record of the first user in the meta-universe platform;
the transaction record sending module is used for sending the transaction record to the SIM card so that the SIM card carries out encryption processing on the transaction record based on a private key of a first user to obtain a corresponding digital signature, and sends the digital signature to the metas application module;
and the digital signature acquisition module is used for acquiring the digital signature from the SIM card and sending the transaction record and the digital signature to the meta-universe platform.
In some embodiments, the apparatus further comprises:
and the virtual asset sending module is used for sending the virtual asset to the SIM card when detecting that the first user obtains the virtual asset in the metastic platform, so that the SIM card generates a unique identifier of the virtual asset based on the virtual identity information, and locally and correspondingly records the virtual asset and the unique identifier.
Based on the same inventive concept, an embodiment of the present disclosure further provides a communication apparatus, referring to fig. 15, where fig. 15 is a structural diagram of another communication apparatus provided in the embodiment of the present disclosure, the apparatus is applied to a SIM card in a terminal device, the terminal device further includes a metastic application module, and the apparatus includes:
a virtual identity information obtaining module 1501, configured to obtain locally recorded virtual identity information when receiving an identity information request; the identity information request is sent to the SIM card when the metastic application module needs to access the metastic platform;
a virtual identity information sending module 1502 for sending virtual identity information to the metas application module; wherein, the virtual identity information is: when a first user logging in the meta universe application module registers an SIM card, the SIM card is generated and obtained based on a private key of the first user; the private key of the first user is obtained by carrying out Hash calculation on a preset random number; and the metas application module sends an authentication request to the metas platform based on the virtual identity information, so that the metas platform authenticates the authentication request based on the virtual identity information.
In some embodiments, the apparatus further comprises:
the transaction record receiving module is used for receiving the transaction records sent by the meta universe application module; the transaction record is the transaction record of the first user in the meta-space platform;
the digital signature generation module is used for encrypting the transaction record based on a private key of the first user to obtain a corresponding digital signature;
and the digital signature sending module is used for sending the digital signature to the metastic application module so that the metastic application module sends the transaction record and the digital signature to the metastic platform.
In some embodiments, the apparatus further comprises:
the virtual asset receiving module is used for receiving the virtual assets sent by the metastic application module; the virtual assets are acquired by a first user in a meta-universe platform;
and the unique identifier generating module is used for generating a unique identifier of the virtual asset based on the virtual identity information and locally and correspondingly recording the virtual asset and the unique identifier.
In some embodiments, the apparatus further comprises:
the random number generating module is used for generating random numbers;
the private key generation module is used for calculating a hash value of the random number based on a preset hash algorithm to obtain a private key of the first user;
and the DID generation module is used for generating a decentralized identity DID of the first user as the virtual identity information of the first user based on the private key of the first user.
In some embodiments, the apparatus further comprises:
the first acquisition module is used for acquiring a user password and user real identity information provided by a user to be authenticated when the user identity of the user to be authenticated needs to be authenticated;
the first determining module is used for determining an encrypted random number and an operator password which correspond to the user real identity information provided by the user to be authenticated based on the corresponding relation of the user real identity information, the encrypted random number and the operator password which are recorded in advance; wherein, the encrypted random number recorded in the corresponding relation is: the password is obtained by encrypting based on a user password provided by a registered user and a corresponding operator password;
the first judgment module is used for judging whether the determined encrypted random number can be successfully decrypted or not based on the determined operator password and the user password provided by the user to be verified; if so, determining that the user to be authenticated passes the identity authentication; if not, determining that the user to be authenticated does not pass the identity authentication.
An embodiment of the present disclosure further provides an electronic device, as shown in fig. 16, fig. 16 is a structural diagram of an electronic device provided in an embodiment of the present application. Comprises a processor 1601, a communication interface 1602, a memory 1603 and a communication bus 1604, wherein the processor 1601, the communication interface 1602 and the memory 1603 are communicated with each other through the communication bus 1604,
a memory 1603 for storing a computer program;
the processor 1601 is configured to implement the steps of any of the communication methods in the above embodiments when executing the program stored in the memory 1603.
The communication bus mentioned in the electronic device may be a Peripheral Component Interconnect (PCI) bus, an Extended Industry Standard Architecture (EISA) bus, or the like. The communication bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one thick line is shown, but this does not mean that there is only one bus or one type of bus.
The communication interface is used for communication between the electronic equipment and other equipment.
The Memory may include a Random Access Memory (RAM) or a Non-Volatile Memory (NVM), such as at least one disk Memory. Optionally, the memory may also be at least one memory device located remotely from the processor.
The Processor may be a general-purpose Processor, including a Central Processing Unit (CPU), a Network Processor (NP), and the like; but also Digital Signal Processors (DSPs), application Specific Integrated Circuits (ASICs), field Programmable Gate Arrays (FPGAs) or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components.
In yet another embodiment provided by the present disclosure, a computer-readable storage medium is further provided, in which a computer program is stored, which when executed by a processor implements the steps of any of the above-mentioned communication methods.
In yet another embodiment provided by the present disclosure, there is also provided a computer program product containing instructions which, when run on a computer, cause the computer to perform any of the communication methods of the above embodiments.
In the above embodiments, the implementation may be wholly or partially realized by software, hardware, firmware, or any combination thereof. When implemented in software, it may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. The procedures or functions described in accordance with the embodiments of the disclosure are, in whole or in part, generated when the computer program instructions are loaded and executed on a computer. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored in a computer readable storage medium or transmitted from one computer readable storage medium to another computer readable storage medium, for example, the computer instructions may be transmitted from one website, computer, server, or data center to another website, computer, server, or data center via wired (e.g., coaxial cable, fiber optic, digital Subscriber Line (DSL)) or wireless (e.g., infrared, wireless, microwave, etc.) means. The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device, such as a server, a data center, etc., that incorporates one or more of the available media. The usable medium may be a magnetic medium (e.g., floppy Disk, hard Disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., solid State Disk (SSD)), among others.
It should be noted that, in this document, relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrases "comprising one of 8230; \8230;" 8230; "does not exclude the presence of additional like elements in a process, method, article, or apparatus that comprises the element.
All the embodiments in the present specification are described in a related manner, and the same and similar parts among the embodiments may be referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, as for the embodiments of the apparatus, the SIM card, the electronic device and the terminal device, since they are substantially similar to the embodiments of the method, the description is relatively simple, and in relevant places, reference may be made to the partial description of the embodiments of the method.
The above description is only a preferred embodiment of the present disclosure, and is not intended to limit the scope of the present disclosure. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present disclosure are included in the scope of protection of the present disclosure.

Claims (20)

1. A terminal device, comprising: a Subscriber Identity Module (SIM) card; and installing a metastic application module, wherein:
the metastic application module is used for sending an identity information request to the SIM card when the metastic platform is required to be accessed;
the SIM card is used for acquiring locally recorded virtual identity information and sending the virtual identity information to the metastic application module when receiving the identity information request; wherein the virtual identity information is: when a first user logging in the meta universe application module registers the SIM card, the SIM card is generated and obtained based on a private key of the first user; the private key of the first user is obtained by carrying out hash calculation on a preset random number;
the metas application module is further configured to send an authentication request to the metas platform based on the virtual identity information, so that the metas platform authenticates the authentication request based on the virtual identity information.
2. A communication method, applied to a metastic application module in a terminal device, the terminal device further including a SIM card, the method comprising:
when a metas platform needs to be accessed, sending an identity information request to the SIM card, so that the SIM card obtains locally recorded virtual identity information when receiving the identity information request, and sending the virtual identity information to the metas application module; wherein the virtual identity information is: when a first user logging in the meta universe application module registers the SIM card, the SIM card is generated and obtained based on a private key of the first user; the private key of the first user is obtained by carrying out hash calculation on a preset random number;
and sending an authentication request to the metastic platform based on the virtual identity information so that the metastic platform authenticates the authentication request based on the virtual identity information.
3. The method of claim 2, further comprising:
acquiring a transaction record of the first user in the meta-universe platform;
sending the transaction record to the SIM card so that the SIM card carries out encryption processing on the transaction record based on a private key of the first user to obtain a corresponding digital signature, and sending the digital signature to the metas application module;
and acquiring the digital signature from the SIM card, and sending the transaction record and the digital signature to the meta-space platform.
4. The method of claim 2, further comprising:
when detecting that the first user acquires the virtual asset in the metastic platform, sending the virtual asset to the SIM card, so that the SIM card generates a unique identifier of the virtual asset based on the virtual identity information, and locally and correspondingly recording the virtual asset and the unique identifier.
5. A communication method, applied to a SIM card in a terminal device, the terminal device further comprising a metastic application module, the method comprising:
when an identity information request is received, acquiring locally recorded virtual identity information; the identity information request is sent to the SIM card when the metastic application module needs to access a metastic platform;
sending the virtual identity information to the metastic application module; wherein the virtual identity information is: when a first user logging in the metastic application module registers the SIM card, the SIM card is generated and obtained based on a private key of the first user; the private key of the first user is obtained by carrying out hash calculation on a preset random number; so that the metas application module sends an authentication request to the metas platform based on the virtual identity information, so that the metas platform authenticates the authentication request based on the virtual identity information.
6. The method of claim 5, further comprising:
receiving a transaction record sent by the metastic application module; wherein the transaction record is a transaction record of the first user in the metastic platform;
encrypting the transaction record based on the private key of the first user to obtain a corresponding digital signature;
transmitting the digital signature to the metastic application module to cause the metastic application module to transmit the transaction record and the digital signature to the metastic platform.
7. The method of claim 5, further comprising:
receiving the virtual assets sent by the metastic application module; wherein the virtual asset is acquired by the first user in the meta-universe platform;
and generating a unique identifier of the virtual asset based on the virtual identity information, and locally and correspondingly recording the virtual asset and the unique identifier.
8. The method of claim 5, wherein the generating of the virtual identity information comprises:
generating a random number;
calculating a hash value of the random number based on a preset hash algorithm to obtain a private key of the first user;
and generating a decentralized identity DID of the first user as the virtual identity information of the first user based on the private key of the first user.
9. The method of claim 8, further comprising:
when the user identity of a user to be verified needs to be verified, acquiring a user password and user real identity information provided by the user to be verified;
determining an encrypted random number and an operator password corresponding to the user real identity information provided by the user to be authenticated based on the corresponding relationship among the user real identity information, the encrypted random number and the operator password which are recorded in advance; wherein the encrypted random number recorded in the correspondence is: the password is obtained by encrypting based on a user password provided by a registered user and a corresponding operator password;
judging whether the determined encrypted random number can be successfully decrypted or not based on the determined operator password and the user password provided by the user to be authenticated;
if so, determining that the user to be authenticated passes identity authentication;
if not, determining that the user to be authenticated does not pass the identity authentication.
10. A communication apparatus, wherein the apparatus is applied to a metastic application module in a terminal device, wherein the terminal device further includes a SIM card, the apparatus comprising:
an identity information request sending module, configured to send an identity information request to the SIM card when a metastic platform needs to be accessed, so that the SIM card obtains locally recorded virtual identity information when receiving the identity information request, and sends the virtual identity information to the metastic application module; wherein the virtual identity information is: when a first user logging in the metastic application module registers the SIM card, the SIM card is generated and obtained based on a private key of the first user; the private key of the first user is obtained by carrying out hash calculation on a preset random number;
and the authentication request sending module is used for sending an authentication request to the metastic platform based on the virtual identity information so that the metastic platform authenticates the authentication request based on the virtual identity information.
11. The apparatus of claim 10, further comprising:
the transaction record acquisition module is used for acquiring the transaction record of the first user in the meta-universe platform;
a transaction record sending module, configured to send the transaction record to the SIM card, so that the SIM card performs encryption processing on the transaction record based on the private key of the first user to obtain a corresponding digital signature, and sends the digital signature to the metas application module;
and the digital signature acquisition module is used for acquiring the digital signature from the SIM card and sending the transaction record and the digital signature to the meta-space platform.
12. The apparatus of claim 10, further comprising:
and the virtual asset sending module is used for sending the virtual asset to the SIM card when detecting that the first user obtains the virtual asset in the metastic platform, so that the SIM card generates a unique identifier of the virtual asset based on the virtual identity information, and locally and correspondingly records the virtual asset and the unique identifier.
13. A communication apparatus, wherein the apparatus is applied to a SIM card in a terminal device, wherein the terminal device further comprises a metas-application module, the apparatus comprising:
the virtual identity information acquisition module is used for acquiring the locally recorded virtual identity information when receiving the identity information request; the identity information request is sent to the SIM card when the metas application module needs to access a metas platform;
a virtual identity information sending module, configured to send the virtual identity information to the metas application module; wherein the virtual identity information is: when a first user logging in the metastic application module registers the SIM card, the SIM card is generated and obtained based on a private key of the first user; the private key of the first user is obtained by carrying out Hash calculation on a preset random number; so that the metastic application module sends an authentication request to the metastic platform based on the virtual identity information, so that the metastic platform authenticates the authentication request based on the virtual identity information.
14. The apparatus of claim 13, further comprising:
the transaction record receiving module is used for receiving the transaction records sent by the meta universe application module; wherein the transaction record is a transaction record of the first user in the meta-universe platform;
the digital signature generation module is used for encrypting the transaction record based on the private key of the first user to obtain a corresponding digital signature;
a digital signature sending module to send the digital signature to the metastic application module to cause the metastic application module to send the transaction record and the digital signature to the metastic platform.
15. The apparatus of claim 13, further comprising:
the virtual asset receiving module is used for receiving the virtual assets sent by the meta universe application module; the virtual assets are acquired by the first user in the meta-universe platform;
and the unique identifier generating module is used for generating a unique identifier of the virtual asset based on the virtual identity information and locally and correspondingly recording the virtual asset and the unique identifier.
16. The apparatus of claim 13, further comprising:
the random number generating module is used for generating random numbers;
the private key generation module is used for calculating a hash value of the random number based on a preset hash algorithm to obtain a private key of the first user;
and the DID generation module is used for generating a decentralized identity DID of the first user as the virtual identity information of the first user based on the private key of the first user.
17. The apparatus of claim 16, further comprising:
the first acquisition module is used for acquiring a user password and user real identity information provided by a user to be authenticated when the user identity of the user to be authenticated needs to be authenticated;
the first determining module is used for determining an encrypted random number and an operator password corresponding to the user real identity information provided by the user to be authenticated based on the corresponding relation of the user real identity information, the encrypted random number and the operator password which are recorded in advance; wherein the encrypted random number recorded in the correspondence is: the password is obtained by encrypting based on a user password provided by a registered user and a corresponding operator password;
the first judgment module is used for judging whether the determined encrypted random number can be successfully decrypted or not based on the determined operator password and the user password provided by the user to be authenticated; if so, determining that the user to be authenticated passes identity authentication; if not, determining that the user to be authenticated does not pass the identity authentication.
18. A SIM card, characterized in that the SIM card comprises a computing chip, a communication module and a SIM card module;
the computing chip is used for carrying out data communication with a metastic application module in the terminal equipment through the communication module so as to realize the method of any one of claims 5 to 9.
19. The electronic equipment is characterized by comprising a processor, a communication interface, a memory and a communication bus, wherein the processor and the communication interface are used for realizing the communication between the processor and the memory through the communication bus;
a memory for storing a computer program;
a processor for implementing the method steps of any one of claims 2 to 9 when executing a program stored in the memory.
20. A computer-readable storage medium, characterized in that a computer program is stored in the computer-readable storage medium, which computer program, when being executed by a processor, carries out the method steps of any one of the claims 2-9.
CN202210837363.5A 2022-07-15 2022-07-15 Communication method and device, SIM card, electronic equipment and terminal equipment Pending CN115811412A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202210837363.5A CN115811412A (en) 2022-07-15 2022-07-15 Communication method and device, SIM card, electronic equipment and terminal equipment
PCT/CN2022/142033 WO2024011863A1 (en) 2022-07-15 2022-12-26 Communication method and apparatus, sim card, electronic device, and terminal device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210837363.5A CN115811412A (en) 2022-07-15 2022-07-15 Communication method and device, SIM card, electronic equipment and terminal equipment

Publications (1)

Publication Number Publication Date
CN115811412A true CN115811412A (en) 2023-03-17

Family

ID=85482352

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210837363.5A Pending CN115811412A (en) 2022-07-15 2022-07-15 Communication method and device, SIM card, electronic equipment and terminal equipment

Country Status (2)

Country Link
CN (1) CN115811412A (en)
WO (1) WO2024011863A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117806465A (en) * 2024-02-29 2024-04-02 南昌菱形信息技术有限公司 Immersive digital experience method and system based on meta-universe technology

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8914854B2 (en) * 2008-09-11 2014-12-16 International Business Machines Corporation User credential verification indication in a virtual universe
CN106161032B (en) * 2015-04-24 2019-03-19 华为技术有限公司 A kind of identity authentication method and device
CN108696870B (en) * 2018-04-26 2021-04-09 越亮传奇科技股份有限公司 Mobile terminal identity authentication method based on SWP-SIM technology
CN110493769A (en) * 2019-07-05 2019-11-22 南京航空航天大学 Cell-phone number security scheme based on lightweight Hash mapping
CN114338086A (en) * 2021-12-03 2022-04-12 浙江毫微米科技有限公司 Identity authentication method and device
CN114417421A (en) * 2022-01-26 2022-04-29 深圳技术大学 Meta-universe-based shared information privacy protection method and related device

Also Published As

Publication number Publication date
WO2024011863A1 (en) 2024-01-18
WO2024011863A9 (en) 2024-02-29

Similar Documents

Publication Publication Date Title
CN112214780B (en) Data processing method and device, intelligent equipment and storage medium
CN111429254B (en) Business data processing method and device and readable storage medium
CA3053316C (en) Method for providing simplified account registration service and user authentication service, and authentication server using same
CN112333198B (en) Secure cross-domain login method, system and server
CN110417750B (en) Block chain technology-based file reading and storing method, terminal device and storage medium
CN112671720B (en) Token construction method, device and equipment for cloud platform resource access control
JP2023502346A (en) Quantum secure networking
CN111275419B (en) Block chain wallet signature right confirming method, device and system
CN104184713A (en) Terminal identification method, machine identification code registration method, and corresponding system and equipment
US20200244457A1 (en) Blockchain intelligent security implementation
CN106936588A (en) A kind of trustship method, the apparatus and system of hardware controls lock
JP2023535013A (en) Quantum secure payment system
CN111460400A (en) Data processing method and device and computer readable storage medium
CN113486122A (en) Data sharing method and electronic equipment
CN114666168A (en) Decentralized identity certificate verification method and device, and electronic equipment
CN106656955A (en) Communication method and system and user terminal
CN110377225B (en) Method for supporting outsourcing data security transfer and verifiable deletion
JP3896909B2 (en) Access right management device using electronic ticket
CN114629713A (en) Identity verification method, device and system
CN111241492A (en) Product multi-tenant secure credit granting method, system and electronic equipment
WO2024011863A1 (en) Communication method and apparatus, sim card, electronic device, and terminal device
WO2019175427A1 (en) Method, device and medium for protecting work based on blockchain
JP6533542B2 (en) Secret key replication system, terminal and secret key replication method
CN106529216B (en) Software authorization system and software authorization method based on public storage platform
Lim et al. AuthChain: a decentralized blockchain-based authentication system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination