CN114285674B - Digital authentication system for meta universe super-entry - Google Patents

Digital authentication system for meta universe super-entry Download PDF

Info

Publication number
CN114285674B
CN114285674B CN202210216905.7A CN202210216905A CN114285674B CN 114285674 B CN114285674 B CN 114285674B CN 202210216905 A CN202210216905 A CN 202210216905A CN 114285674 B CN114285674 B CN 114285674B
Authority
CN
China
Prior art keywords
authentication
physical
virtual
space
authentication object
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210216905.7A
Other languages
Chinese (zh)
Other versions
CN114285674A (en
Inventor
曹源
汪大明
邓罡
曹宇
来飞
付宗波
周忠宝
张锦
徐梓桑
陈磊
曲波
曹恒
陈澄
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shandong Lancheng Guohua Hi Tech Co.,Ltd.
Original Assignee
Hunan Zhaowuxin Chain Technology Group Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hunan Zhaowuxin Chain Technology Group Co ltd filed Critical Hunan Zhaowuxin Chain Technology Group Co ltd
Priority to CN202210216905.7A priority Critical patent/CN114285674B/en
Publication of CN114285674A publication Critical patent/CN114285674A/en
Application granted granted Critical
Publication of CN114285674B publication Critical patent/CN114285674B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Processing Or Creating Images (AREA)

Abstract

The invention relates to a digital authentication system of a meta-universe super-portal, which comprises a physical authentication space, a mixed authentication space and a virtual authentication space; the physical authentication space is used for performing physical authentication of physical equipment and a connection state for a user of the meta universe; the hybrid authentication space is used for carrying out mapping performance authentication on the user and a virtual agent which is used for mapping the user in the meta-universe; the virtual authentication space is used for adjusting system settings of the meta-space suitable for the user based on a physical authentication report of the user according to the use expectation of the user on the meta-space, so that the user obtains optimized use experience after entering the meta-space system through the meta-space super-entry.

Description

Digital authentication system for meta universe super-entry
Technical Field
The invention relates to the technical field of digital authentication. And more particularly, to a digital authentication system for a metasequestrial superportal.
Background
The metasystem is a virtual digital world that is parallel to the real world, built using multi-aspect scientific techniques and high-speed computing equipment. The number of physical users that the metasma can accommodate can be adjusted according to the computing power of the digital device running the metasma system; relatively, the reality of physical users is different; for different users who want to enter the same metasystem, the physical devices, the computational power, the network environment and the personalized use requirements of the different users are the same as much as possible, and if a single authentication standard is adopted to authenticate metasystem overentries for various users and is set as a uniform operation parameter, the single authentication standard may exceed the load standard of the users or the metasystem which can normally operate, and an operation accident occurs.
Referring to the related disclosed technical solutions, the disclosure of publication No. US2021383388(a1) proposes a system and method for managing a digital identity, which implements multiple authentication and status feedback of the digital identity through an encrypted communication device owned by a user; the technical scheme with publication number CN112950220(A) provides an enterprise digital identity management system based on a block chain, and provides identity authentication management of an enterprise and a contact party in production and business activities, so that benefits of both parties are protected; the publication number WO2021012803(a1) proposes a processing system for digital assets to be authenticated, which performs asymmetric encryption calculation on the digital assets to be authenticated and obtains a corresponding encrypted data packet, and uploads the digest of the encrypted data packet to the encryption authentication system, thereby reducing the authentication calculation load of the authentication system. The related technical scheme has not been optimized and adjusted according to the usage scene of the metasma, so a technical implementation of the digital authentication system of the metasma super-entry is provided.
Disclosure of Invention
The invention aims to perform preposed digital authentication on a user entering a meta universe super entry according to diversified use conditions and requirements of the meta universe user, so as to confirm the performance of the client of the user and ensure that the user experience in the meta universe is optimized.
The invention adopts the following technical scheme:
a digital authentication system for a metasequestrial superportal, the authentication system comprising three authentication spaces:
physical authentication space: the system comprises a physical authentication module, a verification module and a verification module, wherein the physical authentication module is used for performing physical authentication on an authentication object which is currently located in a physical space so as to determine that the authentication object has physical qualification and authority of a metasystem to be entered in the physical space; the physical authentication includes at least:
authenticating physical properties of a network device, an input device, and an output device used by the authentication object in a physical space; and the number of the first and second groups,
confirming and auditing the physical identity of the authentication object in a physical space; and the number of the first and second groups,
confirming and auditing the geographic positioning of the authentication object in a physical space; and the number of the first and second groups,
confirming and checking the physiological signs of the authentication object; and the number of the first and second groups,
generating a physical authentication report;
a hybrid authentication space: the authentication object is subjected to hybrid authentication based on a virtual space and a physical space so as to determine the connection and proxy performance of the authentication object and a proxy of the authentication object in the virtual space; wherein an authentication implementation of the hybrid authentication space is based on the physical authentication report, comprising:
generating a virtual agent for the authentication object; and the number of the first and second groups,
using a mixed authentication interaction link to carry out interaction feedback with the authentication object, and acquiring a physical feedback expression of the authentication object in a physical space and a virtual feedback expression of the virtual agent in a virtual space; and the number of the first and second electrodes,
calculating the difference between the physical feedback performance and the virtual feedback performance, giving authentication evaluation, and generating a mixed authentication report;
virtual authentication space: the virtual agent is used for acquiring the use requirement of the authentication object on the meta universe, running a virtual test program to generate a virtual authentication report, and feeding back the performance expression of the virtual agent to the authentication object according to the virtual authentication report.
The authentication object uses a plurality of devices entering the metauniverse environment to map a plurality of aspects of self behaviors, ideas, states, attributes and the like, and reflects the mapping result to the virtual agent in a digital mode;
the authentication object and the virtual agent are arranged by the authentication system sequentially through the physical authentication space, the hybrid authentication space, and the virtual authentication space;
the physical authentication report comprises a plurality of physical authentication dimensions; each physical authentication dimension is respectively given an authentication score according to the authentication performance of the authentication object; each physical authentication dimension is given an upper limit and a lower limit of the score of the dimension by a metasystem;
the mixed authentication interaction link determines specific implementation items of the mixed authentication interaction link, the complexity of the implementation of the items and the authentication frequency according to the scores of the physical authentication dimensions;
the attributes of the virtual agent are endowed with a first parameter at the initial stage of entering the mixed authentication space; the virtual agent performs the mixed authentication interaction link by using a first parameter, and after the mixed authentication report is generated, the first parameter of the virtual agent is updated to be a second parameter by a meta-space control system;
the virtual authentication space sets a small virtual authentication scene according to the use requirement of the authentication object on the meta universe, and the authentication object executes the virtual authentication items by operating the virtual agent through setting a plurality of virtual authentication items according with the use requirement and feeds back the feeling in the virtual authentication process through the authentication object;
the virtual authentication space comprises a plurality of parameters of the virtual authentication scene which are adjusted by a perceptible or imperceptible adjustment gradient, and correspondingly receives the perception condition of the authentication object for a plurality of times; the virtual authentication space carries out quantitative statistics on the experience condition of the authentication object in multiple dimensions, so that an optimized use index is obtained through the statistical result in the multiple dimensions;
after the authentication object obtains the usage index, the metasystem opens to the authentication object and the virtual agent thereof; and the usage index is used for guiding a plurality of working parameters when the metasystem works for the authentication object, so that an optimized running state between the metasystem and the authentication object is obtained.
The beneficial effects obtained by the invention are as follows:
1. the digital authentication system comprises three authentication spaces, and digital authentication is performed on a user for multiple times from the currently presented multiple-dimensional representation of the user, so that a parameter suitable for a metastic scene used by the user is set;
2. the digital authentication system effectively balances the use requirements of the user on the metacavity system and the limit of the user on the use conditions of the metacavity system, and improves the use experience of the user in the metacavity environment;
3. the digital authentication system of the invention continuously performs feedback interaction with the authentication object in the authentication process, thereby ensuring that the final authentication result can reflect the real requirement of the authentication object;
4. the software and hardware layout requirements of the invention are based on modular design, and the invention can be conveniently switched and upgraded in the technical updating and modifying stage, thereby being beneficial to the optimization and upgrading of the technical scheme in the future.
Drawings
The invention will be further understood from the following description in conjunction with the accompanying drawings. The components in the figures are not necessarily to scale, emphasis instead being placed upon illustrating the principles of the embodiments. Like reference numerals designate corresponding parts throughout the different views.
FIG. 1 is a schematic diagram of the architecture of the authentication system;
FIG. 2 is a schematic diagram of an organization of a metastic client device;
FIG. 3 is a schematic diagram of a network connection of the metaspace server;
FIG. 4 is a schematic diagram of the hybrid authentication space;
fig. 5 is a schematic diagram of performing synchronization performance authentication in the hybrid authentication space.
Description of the figure numbering: 10-an authentication object; 20-member universe super-entry; 101-physical authentication space; 102-a hybrid authentication space; 103-virtual authentication space; 110-an arithmetic device; 120-an input device; 130-an output device; 140-a network device; 150. 160-a metastic server; 501-detecting a target; 502-virtual proxy hand.
Detailed Description
In order to make the technical solutions and advantages of the present invention more apparent, the present invention is further described in detail below with reference to embodiments thereof; it should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention. Other systems, methods, and/or features of the present embodiments will become apparent to those skilled in the art upon review of the following detailed description. It is intended that all such additional systems, methods, features and advantages be included within this description, be within the scope of the invention, and be protected by the accompanying claims. Additional features of the disclosed embodiments are described in, and will be apparent from, the detailed description that follows.
The same or similar reference numerals in the drawings of the embodiments of the present invention correspond to the same or similar components; in the description of the present invention, it is to be understood that if there is an orientation or positional relationship indicated by the terms "upper", "lower", "left", "right", etc. based on the orientation or positional relationship shown in the drawings, it is only for convenience of description and simplification of description, but it is not intended to indicate or imply that the device or assembly referred to must have a specific orientation.
The first embodiment is as follows:
the meta universe is a persistent and decentralized online three-dimensional virtual environment; the virtual environment can enable a user to enter an artificial virtual world and implement various behaviors through equipment such as virtual reality setting, a mobile phone, a personal computer, an electronic game machine and the like;
in a device environment where the user uses the metastic, the user accesses the metastic system through the client 10; the client 10 includes a plurality of electronic devices, as shown in fig. 2, including:
the arithmetic device 110: such as desktop computers, notebook computers, smart motors, tablet computers, and the like;
the input device 120: such as a mouse, a keyboard, a digital handle, a microphone, or a sensor device with various pressure, sound, image acquisition, human body monitoring, etc. for acquiring user instructions and responses;
the output device 130: devices that give sensory stimuli to users, such as desktop displays, head-mounted displays, sounds, vibration-sensitive clothing, air conditioners with temperature/humidity adjustment, light adjustment devices, and the like;
the network device 140: devices for connecting networks, such as routers, switches, network cards, etc.;
as further shown in fig. 3, the metasystem provides metasystem services to a plurality of users through the servers 150, 160, including virtual space-based instant messaging services, game services, group call services (or voice conference services), messaging services, email services, social networking services, mapping services, translation services, financial services, payment services, search services, content providing services, and the like; the server is communicated with a plurality of clients 10 through network connection;
a user communicatively connected to the metasystem server using the plurality of devices, and executing and simulating a virtual agent by a program of the metasystem server, whereby the user exists in the metasystem environment with a specific identity; the virtual agent can be a program segment used for matching the user and used for mapping the thought and the behavior of the user in the meta universe and receiving the execution result of the meta universe to the user; and further, the virtual agent may be embodied as a character in the meta universe, such as a virtual character, animal, robot, or the like
However, in an actual use case, the electronic devices included in the client of each user have great variability; for example,
a user uses a desktop computer with higher performance, is provided with a whole body motion sensing device and can perform mapping of whole body motions to a meta-universe environment, and the virtual agent of the user can express all the motions of the user;
a user passes through a mobile arithmetic device with general performance and is provided with a body sensing device only with hands, the network running environment of the user is poor, and the network bandwidth and the response speed have certain defects;
aiming at various use conditions of a plurality of users and application requirements of the metasma system, the metasma system makes a digital authentication before the user enters a metasma super entrance so as to confirm the current configuration condition of the user;
a digital authentication system for a metasequestrial superportal, the authentication system comprising three authentication spaces:
physical authentication space: the system comprises a physical authentication module, a verification module and a verification module, wherein the physical authentication module is used for performing physical authentication on an authentication object which is currently located in a physical space so as to determine that the authentication object has physical qualification and authority of a metasystem to be entered in the physical space; the physical authentication includes at least:
authenticating physical properties of a network device, an input device, and an output device used by the authentication object in a physical space; and the number of the first and second groups,
confirming and auditing the physical identity of the authentication object in a physical space; and the number of the first and second groups,
confirming and auditing the geographic positioning of the authentication object in a physical space; and the number of the first and second groups,
confirming and checking the physiological signs of the authentication object;
generating a physical authentication report;
a hybrid authentication space: the authentication object is subjected to hybrid authentication based on a virtual space and a physical space so as to determine the connection and proxy performance of the authentication object and a proxy of the authentication object in the virtual space; wherein an authentication implementation of the hybrid authentication space is based on the physical authentication report, comprising:
generating a virtual agent for the authentication object; and the number of the first and second groups,
using a mixed authentication interaction link to carry out interaction feedback with the authentication object, and acquiring a physical feedback expression of the authentication object in a physical space and a virtual feedback expression of the virtual agent in a virtual space; and the number of the first and second electrodes,
calculating the difference between the physical feedback performance and the virtual feedback performance, giving authentication evaluation, and generating a mixed authentication report;
virtual authentication space: the virtual agent is used for acquiring the use requirement of the authentication object on the meta universe, running a virtual test program to generate a virtual authentication report, and feeding back the performance expression of the virtual agent to the authentication object according to the virtual authentication report;
the authentication object is suitable for mapping a plurality of aspects such as self behavior, thought, state, attribute and the like by equipment entering the meta-universe environment, and reflecting a mapping result to the virtual agent in a digital mode;
the authentication object and the virtual agent are arranged by the authentication system to sequentially pass through the physical authentication space, the hybrid authentication space, and the virtual authentication space;
the physical authentication report comprises a plurality of physical authentication dimensions; each physical authentication dimension is respectively given an authentication score according to the authentication performance of the authentication object; each physical authentication dimension is given an upper limit and a lower limit of the score of the dimension by a metasystem;
the mixed authentication interaction link determines specific implementation items of the mixed authentication interaction link, the complexity of the implementation of the items and the authentication frequency according to the scores of the physical authentication dimensions;
the attributes of the virtual agent are endowed with a first parameter at the initial stage of entering the mixed authentication space; the virtual agent performs the mixed authentication interaction link by using a first parameter, and after the mixed authentication report is generated, the first parameter of the virtual agent is updated to be a second parameter by a meta-space control system;
the virtual authentication space sets a small virtual authentication scene according to the use requirement of the authentication object on the meta universe, and the authentication object executes the virtual authentication items by operating the virtual agent through setting a plurality of virtual authentication items according with the use requirement and feeds back the feeling in the virtual authentication process through the authentication object;
the virtual authentication space comprises a plurality of parameters of the virtual authentication scene which are adjusted by a perceptible or imperceptible adjustment gradient, and correspondingly receives the perception condition of the authentication object for a plurality of times; the virtual authentication space carries out quantitative statistics on the experience condition of the authentication object in multiple dimensions, so that an optimized use index is obtained through the statistical result in the multiple dimensions;
after the authentication object obtains the usage index, the metasystem opens to the authentication object and the virtual agent thereof; and the usage index is used for guiding a plurality of working parameters when the metasystem works for the authentication object, so as to obtain an optimized running state between the metasystem and the authentication object;
before entering the meta-universe super-entry, the user needs to serve as the authentication object and is guided by the authentication system to enter the physical authentication space;
the physical identity confirmation comprises identity identification confirmation, such as identity card scanning, or biological identification scanning such as face scanning, iris scanning, fingerprint scanning, voiceprint scanning and the like, or identity recognition is carried out by using encryption hardware, and the purpose is to confirm identity registration information of an authentication object in the metasma and prepare for matching and calling the virtual agent corresponding to the authentication object;
the peripheral equipment used by the authentication object is authenticated, the model and the performance of the equipment are identified, and the mapping performance expression which can be achieved by the authentication object and the virtual agent is judged; wherein
Confirming the physical space positioning of the authentication object, wherein the confirming comprises identifying whether the physical positioning of the authentication object is a common positioning or not and whether the physical positioning of the authentication object is located in a non-registration place or not;
the physical signs of the authentication object are authenticated, and the authentication can include authentication of physical functions such as respiration condition, pulse, eyesight, hearing and the like, and is used for confirming whether the physical conditions of the authentication object are suitable for entering the metauniverse environment or calculating the physical conditions of the authentication object, and adjusting the setting content of the metauniverse environment according to the physical conditions;
further, the physical authentication report includes a plurality of physical authentication dimensions
Figure 816998DEST_PATH_IMAGE001
Figure 796455DEST_PATH_IMAGE002
……
Figure 920400DEST_PATH_IMAGE003
Scoring the plurality of physical authentication dimensions by authentication of the physical authentication space, and recording the scoring into the physical authentication report;
further, the virtual agent generated for the authentication object in the hybrid authentication space may have a plurality of performance performances, and the plurality of performance performances are related to the current physical condition of the authentication object; for example,
if the authentication object is to control the hand motion of the virtual agent through a sensing glove worn by the hand, the virtual agent can be endowed with hand joints with multiple degrees of freedom and a wider hand motion space; if the authentication object controls the hand motion of the virtual lending through a mouse, a keyboard or a control handle, partial hand joints of the virtual agent can be omitted, and therefore the computation amount of the client and the metastic server is saved;
in the same embodiment, the visual device, the auditory device, the skin sensing device and the like based on the authentication object can be expanded, and the details are not repeated herein;
further, when the authentication object enters the metas system in a network environment with high bandwidth and low latency, the network data is provided at a network bandwidth of, for example, 5Gb/s, and the metas-cosmic image is provided at a visual speed of 360 frames/second; when the authentication object enters the metasystem under the network environment with low bandwidth and high delay, the network speed is limited to be 100Mb/s of data bandwidth to provide network data, and the video speed is reduced to 60 frames/second;
further, the hybrid authentication space sets a plurality of performance parameters, namely the first parameter, of the virtual agent according to scores of a plurality of physical dimensions of a physical authentication report; the authentication agent enters the hybrid authentication space with the virtual agent set to the first parameter, so the authentication agent will be somewhat limited in the sense of physical use, e.g., due to bandwidth limitations, the metasystem reduces the appearance of virtual agents in the metastables environment, e.g., surrounding scenery, objects, view of the sky, etc.; and further, restricting the actions of the virtual agent in the hybrid authentication space, e.g. five fingers of both hands only three fingers are movable, or a squat action is not possible;
further, the performing, by the hybrid authentication space, the authentication of the hybrid authentication space by detecting the performance of the authentication object and the virtual agent includes:
as shown in fig. 4, the motion synchronization rate of the authentication object and the virtual agent is detected, that is, when the authentication object makes a first motion, the virtual agent makes the same motion with time delay, motion similarity degree, motion amplitude, etc.;
detecting the sensory performance of the authentication object, in one embodiment, as shown in fig. 5, in a metastic environment, the method is arranged in front of a hand 502 of the virtual agent, and generates a detection target 501 moving at a constant speed every 5 seconds; the system requests the authentication object to perform a hand following operation to follow the movement position of the detection target 501, and determines the degree of deviation in the following operation(ii) a The detection target 501 is at position a at the beginning and moves to position b after time t; meanwhile, the authentication object controls the hand 502 of the virtual agent to move from an initial position c to a position d following the movement of the detection target 501; the hybrid authentication space calculates the displacement x of a-b and the displacement x' of c-d, and verifies whether the two displacements conform to the proportion of the two dimensions of the physical environment and the meta-universe environment through conversion of space mapping, so as to verify whether the equipment of the authentication object has enough motion precision to match the use of the meta-universe environment; further, the performance error of the equipment of the authentication object in multiple tests can be tested by repeating the verification for more than one time; further, by calculating at a plurality of time intervals
Figure 50030DEST_PATH_IMAGE004
Multiple displacements of the hand 502 of the authentication object in the physical environment
Figure 457878DEST_PATH_IMAGE005
Figure 326345DEST_PATH_IMAGE006
……
Figure 62220DEST_PATH_IMAGE007
And displacement of the hand 502 of the virtual agent
Figure 120175DEST_PATH_IMAGE008
Figure 257895DEST_PATH_IMAGE009
……
Figure 595467DEST_PATH_IMAGE010
The proportion of (c) is verified:
Figure 146534DEST_PATH_IMAGE011
whether this is true is done, thereby verifying whether the mapping performance of the virtual agent is smooth and uniform throughout the action;
further, by adjusting the moving speed of the detection target, physical performance of the authenticated user is calculated, such as whether data loss occurs in the device, whether the device is overloaded, and physiological responses of the authenticated user, such as whether pulse and body temperature rise occur, whether attention can be concentrated or not;
the hybrid authentication interaction link can be formulated according to the specific implementation environment and system performance of the metasystem, and the above implementation manner is only used as an example and is not limited herein;
further, after the hybrid authentication space completes authentication and generates the hybrid authentication report, further optimizing the working parameters of the virtual agent, so as to optimize the working parameters of the virtual agent from the first parameters to the second parameters;
furthermore, the setting of the virtual authentication space is mainly set according to the requirements of a user, namely the authentication object; for example, the authentication object is expected to adopt panoramic image video in the meta-space conference and perform mapping on the whole body at ultrahigh resolution; alternatively, the metastic game that the authentication object desires to play includes vibration feedback and temperature feedback; the virtual authentication space is generated in a setting that completely meets the requirements of the user;
in the virtual authentication space, the sensory feedback of the authentication object to the current virtual authentication space can be accepted in the form of a list question; for example, feedback is given on whether the panoramic image is clear and smooth enough, whether the image sharpness is sufficient, whether the action of the virtual agent is humanoid enough, etc. in the meta-space conference; or whether the vibration is timely and uniform is fed back in the Yuanuniverse game, and the strength is moderate;
further, in the continuous feedback of the authentication object, the virtual authentication space may continuously adjust the current performance, such as: continuously adjusting the image definition, aiming at properly reducing the image definition under the condition that the feedback of the user is satisfied enough so as to reduce the performance pressure of the metas and the client equipment of the authentication object;
through the digital authentication of the three authentication spaces, the method comprises the objective adjustment of the operating equipment condition of the client, the interactive adjustment of the client and the metasystem and the subjective adjustment from the perspective of the user, and the matching environment parameters between the user and the metasystem are greatly optimized.
Example two:
this embodiment should be understood to include at least all of the features of any of the foregoing embodiments and further modifications thereon;
in the process of performing authentication in the physical authentication space, scores of the multiple physical authentication dimensions obtained have large differences, and different physical authentication dimensions tend to have different dimensions, for example: for the action of the authentication object, the dimension may include: speed m/s, acceleration m/s2An amplitude m; for detecting the personal physical signs of the authentication object, the dimension further comprises: pulse times/minute, blood pressure mmHg; also included are different performance behaviors of the client system, such as: network delay ms, image refresh rate Hz, image frame rate fps, frame generation rate ms, and the like; such a situation affects the result of data analysis, and in order to eliminate the influence of dimension between indexes, data standardization processing is required to solve the comparability between data indexes. After the data standardization processing is carried out on the original data, all indexes are in the same order of magnitude and are suitable for comprehensive comparison and evaluation; therefore, the data processing mode of the physical authentication report is further optimized;
the optimization mode comprises the steps of carrying out normalization processing on the score data of a plurality of physical authentication dimensions; the normalization process can be normalized by dispersion, i.e., using the following equation:
Figure 352387DEST_PATH_IMAGE012
formula 2-1;
in the formula 2-1, the first and second,
Figure 978235DEST_PATH_IMAGE013
a measurement value representing one of said physical feature dimensions,
Figure 876921DEST_PATH_IMAGE014
show that
Figure 915284DEST_PATH_IMAGE013
The normalized data value of the data is then compared to the standard,
Figure 800195DEST_PATH_IMAGE015
representing the physical feature dimension in statistics of multiple users
Figure 912507DEST_PATH_IMAGE013
Is determined by the average value of (a) of (b),
Figure 841149DEST_PATH_IMAGE016
as a dimension of a physical feature
Figure 616076DEST_PATH_IMAGE013
An upper limit value of (d);
Figure 163732DEST_PATH_IMAGE017
as a dimension of a physical feature
Figure 255185DEST_PATH_IMAGE013
A lower limit value of (d);
it is to be noted that it is preferable that,
Figure 761252DEST_PATH_IMAGE018
and
Figure 56099DEST_PATH_IMAGE019
may not have a value of
Figure 735342DEST_PATH_IMAGE013
The maximum and minimum values of all statistical values of (c),
Figure 556667DEST_PATH_IMAGE018
and
Figure 341958DEST_PATH_IMAGE019
the value of (A) can be used by the Meta-universe system according to the actual application
Figure 514314DEST_PATH_IMAGE013
The upper and lower limits of the physical properties are defined;
through the data unification treatment, the physical characteristic dimensions with different dimensions are in the same numerical order, the influence of the characteristics with large variance is reduced, and the model is more accurate.
Example three:
this embodiment should be understood to include at least all of the features of any of the foregoing embodiments and further modifications thereon;
wherein the physical feature dimension
Figure 528406DEST_PATH_IMAGE013
Upper and lower limit values of
Figure 469817DEST_PATH_IMAGE020
And
Figure 927474DEST_PATH_IMAGE021
the proper adjustment can be made under different using states according to the authentication object;
in some cases, the authentication object is authenticated by the metas-cosmic super-portal during a period of time in the morning when the network is smooth; the physical feature dimension corresponding to a network condition is
Figure 649443DEST_PATH_IMAGE022
(ii) a The network flow situation is a temporary situation, so by using the revised ceiling value
Figure 342592DEST_PATH_IMAGE023
Namely:
Figure 512411DEST_PATH_IMAGE024
formula 3-1;
wherein T is a time correction coefficient, and can be measured by statistics according to a network fluctuation condition statistic of a network area where the authentication object is located; n is a radical ofuserCorrecting the coefficient by the number of online people, which significantly affects the operation processing capability of the metasystem, according to the number of online people of the metasystem where the authentication object is located in the metasystem
Figure 265604DEST_PATH_IMAGE025
Further correction is carried out;
in some cases, such as in the process of a metaclass game, as the program of the game is upgraded and the difficulty of game stages is increased, the increase of client devices is relatively increased; similar to the above processing method, the lower limit value of the physical feature dimension related to the game device can be increased
Figure 474868DEST_PATH_IMAGE026
In this case, the performance evaluation of the client of the authentication object is reduced, so that the authentication object is forced to upgrade the device or reduce the operating environment setting of the metastic game, for example, the image quality is reduced or the game processing speed is reduced.
In the above embodiments, the description of each embodiment has its own emphasis, and reference may be made to the related description of other embodiments for parts that are not described or recited in any embodiment.
Although the invention has been described above with reference to various embodiments, it should be understood that many changes and modifications may be made without departing from the scope of the invention. That is, the methods, systems, and devices discussed above are examples. Various configurations may omit, substitute, or add various procedures or components as appropriate. For example, in alternative configurations, the methods may be performed in an order different than that described, and/or various components may be added, omitted, and/or combined. Moreover, features described with respect to certain configurations may be combined in various other configurations, as different aspects and elements of the configurations may be combined in a similar manner. Further, elements therein may be updated as technology evolves, i.e., many elements are examples and do not limit the scope of the disclosure or claims.
Specific details are given in the description to provide a thorough understanding of the exemplary configurations including implementations. However, configurations may be practiced without these specific details, for example, well-known circuits, processes, algorithms, structures, and techniques have been shown without unnecessary detail in order to avoid obscuring the configurations. This description provides example configurations only, and does not limit the scope, applicability, or configuration of the claims. Rather, the foregoing description of the configurations will provide those skilled in the art with an enabling description for implementing the described techniques. Various changes may be made in the function and arrangement of elements without departing from the spirit or scope of the disclosure.
In conclusion, it is intended that the foregoing detailed description be regarded as illustrative rather than limiting, and that it be understood that these examples are illustrative only and are not intended to limit the scope of the invention. After reading the description of the invention, the skilled person can make various changes or modifications to the invention, and these equivalent changes and modifications also fall into the scope of the invention defined by the claims.

Claims (10)

1. A digital authentication system for a metasequoiy superportal, the authentication system comprising three authentication spaces:
physical authentication space: the system comprises a physical authentication module, a verification module and a verification module, wherein the physical authentication module is used for performing physical authentication on an authentication object which is currently located in a physical space so as to determine that the authentication object has physical qualification and authority of a metasystem to be entered in the physical space; the physical authentication includes at least:
authenticating physical properties of a network device, an input device, and an output device used by the authentication object in a physical space; and the number of the first and second groups,
confirming and auditing the physical identity of the authentication object in a physical space; and the number of the first and second groups,
confirming and auditing the geographic positioning of the authentication object in a physical space; and (c) a second step of,
confirming and checking the physiological signs of the authentication object; and the number of the first and second groups,
generating a physical authentication report;
a hybrid authentication space: the authentication object is subjected to hybrid authentication based on a virtual space and a physical space so as to determine the connection and proxy performance of the authentication object and a proxy of the authentication object in the virtual space; wherein an authentication implementation of the hybrid authentication space is based on the physical authentication report, comprising:
generating a virtual agent for the authentication object; and the number of the first and second groups,
using a mixed authentication interaction link to carry out interaction feedback with the authentication object, and acquiring a physical feedback expression of the authentication object in a physical space and a virtual feedback expression of the virtual agent in a virtual space; and the number of the first and second electrodes,
calculating the difference between the physical feedback performance and the virtual feedback performance, giving authentication evaluation, and generating a mixed authentication report;
virtual authentication space: the virtual agent is used for acquiring the use requirement of the authentication object on the meta universe, running a virtual test program to generate a virtual authentication report, and feeding back the performance expression of the virtual agent to the authentication object according to the virtual authentication report.
2. The system of claim 1, wherein the authentication object maps aspects of behavior, concept, status, and attributes of the authentication object using a plurality of devices that enter the metastables environment, and digitally reflects the mapping to the virtual agent.
3. The system according to claim 2, wherein the authentication object and the virtual agent are arranged by the authentication system to sequentially pass through the physical authentication space, the hybrid authentication space, and the virtual authentication space.
4. The system of claim 3, wherein the physical authentication report comprises a plurality of physical authentication dimensions; each physical authentication dimension is respectively given an authentication score according to the authentication performance of the authentication object; each of the physical authentication dimensions is given an upper and lower limit for the score of the dimension by the metasystem.
5. The system according to claim 4, wherein the hybrid authentication interaction link determines the specific implementation items of the hybrid authentication interaction link, the complexity of the implementation of the items, and the authentication frequency according to the scores of the plurality of physical authentication dimensions.
6. The system according to claim 5, wherein the attributes of the virtual agent are assigned a first parameter at an early stage of entering the hybrid authentication space; and the virtual agent performs the hybrid authentication interaction procedure with a first parameter, and after the hybrid authentication report is generated, the first parameter of the virtual agent is updated to a second parameter by a metaspace control system.
7. The system according to claim 6, wherein the virtual authentication space is configured to set a small virtual authentication scenario according to a usage requirement of the authentication object for the metastables, and by setting a plurality of virtual authentication items meeting the usage requirement, the authentication object executes the virtual authentication items by operating the virtual agent, and the authentication object feeds back a feeling during the virtual authentication.
8. The system according to claim 7, wherein the virtual authentication space comprises a plurality of parameters for adjusting the virtual authentication scene with a perceptible or imperceptible adjustment gradient, and correspondingly receiving the perception of the authentication object a plurality of times; the virtual authentication space quantifies and counts the feeling condition of the authentication object in multiple dimensions, so that an optimized use index is obtained through the statistical result in the multiple dimensions.
9. The system according to claim 8, wherein after the object obtains the usage index, the system is open to the object and its virtual agent; and the usage index is used for guiding a plurality of working parameters when the metasystem works for the authentication object, so that an optimized running state between the metasystem and the authentication object is obtained.
10. A digital authentication device, comprising a memory, a processor, and an authentication program required by the digital authentication system of the type of metasequoiy super-portal stored in the memory and executable on the processor, wherein when the authentication program required by the digital authentication system of the type of metasequoiy super-portal is executed by the processor, the step of implementing the authentication program required by the digital authentication system of the type of metasequoiy super-portal according to claim 9 is performed.
CN202210216905.7A 2022-03-07 2022-03-07 Digital authentication system for meta universe super-entry Active CN114285674B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210216905.7A CN114285674B (en) 2022-03-07 2022-03-07 Digital authentication system for meta universe super-entry

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210216905.7A CN114285674B (en) 2022-03-07 2022-03-07 Digital authentication system for meta universe super-entry

Publications (2)

Publication Number Publication Date
CN114285674A CN114285674A (en) 2022-04-05
CN114285674B true CN114285674B (en) 2022-05-17

Family

ID=80882320

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210216905.7A Active CN114285674B (en) 2022-03-07 2022-03-07 Digital authentication system for meta universe super-entry

Country Status (1)

Country Link
CN (1) CN114285674B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114862445B (en) * 2022-04-06 2024-06-18 上海零数众合信息科技有限公司 Method for throwing virtual advertisement in meta-universe
CN114861227A (en) * 2022-05-18 2022-08-05 华侨大学 Intelligent tourism data processing method and system based on metauniverse
CN115801299B (en) * 2022-06-30 2024-03-12 中国联合网络通信集团有限公司 Meta universe identity authentication method, device, equipment and storage medium
CN115174558B (en) * 2022-06-30 2023-11-07 中国联合网络通信集团有限公司 Cloud network end integrated identity authentication method, device, equipment and storage medium
CN115426183B (en) * 2022-09-01 2024-04-12 中国联合网络通信集团有限公司 Identity authentication method, device, equipment and computer readable medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1918606A (en) * 2004-02-12 2007-02-21 Igt公司 Player verification method and system for remote gaming terminal
CN103294939A (en) * 2012-02-01 2013-09-11 国际商业机器公司 Virtual avatar authentication method and system
CN113793059A (en) * 2021-09-27 2021-12-14 杭州润德网络技术有限公司 Metaverse element universe digital management method
CN113906420A (en) * 2019-05-07 2022-01-07 玉财润 Virtual reality world identity authentication management system

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070066403A1 (en) * 2005-09-20 2007-03-22 Conkwright George C Method for dynamically adjusting an interactive application such as a videogame based on continuing assessments of user capability
US20090158150A1 (en) * 2007-12-18 2009-06-18 International Business Machines Corporation Rules-based profile switching in metaverse applications
US8471843B2 (en) * 2008-07-07 2013-06-25 International Business Machines Corporation Geometric and texture modifications of objects in a virtual universe based on real world user characteristics

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1918606A (en) * 2004-02-12 2007-02-21 Igt公司 Player verification method and system for remote gaming terminal
CN103294939A (en) * 2012-02-01 2013-09-11 国际商业机器公司 Virtual avatar authentication method and system
CN113906420A (en) * 2019-05-07 2022-01-07 玉财润 Virtual reality world identity authentication management system
CN113793059A (en) * 2021-09-27 2021-12-14 杭州润德网络技术有限公司 Metaverse element universe digital management method

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Photorealistic avatars to enhance the efficacy of Selfattachment;Ibrahim Ghaznavi;《IEEE》;20210115;全文 *
The Influence of Size in Augmented Reality Telepresence Avatars;Michael E. Walker;《IEEE》;20190815;全文 *

Also Published As

Publication number Publication date
CN114285674A (en) 2022-04-05

Similar Documents

Publication Publication Date Title
CN114285674B (en) Digital authentication system for meta universe super-entry
CN111033501B (en) Secure authorization for access to private data in virtual reality
US20220249952A1 (en) Game character behavior control method and apparatus, storage medium, and electronic device
US20180308107A1 (en) Living-body detection based anti-cheating online research method, device and system
AU2018212014B2 (en) System and method for personalized virtual reality experience in a controlled environment
CN110692062A (en) Accumulation and confidence assignment of iris codes
CN113508369A (en) Communication support system, communication support method, communication support program, and image control program
KR102432248B1 (en) System And Method For Generating An Avatar And Provides It To An External Metaverse Platform To Update The Avatar And Provide NFT For The Updated Avatar
Lu et al. Multifactor user authentication with in-air-handwriting and hand geometry
KR102425479B1 (en) System And Method For Generating An Avatar With User Information, Providing It To An External Metaverse Platform, And Recommending A User-Customized DTx(Digital Therapeutics)
US20210019385A1 (en) Methods, systems, and media for secure authentication of users using one or more biometric recognition systems
WO2018005526A1 (en) Constructing social networks using monitored game play
KR102445135B1 (en) System And Method For Providing Forgery And Falsification Verification Of Avatar Information For Avatar Generation On The Metaverse Platform
KR102443946B1 (en) System And Method For Providing Owner Verification Of Avatar Information To Protect Avatar Information In The Metaverse Platform From False Avatar Information
WO2023244602A1 (en) Systems and methods that provide a high level of security for a user
US11934508B2 (en) Systems and methods including user authentication
US10788887B2 (en) Image generation program, image generation device, and image generation method
CN107390864B (en) Network investigation method based on eyeball trajectory tracking, electronic equipment and storage medium
CN110199244A (en) Information processing equipment, information processing method and program
US20230418365A1 (en) Systems and methods for multi-point validation in communication network with associated virtual reality application layer
CN116488850A (en) Authenticity verification method and device
CN114270301A (en) Agent providing system, agent providing method, and recording medium
Bharadwaj et al. Reliable human authentication using AI-based multibiometric image sensor fusion: Assessment of performance in information security
KR102432251B1 (en) Virtual reality rehabilitation system performed on social servers
KR102475093B1 (en) A System and Method for Provides Monitoring of Sexual Crimes within the Metaverse Platform

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20221110

Address after: No. 1417, Building 1, Qixin Constellation Apartment, 266 Guyuan Road, High tech Development Zone, Changsha City, Hunan Province, 410221

Patentee after: Hunan Yankrypton Technology Co.,Ltd.

Address before: 410000 floor 3, building 12, Xincheng Science Park, Yuelu District, Changsha City, Hunan Province

Patentee before: Hunan zhaowuxin Chain Technology Group Co.,Ltd.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20221220

Address after: No. 5, Xizhi Road, Yinqueshan Street, Lanshan District, Linyi City, Shandong Province 276002

Patentee after: Shandong Lancheng Guohua Hi Tech Co.,Ltd.

Address before: No. 1417, Building 1, Qixin Constellation Apartment, 266 Guyuan Road, High tech Development Zone, Changsha City, Hunan Province, 410221

Patentee before: Hunan Yankrypton Technology Co.,Ltd.