CN114154987A - Meta-universe safety system based on NFR and inter-link network and operation method - Google Patents

Meta-universe safety system based on NFR and inter-link network and operation method Download PDF

Info

Publication number
CN114154987A
CN114154987A CN202111346930.9A CN202111346930A CN114154987A CN 114154987 A CN114154987 A CN 114154987A CN 202111346930 A CN202111346930 A CN 202111346930A CN 114154987 A CN114154987 A CN 114154987A
Authority
CN
China
Prior art keywords
nfr
universe
registration
metastic
meta
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202111346930.9A
Other languages
Chinese (zh)
Other versions
CN114154987B (en
Inventor
蔡维德
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tianmin Qingdao International Sandbox Research Institute Co ltd
Zeu Crypto Networks Inc
Original Assignee
Tianmin Qingdao International Sandbox Research Institute Co ltd
Zeu Crypto Networks Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tianmin Qingdao International Sandbox Research Institute Co ltd, Zeu Crypto Networks Inc filed Critical Tianmin Qingdao International Sandbox Research Institute Co ltd
Publication of CN114154987A publication Critical patent/CN114154987A/en
Application granted granted Critical
Publication of CN114154987B publication Critical patent/CN114154987B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3825Use of electronic signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Theoretical Computer Science (AREA)
  • Finance (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Economics (AREA)
  • Technology Law (AREA)
  • Marketing (AREA)
  • Development Economics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention provides a meta-universe security system based on NFR and an internetwork, which comprises: the inter-link network provides uplink functions and security services for the NFR and the metauniverse; the system comprises an NFR, an Internet protocol (NFR) and a Meta-universe security system, wherein the NFR is constructed on an interconnected network, and is used for registering people and identifying and trading articles through the NFR; the system comprises a metasma monitoring mechanism, a user registration module and a user registration module, wherein the metasma monitoring mechanism is used for monitoring, the registration of the metasma and the user registration under the metasma all need to be identified by the metasma monitoring mechanism, all interactive data in the metasma need to be subjected to uplink operation, evidences are retained and cannot be changed; the system comprises a meta-universe system, a plurality of meta-universe subsystems and a monitoring system, wherein the meta-universe system is connected with a meta-universe monitoring mechanism and consists of a plurality of meta-universe subsystems; each metasystem connects one or more users. A method for operating a metastic security system based on an NFR and an internetwork, comprising: the metasequse is registered in a metasequse monitoring mechanism and is subjected to NFR authentication; user registration and authentication; and metastic event processing.

Description

Meta-universe safety system based on NFR and inter-link network and operation method
Technical Field
The invention belongs to the field of non-homogeneous rights and interests (NFR) and an interconnection network, and the technical field of security of a meta universe, and particularly relates to a meta universe security system and an operation method based on the NFR and the interconnection network.
Background
The inter-link network technology is a future network technology supporting all things to be inter-linked based on the block chain technology, and according to 'inter-link network white paper' written by Chua Vid, the inter-link network mainly comprises a novel network protocol, a block chain operating system, a block chain operating database, various large-scale small-sized block chain systems and a cross-link technology. The first element of the inter-link network is privacy and security, and the inter-link network can be used as an underlying system of other upper-layer applications to support the security and privacy requirements of the upper-layer applications.
NFR (Non-homogeneous interest), the first occurrence of "Non-homogeneous tokens" (NFT) in 2020, compared to NFT, usually refers to tokens issued by developers according to ERC 721 protocol or similar. Its characteristics are inseparable, irreplaceable and unique. Briefly, tokens issued using the ERC 721 protocol or a similar protocol are called NFTs. But NFT is in fact a special token (token), thus creating NFR (non-homogeneous interest) suitable for china. The NFR is a set of protocols and supporting infrastructure, and can be used as the infrastructure of the meta-universe to provide a set of identity authentication protocols and procedures for mapping people and objects to the meta-universe.
Meta-universe data Security issues: the virtual reality technology is discussed more in the current metasma, but no related patent exists at present for the data security and personal privacy problems of the metasma, the metasma can form a set of system by combining with the NFR and the inter-link network technology, and the NFR and the inter-link network technology provide the security support for the metasma. The NFR of the chinese edition develops in the meta universe of the chinese edition. Even in the virtual environment, the NFR binds virtual characters and assets with physical characters and physical assets in the metastic environment, and even national laws can be digitized and mapped to the virtual metastic environment by NRF, so the metastic needs to be a bright, open and trusted world. In the meta universe, national regulations still exist and continue to be legally effective. It is true that the internet is not a foreign place, nor is the meta space a foreign place. There is also a need for intervention of a supervisory system in the metasphere to ensure data security and transaction security on the metasphere.
At present, the metasma is a relatively emerging concept, the metasma is not a parallel world, is not a completely virtual world, is a combination of reality and virtual, and is a simulated world which exists in parallel with the real world, is communicated with each other and is respectively wonderful, and the metasma exists not only on line but also off line; in the future, the online space and the offline space, the real world and the simulation world can be seamlessly fused and organically communicated, the meta space cannot be an exclusive completely closed space or a completely flat and completely open space, but an open space and closed system coexists, the macrocavity and the microcosm are mutually nested, the microcosm has the opportunity of expansion and expansion, and the macrocavity has the opportunity of collision and integration just like the real space of the people. Such a metasma mode is organically combined online and offline, and organically combined virtual and real, which actually increases the difficulty for supervision, because there are various metasma forms with large and small sizes, each company may issue its metasma, and various industries in various fields may have different metasmas, there is no existing technical scheme for the supervision problem and data security problem under such a complex environment, the existing metasma is based on the internet and NFT (non-homogeneous certification), and cannot provide security service and supervision support for metasma, and the existing block chain technology cannot solve the above problems.
Disclosure of Invention
The invention provides a metastic security model based on NFR and an inter-link network technology, and further provides a design system and an operation method for providing a solution for data security and supervision of metastic, and adopts NFR (non-homogeneous rights and interests) meeting the requirements of Chinese law and Chinese supervision, wherein the NFR can be used as a whole set of protocol to provide bottom layer support for metastic, and the NFR also has the characteristics of inseparability, irreplaceability and uniqueness, so that people or objects (having the characteristics of inseparability, irreplaceability and uniqueness) in the common sense can be authenticated through the NFR protocol, and both the interaction between people and objects and the interaction between people and objects can be authenticated according to the NFR and the result is uploaded to the inter-link network for permanent storage.
As shown in fig. 1, the object of the present invention is to provide a metastic security system based on NFR and inter-link network, including:
an inter-link network providing uplink functionality and security services for the NFR and the meta universe;
the NFR is constructed on the interconnection network, and is used for registering people and identifying and trading articles through the NFR for an authentication and transaction protocol;
the system comprises a metastic universe monitoring mechanism, a metastic universe monitoring mechanism and a user monitoring mechanism, wherein the metastic universe monitoring mechanism is used for monitoring, the registration of the metastic universe and the user registration under the metastic universe need to be identified by the metastic universe monitoring mechanism, all interactive data in the metastic universe need to be subjected to uplink operation, evidence is retained, and the evidence cannot be changed;
the meta-universe system is connected with the meta-universe supervision mechanism and consists of a plurality of meta-universe subsystems; each metasystem connects one or more users.
Preferably, the inter-link network includes a new network protocol, a blockchain operating system, a blockchain operating database, and various large and small blockchain systems and cross-link blockchains.
Preferably, the metasystem is a system in which a small metas is nested by a large metas and a plurality of large metas coexist, and all the metasystem is built on the NFR protocol and the inter-link network.
The invention aims to provide a secure operation method of a metauniverse based on NFR and an interconnection network, which comprises the following steps:
step 1, registering a metauniverse in a metauniverse supervision mechanism and performing NFR authentication, uniformly managing and supervising all the metauniverse in the metauniverse supervision mechanism, registering the metauniverse in the metauniverse supervision mechanism and performing NFR authentication, and keeping registration information of the metauniverse on an interconnection network;
step 2, user registration and authentication, wherein after the metasma is registered in the metasma supervisory mechanism, the user applies for registration in a metasma software system;
and step 3, processing the meta-universe event.
Preferably, the step 1 comprises:
step 11, applying for registration, packaging the basic information of the company and the basic information of the metastic software into a data packet, performing hash operation, performing digital signature at the tail of the data packet, and sending the data packet to a metastic supervisory organization for applying for registration;
step 12, after receiving the registration application, the metacavity supervision mechanism carries out supervision mechanism digital signature on the data packet to indicate that the supervision mechanism receives the registration application, and after checking the basic information of the company by the supervision mechanism, the data packet is sent to the NFR system for authentication;
step 13, the NFR carries out digital authentication on the meta-universe software, and then feeds back an authentication result to a meta-universe supervision mechanism;
step 14, the metastic universe monitoring authority feeds back a registration result according to the authentication result fed back by the NFR;
and in the step 1, the application registration information and the data packet of the metasma, the authentication application of the metasma monitoring mechanism, the authentication result of the NFR and the registration result fed back by the metasma monitoring mechanism are uploaded to the interconnection network for storage.
Preferably, the step 2 comprises:
step 21, a user registers through a registration interface provided by the metastic subsystem, packs user information, performs hash operation, adds a digital signature of the user at the end of data, and uploads the data to the metastic subsystem;
step 22, after the metasma subsystem receives the registration information of the user, adding company information and a company data signature at the end of the data, thereby determining the corresponding metasma subsystem and the corresponding user for performing registration operation, and uploading the data packet to a metasma monitoring mechanism;
step 23, the metastic universe monitoring authority adds the metasuniverse monitoring authority digital signature at the end of the data, thereby indicating that the user registration application is received, and then uploads the user data to the NFR for user authentication;
step 24, the NFR feeds the authentication result back to the metacavity supervision agency after processing;
step 25, the metacavity supervision agency feeds back supervision opinions according to the personal information and the identity information of the user;
26, the metasystem subsystem receives the supervision opinion and feeds back a registration result according to the supervision opinion;
and in the step 2, the user information, the registration information of the user, the supervision information, the authentication result, the supervision opinion, the registration result and other information are uploaded to an inter-link network to carry out uplink operation, and the evidence is stored.
Preferably, the step 3 comprises: preparing before an event, generating the event and recording after the event.
Preferably, the pre-event preparation includes that the metastables are registered at the metastables regulatory body and are subjected to NFR authentication; user registration and authentication; checking the relationship between capital and characters by a metastic supervisory organization; transaction software and background investigation.
Preferably, the event occurrence comprises: mapping to an interconnection network through NFR, then performing consensus on the interconnection network, and finally synchronizing transaction behaviors or signatures on the interconnection network; in the event occurrence, events in the meta universe correspond to the same or different NFR mechanisms, an executed protocol flow conforms to the basic principle of NFR, the events need to be uploaded to an inter-link network after being authenticated by an NFR protocol, and data is synchronized in the whole network through one-time consensus.
Preferably, the post-event recording comprises: after the event is finished, the processing flow of the event and the completion status of the participating mechanisms and the event are all recorded in uplink, i.e. data generated in the whole process of the event needs to be recorded in uplink.
The invention has the beneficial effects that:
the method and the system of the invention are used for supervision and security in the complex metacavity environment, a metacavity supervision mechanism is responsible for registration and authentication of the left metacavity and the right metacavity, NFR provides authentication service and security guarantee of transactions for the metacavity, and the inter-link network ensures that all events occurring in the metacavity can be well documented and all records can be reserved and cannot be tampered.
The above and other objects, advantages and features of the present invention will become more apparent to those skilled in the art from the following detailed description of specific embodiments thereof, taken in conjunction with the accompanying drawings.
Drawings
Some specific embodiments of the invention will be described in detail hereinafter, by way of illustration and not limitation, with reference to the accompanying drawings. The same reference numbers in the drawings identify the same or similar elements or components. Those skilled in the art will appreciate that the drawings are not necessarily drawn to scale. The objects and features of the present invention will become more apparent in view of the following description taken in conjunction with the accompanying drawings, in which:
FIG. 1 is a schematic diagram of the overall architecture of a Meta-cosmic security system according to a preferred embodiment of the invention;
fig. 2 is a schematic diagram of a process of registering the meta universe according to a preferred embodiment of the present invention.
Fig. 3 is a schematic diagram of the process of the metastic registration data according to the preferred embodiment of the present invention.
Fig. 4 is a schematic diagram of a user registration and authentication process according to a preferred embodiment of the present invention.
Fig. 5 is a schematic diagram of an event occurrence flow according to a preferred embodiment of the present invention.
Fig. 6 is a schematic diagram of the complete flow of event processing according to the preferred embodiment of the present invention.
Detailed Description
In order to make the present invention more comprehensible with respect to its gist, the present invention will be further described with reference to the accompanying drawings and examples. In the following description, numerous specific details and specific examples are set forth in order to provide a more thorough understanding of the present invention and to provide a thorough understanding of the present invention. While this invention is susceptible of embodiment in many different forms than that described herein, there will be many equivalents to those skilled in the art which incorporate such variations and modifications without departing from the spirit and scope of the invention as defined by the appended claims and their equivalents.
In the following description, numerous specific details and specific examples are set forth in order to provide a more thorough understanding of the present invention and to provide a thorough understanding of the present invention. While this invention is susceptible of embodiment in many different forms than that described herein, there will be many equivalents to those skilled in the art which incorporate such variations and modifications without departing from the spirit and scope of the invention as defined by the appended claims and their equivalents.
In this embodiment, NFR (non-homogeneous right) meeting the requirements of the law and the regulation of china is adopted, where NFR may specifically serve as a whole set of protocol to provide a bottom support for the meta universe, and NFR also has the characteristics of inseparability, irreplaceability, and uniqueness, so that a person or object in a general sense (having the characteristics of inseparability, irreplaceability, and uniqueness) may be authenticated through the NFR protocol, and both the person-person interaction and the person-object interaction may be authenticated according to NFR and the result may be uploaded to the inter-link network for permanent storage.
As shown in fig. 1, the present embodiment provides a metastic security system based on an NFR and an inter-link network, including:
the system comprises an interconnection network, wherein the interconnection network is a complex aggregation and comprises a novel network protocol, a block chain operating system, a block chain operating database and various large and small block chain systems and cross-chain technologies, and the interconnection network provides underlying technical support for NFR and the metas, including uplink functions and security services.
The NFR is constructed on the interconnection network and is a set of person-to-object authentication and transaction protocols, and the metaccosmos security system performs registration of persons and identification and transaction of articles through the NFR;
the system comprises a metasma monitoring mechanism, a user registration module and a user registration module, wherein the metasma monitoring mechanism is used for meeting monitoring requirements, the registration of the metasma and the user registration under the metasma need to be identified by the metasma monitoring mechanism, all interactive data in the metasma need to be subjected to chain winding operation, evidence is retained and cannot be changed;
the system comprises a metasma system, a metasma monitoring mechanism and a network management system, wherein the metasma system is connected with the metasma monitoring mechanism, consists of a plurality of metasma subsystems (a metasma 1, a metasma 2 and a metasma 3 in the figure can be extended naturally), is a set of system in which a large metasma nests a small metasma and a plurality of large metasmas coexist, for example, facebook can construct own metasma, other industries or companies can construct own metasma, and all the metasmas need to be established on an NFR protocol and an interconnection network; each metasystem connects one or more users.
The embodiment also provides a metastic universe safe operation method based on the NFR and the inter-link network, which includes:
step 1, registering the metauniverse in the metauniverse supervision mechanism and performing NFR authentication, uniformly managing and supervising all the metauniverse in the metauniverse supervision mechanism, registering the metauniverse in the metauniverse supervision mechanism and performing NFR authentication, wherein the registration information of the metauniverse needs to be stored on an internet, and the registration flow of the metauniverse is shown in figure 2. A company needs to register in a metastic monitoring organization to release its metastic, and the registration process is as follows:
and 11, applying for registration, packaging the basic information of the company and the basic information of the metastic software into a data packet, performing hash operation, performing digital signature at the tail of the data packet, and sending the data packet to a metastic supervisory organization for applying for registration.
And step 12, after receiving the registration application, the metacavity supervision mechanism carries out supervision mechanism digital signature on the data packet to indicate that the supervision mechanism receives the registration application, and after checking the basic information of the company by the supervision mechanism, the data packet is sent to the NFR system for authentication.
And step 13, the NFR carries out digital authentication on the metastic software, and then feeds back an authentication result to a metastic monitoring mechanism.
And 14, feeding back a registration result by the metastic universe monitoring mechanism according to the authentication result fed back by the NFR.
In a preferred embodiment, the application registration information and the data packet of the metas are uploaded to the inter-link network for storage, the authentication application of the metas regulatory agency, the authentication result of the NFR, and the registration result fed back by the metas regulatory agency. All application data and intermediate processing results are all linked up, so that not only supervision but also transparent supervision is realized. The data flow is as shown in fig. 3, and the basic company information, the hash result a and the digital company signature, the signature of the supervision authority, the feedback result, the hash result B of the feedback result and the signature of the NFR registry are sequentially uploaded to the inter-link network for storage
Step 2, user registration and authentication, including that after the metasma is registered in the metasma supervisory mechanism, the user applies for registration in the metasma software system, and the user registration and authentication flow is shown in fig. 4.
Step 21, a user registers through a registration interface provided by the metastic subsystem, packs user information, performs hash operation, adds a digital signature of the user at the end of data, and uploads the data to the metastic subsystem;
step 22, after the metasma subsystem receives the registration information of the user, adding company information and a company data signature at the end of the data, thereby determining the corresponding metasma subsystem and the corresponding user for performing registration operation, and uploading the data packet to a metasma monitoring mechanism;
step 23, the metastic universe monitoring authority adds the metasuniverse monitoring authority digital signature at the end of the data, thereby indicating that the user registration application is received, and then uploads the user data to the NFR for user authentication;
step 24, the NFR feeds the authentication result back to the metacavity supervision agency after processing;
step 25, the metacavity supervision agency feeds back supervision opinions according to the personal information and the identity information of the user;
and 26, the metasystem subsystem receives the supervision opinion and feeds back a registration result according to the supervision opinion.
As a preferred embodiment, the user information, the registration information of the user, the supervision information, the authentication result, the supervision opinion, the registration result, and other information all need to be uploaded to the inter-link network for uplink operation, and the evidence is retained.
Step 3, event processing in the meta universe, wherein events in the meta universe are various, the embodiment is explained by fund transactions or contract signatures, and the processing of one event in the meta universe needs 3 steps, namely preparation before the event, event occurrence and recording after the event.
Step 31, preparation before event: the preparation work before the event mainly comprises that the meta universe is registered in the meta universe supervision organization and is authenticated by NFR; user registration and authentication; checking the relationship between capital and characters by a metastic supervisory organization; transaction software and background investigation.
Step 32, event generation: the fund transaction or contract signing needs to be mapped to the inter-link network through NFR first, and then needs to perform consensus on the inter-link network, and transaction behaviors or signing behaviors are synchronized on the inter-link network, and the flow is shown in fig. 5. Events (fund transactions or contract signatures) in the meta universe can correspond to different NFR organizations, but the protocol flow executed by the events conforms to the basic principle of NFR, and the events need to be uploaded to an inter-link network after being authenticated by the NFR protocol and are synchronized with data in the whole network through one-time consensus.
Step 33, post event recording: after the event is finished, the processing flow of the event and the completion status (success or failure) of the participating mechanisms and the event are all recorded and linked, i.e. data generated in the whole process of the event needs to be recorded and linked so that the records can be checked, and the supervision is transparent.
Taking a complex model comprising a metaclass of a plurality of users, a metaclass supervision mechanism, an NFR and an interlinkage network as a preferred embodiment, wherein the complete process of event occurrence is shown in FIG. 6, the registration process of the metaclass and the registration process of the users can refer to step 1 and step 2, the two steps belong to a preliminary preparation stage, the event occurrence is subjected to the metaclass, the event is reported, and then the processes of NFR authentication, authentication result feedback, supervision opinion feedback, time state feedback and the like are carried out, the process of event occurrence, the final event end and all uplink records are carried out, and the intermediate data, the authentication result and the final event state of all involved mechanisms are recorded and stored on the interlinkage network after common identification.
The method and the system of the embodiment are used for supervision and security in a complex metacavity environment, a metacavity supervision mechanism is responsible for registration and authentication of a left metacavity and a right metacavity, NFR provides authentication service and security guarantee of transactions for the metacavity, and the inter-link network guarantees that all events occurring in the metacavity can be well documented and all records can be reserved and cannot be tampered.
While the present invention has been described with reference to the particular illustrative embodiments, it is not to be restricted by the embodiments but only by the appended claims. It will be understood by those skilled in the art that variations and modifications of the embodiments of the present invention can be made without departing from the scope and spirit of the invention.

Claims (10)

1. A metastic security system based on an NFR and an inter-link network, comprising:
an inter-link network providing uplink functionality and security services for the NFR and the meta universe;
the NFR is constructed on the interconnection network, and is used for registering people and identifying and trading articles through the NFR for an authentication and transaction protocol;
the system comprises a metastic universe monitoring mechanism, a metastic universe monitoring mechanism and a user monitoring mechanism, wherein the metastic universe monitoring mechanism is used for monitoring, the registration of the metastic universe and the user registration under the metastic universe need to be identified by the metastic universe monitoring mechanism, all interactive data in the metastic universe need to be subjected to uplink operation, evidence is retained, and the evidence cannot be changed;
the meta-universe system is connected with the meta-universe supervision mechanism and consists of a plurality of meta-universe subsystems; each metasystem connects one or more users.
2. A meta-universe security system based on NFR and inter-link networks, according to claim 1, characterized by: the inter-link network includes a novel network protocol, a blockchain operating system, a blockchain operating database, and various large and small blockchain systems and inter-link blockchains.
3. A meta-universe security system based on NFR and inter-link networks, according to claim 2, characterized by: the metasystem is a system in which a small metas is nested by a large metas and a plurality of large metas coexist, and all the metas is built on the NFR protocol and the inter-link network.
4. A method of operating an NFR and inter-link network based meta-universe security system according to any of claims 1 to 3, comprising:
step 1, registering a metauniverse in a metauniverse supervision mechanism and performing NFR authentication, uniformly managing and supervising all the metauniverse in the metauniverse supervision mechanism, registering the metauniverse in the metauniverse supervision mechanism and performing NFR authentication, and keeping registration information of the metauniverse on an interconnection network;
step 2, user registration and authentication, wherein after the metasma is registered in the metasma supervisory mechanism, the user applies for registration in a metasma software system;
and step 3, processing the meta-universe event.
5. The method of claim 4, wherein step 1 comprises:
step 11, applying for registration, packaging the basic information of the company and the basic information of the metastic software into a data packet, performing hash operation, performing digital signature at the tail of the data packet, and sending the data packet to a metastic supervisory organization for applying for registration;
step 12, after receiving the registration application, the metacavity supervision mechanism carries out supervision mechanism digital signature on the data packet to indicate that the supervision mechanism receives the registration application, and after checking the basic information of the company by the supervision mechanism, the data packet is sent to the NFR system for authentication;
step 13, the NFR carries out digital authentication on the meta-universe software, and then feeds back an authentication result to a meta-universe supervision mechanism;
step 14, the metastic universe monitoring authority feeds back a registration result according to the authentication result fed back by the NFR;
and in the step 1, the application registration information and the data packet of the metasma, the authentication application of the metasma monitoring mechanism, the authentication result of the NFR and the registration result fed back by the metasma monitoring mechanism are uploaded to the interconnection network for storage.
6. The method of operation of claim 4, wherein step 2 comprises:
step 21, a user registers through a registration interface provided by the metastic subsystem, packs user information, performs hash operation, adds a digital signature of the user at the end of data, and uploads the data to the metastic subsystem;
step 22, after the metasma subsystem receives the registration information of the user, adding company information and a company data signature at the end of the data, thereby determining the corresponding metasma subsystem and the corresponding user for performing registration operation, and uploading the data packet to a metasma monitoring mechanism;
step 23, the metastic universe monitoring authority adds the metasuniverse monitoring authority digital signature at the end of the data, thereby indicating that the user registration application is received, and then uploads the user data to the NFR for user authentication;
step 24, the NFR feeds the authentication result back to the metacavity supervision agency after processing;
step 25, the metacavity supervision agency feeds back supervision opinions according to the personal information and the identity information of the user;
26, the metasystem subsystem receives the supervision opinion and feeds back a registration result according to the supervision opinion;
and in the step 2, the user information, the registration information of the user, the supervision information, the authentication result, the supervision opinion, the registration result and other information are uploaded to an inter-link network to carry out uplink operation, and the evidence is stored.
7. The operating method according to claim 4, characterized in that step 3 comprises: preparing before an event, generating the event and recording after the event.
8. The operating method according to claim 7, wherein the pre-event preparation includes a metastic cosmic registration at the metastic cosmic regulatory agency and NFR authentication; user registration and authentication; checking the relationship between capital and characters by a metastic supervisory organization; transaction software and background investigation.
9. The method of operation of claim 7, wherein the event occurrence comprises: mapping to an interconnection network through NFR, then performing consensus on the interconnection network, and finally synchronizing transaction behaviors or signatures on the interconnection network; in the event occurrence, events in the meta universe correspond to the same or different NFR mechanisms, an executed protocol flow conforms to the basic principle of NFR, the events need to be uploaded to an inter-link network after being authenticated by an NFR protocol, and data is synchronized in the whole network through one-time consensus.
10. The method of operation of claim 7, wherein the post-event recording comprises: after the event is finished, the processing flow of the event and the completion status of the participating mechanisms and the event are all recorded in uplink, i.e. data generated in the whole process of the event needs to be recorded in uplink.
CN202111346930.9A 2021-10-09 2021-11-15 Meta-universe safety system based on NFR and inter-link network and operation method Active CN114154987B (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN2021111740071 2021-10-09
CN202111174007 2021-10-09

Publications (2)

Publication Number Publication Date
CN114154987A true CN114154987A (en) 2022-03-08
CN114154987B CN114154987B (en) 2023-03-24

Family

ID=80459961

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111346930.9A Active CN114154987B (en) 2021-10-09 2021-11-15 Meta-universe safety system based on NFR and inter-link network and operation method

Country Status (1)

Country Link
CN (1) CN114154987B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114723500A (en) * 2022-05-07 2022-07-08 北京天德科技有限公司 Multi-chain system cooperation architecture for NFR digital transaction
CN114861227A (en) * 2022-05-18 2022-08-05 华侨大学 Intelligent tourism data processing method and system based on metauniverse
CN115174558A (en) * 2022-06-30 2022-10-11 中国联合网络通信集团有限公司 Cloud network terminal integrated identity authentication method, device, equipment and storage medium
CN115239435A (en) * 2022-08-08 2022-10-25 深圳市柔灵科技有限公司 Supply chain management system and method for flexible wearable equipment based on metauniverse

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101452339A (en) * 2007-12-06 2009-06-10 国际商业机器公司 Rendering of real world objects and interactions into a virtual universe
US20100269053A1 (en) * 2009-04-15 2010-10-21 International Business Machines Method for security and market surveillance of a virtual world asset through interactions with a real world monitoring center
CN108027867A (en) * 2015-07-14 2018-05-11 Fmr有限责任公司 Calculate efficient transfer accounts processing, audit and searcher, method and system
CN109523375A (en) * 2017-09-20 2019-03-26 成都高新信息技术研究院 A kind of decentralization transaction in assets method and system
CN110603539A (en) * 2017-02-07 2019-12-20 Iot控股公司 System and method for preventing monitoring and protecting privacy in virtual reality
US20200026787A1 (en) * 2018-07-23 2020-01-23 Wipro Limited METHOD, SYSTEM, AND FRAMEWORK FOR IMPLEMENTING INTERNET OF THINGS (IoT) APPLICATIONS
CN111314944A (en) * 2020-02-13 2020-06-19 广州爱浦路网络技术有限公司 Method for managing NRF in 5G core network based on top-level NRF
CN111369234A (en) * 2019-12-19 2020-07-03 山东爱城市网信息技术有限公司 Block chain-based homogenization equity transaction method, equipment and medium
WO2020150741A1 (en) * 2019-01-18 2020-07-23 Blockrules Ltd Identity management, smart contract generator, and blockchain mediating system, and related methods
CN112232828A (en) * 2020-11-23 2021-01-15 国网能源研究院有限公司 Power grid data transaction method and system
CN113095916A (en) * 2021-04-29 2021-07-09 支付宝(杭州)信息技术有限公司 Auction method based on block chain
CN113240437A (en) * 2021-05-10 2021-08-10 南京智信安网络科技有限公司 Artwork supervision platform based on block chain and management method
CN113435868A (en) * 2021-07-02 2021-09-24 区块动力(广州)科技有限公司 Digital asset transaction method for sharing charging pile
US20210304200A1 (en) * 2020-03-24 2021-09-30 Securrency, Inc. Method, apparatus, and computer-readable medium for secured multi-lateral data exchange over a computer network

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101452339A (en) * 2007-12-06 2009-06-10 国际商业机器公司 Rendering of real world objects and interactions into a virtual universe
US20100269053A1 (en) * 2009-04-15 2010-10-21 International Business Machines Method for security and market surveillance of a virtual world asset through interactions with a real world monitoring center
CN108027867A (en) * 2015-07-14 2018-05-11 Fmr有限责任公司 Calculate efficient transfer accounts processing, audit and searcher, method and system
CN110603539A (en) * 2017-02-07 2019-12-20 Iot控股公司 System and method for preventing monitoring and protecting privacy in virtual reality
CN109523375A (en) * 2017-09-20 2019-03-26 成都高新信息技术研究院 A kind of decentralization transaction in assets method and system
US20200026787A1 (en) * 2018-07-23 2020-01-23 Wipro Limited METHOD, SYSTEM, AND FRAMEWORK FOR IMPLEMENTING INTERNET OF THINGS (IoT) APPLICATIONS
WO2020150741A1 (en) * 2019-01-18 2020-07-23 Blockrules Ltd Identity management, smart contract generator, and blockchain mediating system, and related methods
CN111369234A (en) * 2019-12-19 2020-07-03 山东爱城市网信息技术有限公司 Block chain-based homogenization equity transaction method, equipment and medium
CN111314944A (en) * 2020-02-13 2020-06-19 广州爱浦路网络技术有限公司 Method for managing NRF in 5G core network based on top-level NRF
US20210304200A1 (en) * 2020-03-24 2021-09-30 Securrency, Inc. Method, apparatus, and computer-readable medium for secured multi-lateral data exchange over a computer network
CN112232828A (en) * 2020-11-23 2021-01-15 国网能源研究院有限公司 Power grid data transaction method and system
CN113095916A (en) * 2021-04-29 2021-07-09 支付宝(杭州)信息技术有限公司 Auction method based on block chain
CN113240437A (en) * 2021-05-10 2021-08-10 南京智信安网络科技有限公司 Artwork supervision platform based on block chain and management method
CN113435868A (en) * 2021-07-02 2021-09-24 区块动力(广州)科技有限公司 Digital asset transaction method for sharing charging pile

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
必查客: "都在疯抢的NFT,它的价值是赚钱?", 《HTTPS://WWW.PANEWSLAB.COM/ZH/ARTICLEDETAILS/N9603054.HTML》 *
蔡维德: "STRISA:一种实施旅行规则的新架构", 《贵阳学院学报(社会科学版)》 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114723500A (en) * 2022-05-07 2022-07-08 北京天德科技有限公司 Multi-chain system cooperation architecture for NFR digital transaction
CN114861227A (en) * 2022-05-18 2022-08-05 华侨大学 Intelligent tourism data processing method and system based on metauniverse
CN115174558A (en) * 2022-06-30 2022-10-11 中国联合网络通信集团有限公司 Cloud network terminal integrated identity authentication method, device, equipment and storage medium
CN115174558B (en) * 2022-06-30 2023-11-07 中国联合网络通信集团有限公司 Cloud network end integrated identity authentication method, device, equipment and storage medium
CN115239435A (en) * 2022-08-08 2022-10-25 深圳市柔灵科技有限公司 Supply chain management system and method for flexible wearable equipment based on metauniverse
CN115239435B (en) * 2022-08-08 2024-02-02 深圳市柔灵科技有限公司 Flexible wearable equipment supply chain management system and method based on meta universe

Also Published As

Publication number Publication date
CN114154987B (en) 2023-03-24

Similar Documents

Publication Publication Date Title
CN114154987B (en) Meta-universe safety system based on NFR and inter-link network and operation method
CN111295659B (en) Computer-implemented system and method for combining blockchain technology with digital twins
CN111144881B (en) Selective access to asset transfer data
CN109978688A (en) The access control method and its contract generator and server of distributed common recognition system
TW202008290A (en) Blockchain-based service rental methods and devices
WO2020106882A1 (en) Digital asset management
CN105893042A (en) Intelligent contract implementation method based on block chain
CN112632629B (en) Voting management method, device, medium and electronic equipment based on block chain
CN111414413A (en) Block chain endorsement verification
CN114626088A (en) Task processing method and device of privacy computing platform based on algorithm interconnection
CN115277122A (en) Cross-border data flow and supervision system based on block chain
CN115701078B (en) Cross-chain transaction processing method, device, electronic equipment and storage medium
CN111475778A (en) Music data processing method and device based on block chain
CN114637682A (en) SAAS system interface cloud debugging method, system, device and medium
CN101714222A (en) Safe electronic stamping method based on notarization stamp of notarization institution
CN110708390A (en) Data processing method, device, apparatus and medium based on inter-node data sharing
CN112069529B (en) Block chain-based volume management method and device, computer and storage medium
Alsamhi et al. Federated learning meets blockchain in decentralized data-sharing: Healthcare use case
CN114666408B (en) Market condition factor data transparent transmission method, device, equipment and medium based on Internet
WO2022268439A1 (en) Computer-implemented method and system for checking data anonymization
CN108052842A (en) Storage, verification method and the device of signed data
US11887146B2 (en) Product exploration-based promotion
CN114826725A (en) Data interaction method, device, equipment and storage medium
CN114066451A (en) Method and system for managing fund transaction and electronic equipment
CN116361753B (en) Authority authentication method, device, equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant