CN114780868B - Method and system for generating virtual avatar by user tag of metauniverse - Google Patents

Method and system for generating virtual avatar by user tag of metauniverse Download PDF

Info

Publication number
CN114780868B
CN114780868B CN202210689200.7A CN202210689200A CN114780868B CN 114780868 B CN114780868 B CN 114780868B CN 202210689200 A CN202210689200 A CN 202210689200A CN 114780868 B CN114780868 B CN 114780868B
Authority
CN
China
Prior art keywords
data
real user
user
virtual
identity information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210689200.7A
Other languages
Chinese (zh)
Other versions
CN114780868A (en
Inventor
柴舸洋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Tag Data Co ltd
Original Assignee
Shenzhen Tag Data Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Tag Data Co ltd filed Critical Shenzhen Tag Data Co ltd
Priority to CN202210689200.7A priority Critical patent/CN114780868B/en
Publication of CN114780868A publication Critical patent/CN114780868A/en
Application granted granted Critical
Publication of CN114780868B publication Critical patent/CN114780868B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/953Querying, e.g. by the use of web search engines
    • G06F16/9536Search customisation based on social or collaborative filtering
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/958Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/01Social networking

Landscapes

  • Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Data Mining & Analysis (AREA)
  • General Engineering & Computer Science (AREA)
  • Human Resources & Organizations (AREA)
  • Health & Medical Sciences (AREA)
  • Economics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • Tourism & Hospitality (AREA)
  • General Business, Economics & Management (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The application discloses a method and a system for generating a virtual avatar by a user tag of a meta universe, wherein the method comprises the following steps: receiving a data uploading request; verifying the identity information of the real user, and searching a virtual user corresponding to the real user in a virtual system after the identity information of the real user passes the verification, wherein the virtual system is a software system realized by using a computer; after the virtual user is found, replying a response message; acquiring data uploaded by the real user, and classifying the data to obtain the category of the data; and adjusting the attribute of the virtual user according to the category of the uploaded data and the data volume corresponding to each category. By the method and the device, the problem that the interaction between the metasma and the real world is lack due to the fact that no intersection exists between the attribute of the virtual character and the real user is solved, so that the attribute of the virtual user can be adjusted according to the contribution of the real user data, and the interaction between the metasma and the real world is increased.

Description

Method and system for generating virtual avatar by user tag of metauniverse
Technical Field
The application relates to the field of a metasuniverse, in particular to a method and a system for generating a virtual avatar by a user tag of the metasuniverse.
Background
With the development of technology, the metase (Metaverse) has been gradually implemented. From the technical point of view, the meta universe of technical significance includes a content system, a block chain system, a display system, an operating system, and finally presents as a 3D interface beyond the screen limit, and is considered as a new era after the PC era and the mobile era. The metasequoiy is simply a completely or incompletely virtual multi-person social world, and is not only a simple social entertainment, but also a server of a game, and a presentation of a financial platform and a real physical space.
In the prior art, the virtual character in the metastic universe only depends on information configured in the virtual world to determine the attribute of the virtual character, and the attribute of the virtual character does not have any intersection with the real user, which results in the lack of interaction between the metastic system and the real world.
Disclosure of Invention
The embodiment of the application provides a method and a system for generating a virtual avatar by using a user tag of a metasame, so as to at least solve the problem that the metasame and a real world lack interaction due to no intersection between the attribute of a virtual character and a real user.
According to an aspect of the present application, there is provided a method of generating a virtual avatar by a user tag of a metauniverse, comprising: receiving a data uploading request, wherein the data uploading request carries identity information of a real user; verifying the identity information of the real user, and searching a virtual user corresponding to the real user in a virtual system after the identity information of the real user passes the verification, wherein the virtual system is a software system realized by using a computer; after the virtual user is found, replying a response message, wherein the response message is used for indicating the real user to upload data; acquiring data uploaded by the real user, and classifying the data to obtain the category of the data; and adjusting the attribute of the virtual user according to the category of the uploaded data and the data volume corresponding to each category.
Further, verifying the identity information of the real user comprises: acquiring a hardware identifier of the intelligent device which sends the data uploading request, wherein the hardware identifier is used for uniquely identifying the intelligent device; acquiring first identity information which is prestored and corresponds to the hardware identifier according to the hardware identifier of the intelligent equipment; and judging whether the identity information of the real user is the same as the first identity information, if so, passing the verification, and if not, failing the verification.
Further, the acquiring the hardware identifier of the smart device sending the data upload request includes: sending an acquisition message to a source party of the data uploading request according to a source network address in the received data uploading request, wherein the acquisition message carries an authentication token, and the authentication token is configured in advance through an authentication server; and receiving a hardware identifier of the intelligent device of the source party, which is sent by the source party, wherein the hardware identifier is sent after the authentication token is sent to the authentication server by the source party for authentication.
Further, still include: extracting partial data from the data according to a preset condition to be used as first partial data; extracting a second part of data from the last uploaded data according to the preset condition to be used as a second part of data; combining the first part of data and the second part of data, and performing hash operation on the combined data to obtain a hash value; and taking the hash value as the identification information of the data, and storing the data and the identification information of the data.
Further, the categories of the data include: the physiological parameters of the real user, the behavior data of the real user, the social attribute information of the real user and the work information of the real user, wherein the behavior data comprises: the action track of the real user and/or the processing of the predetermined event by the real user, the social attribute information includes: the change of the associated person of the real user and the social identity of the real user, the work information: the real users publish text, audio and video on the network.
According to another aspect of the present application, there is also provided a system for generating a virtual avatar by a user tag of a metauniverse, comprising: the receiving module is used for receiving a data uploading request, wherein the data uploading request carries identity information of a real user; the searching module is used for verifying the identity information of the real user and searching a virtual user corresponding to the real user in a virtual system after the identity information of the real user passes the verification, wherein the virtual system is a software system realized by a computer; the reply module is used for replying a response message after the virtual user is found, wherein the response message is used for indicating the real user to upload data; the acquisition module is used for acquiring the data uploaded by the real user and classifying the data to obtain the category of the data; and the adjusting module is used for adjusting the attribute of the virtual user according to the category of the uploaded data and the data volume corresponding to each category.
Further, the lookup module is configured to: acquiring a hardware identifier of an intelligent device sending the data uploading request, wherein the hardware identifier is used for uniquely identifying the intelligent device; acquiring first identity information which is prestored and corresponds to the hardware identifier according to the hardware identifier of the intelligent equipment; and judging whether the identity information of the real user is the same as the first identity information, if so, passing the verification, and if not, failing the verification.
Further, the lookup module is configured to: sending an acquisition message to a source party of the data uploading request according to a source network address in the received data uploading request, wherein the acquisition message carries an authentication token, and the authentication token is configured in advance through an authentication server; and receiving a hardware identifier of the intelligent device of the source party, which is sent by the source party, wherein the hardware identifier is sent after the authentication token is sent to the authentication server by the source party for authentication.
Further, still include: the storage module is used for extracting partial data from the data according to a preset condition to be used as first partial data; extracting a second part of data from the last uploaded data according to the preset condition to serve as a second part of data; combining the first part of data and the second part of data, and performing hash operation on the combined data to obtain a hash value; and taking the hash value as the identification information of the data, and storing the data and the identification information of the data.
Further, the categories of the data include: the physiological parameters of the real user, the behavior data of the real user, the social attribute information of the real user and the work information of the real user, wherein the behavior data comprises: the action track of the real user and/or the processing of the predetermined event by the real user, the social attribute information includes: the change of the associated person of the real user and the social identity of the real user, the work information: text, audio and video published by the real user on the network.
In the embodiment of the application, a data uploading request is received, wherein the data uploading request carries identity information of a real user; verifying the identity information of the real user, and searching a virtual user corresponding to the real user in a virtual system after the identity information of the real user passes the verification, wherein the virtual system is a software system realized by using a computer; after the virtual user is found, replying a response message, wherein the response message is used for indicating the real user to upload data; acquiring data uploaded by the real user, and classifying the data to obtain the category of the data; and adjusting the attribute of the virtual user according to the category of the uploaded data and the data volume corresponding to each category. By the method and the device, the problem that the interaction between the metasma and the real world is lack due to the fact that no intersection exists between the attribute of the virtual character and the real user is solved, so that the attribute of the virtual user can be adjusted according to the contribution of the real user data, and the interaction between the metasma and the real world is increased.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this application, are included to provide a further understanding of the application, and the description of the exemplary embodiments of the application are intended to be illustrative of the application and are not intended to limit the application. In the drawings:
fig. 1 is a flow diagram of user tag generation of a metauniverse to generate an avatar according to an embodiment of the application.
Detailed Description
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the accompanying drawings in conjunction with embodiments.
It should be noted that the steps illustrated in the flowcharts of the figures may be performed in a computer system such as a set of computer-executable instructions and that, although a logical order is illustrated in the flowcharts, in some cases, the steps illustrated or described may be performed in an order different than presented herein.
In this embodiment, a method for generating an avatar by using a user tag of a metasma is provided, and fig. 1 is a flowchart for generating an avatar by using a user tag of a metasma according to an embodiment of the present application, and as shown in fig. 1, the flowchart includes the following steps:
step S102, receiving a data uploading request, wherein the data uploading request carries identity information of a real user;
step S104, verifying the identity information of the real user, and searching a virtual user corresponding to the real user in a virtual system after the identity information passes the verification, wherein the virtual system is a software system realized by a computer;
as an optional implementation manner, after the identity information of the real user is verified, the virtual user is searched according to the identity information of the real user, in the case that multiple virtual users are found, the attributes corresponding to the multiple virtual users are obtained, the adjustment time of each user attribute value in the multiple virtual users, which is the latest time, is determined, and the virtual user whose attribute value adjustment time is closest to the current time is taken as the virtual user corresponding to the real user.
Step S106, replying a response message after the virtual user is found, wherein the response message is used for indicating the real user to upload data;
step S108, acquiring the data uploaded by the real user, and classifying the data to obtain the category of the data, wherein different categories correspond to different user tags;
as another embodiment that can be added, the data is uploaded after being encrypted, and the encrypted data is decrypted after the encrypted data of the real user is obtained, where encrypting the data includes: converting the identity information of the real user according to a predetermined algorithm (for example, exchanging the first 8 bits and the last 8 bits of the identity information) to obtain converted identity information, acquiring a timestamp of the current time, connecting the converted identity information with the timestamp to generate a first character string, and encrypting the data for the first time by using the first character string; acquiring a hardware identifier of the intelligent device sending the data uploading request and identification information of the virtual user, connecting the hardware identifier and the identification information of the virtual user into a second character string, encrypting the data obtained by the first encryption by using the second character string for the second time, uploading the data after the second encryption, and during decryption, firstly decrypting by using the second character string, and then decrypting by using the first character string to obtain the data uploaded by the real user.
The categories of data may be classified into various categories according to the actual implementation, for example, the categories of data include: the real user physiological parameters, the real user behavior data, the real user social attribute information and the real user work information, wherein the behavior data comprises: the action track of the real user and/or the processing of the predetermined event by the real user, the social attribute information includes: the change of the associated person of the real user and the social identity of the real user, the work information: text, audio and video published by the real user on the network.
As an added embodiment, sending a confirmation message to the real user, wherein the confirmation message is used for inquiring whether the real user allows to grab the content published by the real user on the network, wherein the content comprises text, audio and video; after receiving reply information which is sent by the real user and agrees to capture, capturing content published by the real user on the network according to the identity information of the real user; extracting and analyzing the content published by the real user to obtain the change of the physiological parameters of the real user, the behavior data of the real user and the change of the social attribute information of the real user, and sending the extracted and analyzed content to the real user; and after receiving the fact that the real user agrees to upload the extracted and analyzed content, uploading the extracted and analyzed content as the data.
And step S110, adjusting the attribute of the virtual user according to the category of the uploaded data and the data volume corresponding to each category.
As another embodiment that can be added, a corresponding relationship between a category of data and an attribute value of a virtual user is configured in advance, where one attribute value corresponds to multiple categories, a weight value is configured for each category in the multiple categories corresponding to one attribute value, and a contribution value corresponding to the category is determined according to a ratio of a data amount of each category in data uploaded this time to a data amount of the category that has been uploaded, where a higher ratio corresponds to a larger contribution value; weighting the contribution value and the weight value of a plurality of categories corresponding to one attribute value to obtain the adjustment quantity corresponding to the attribute value, and adjusting the attribute of the virtual user according to the adjustment quantity.
As another possible added embodiment, each attribute of the virtual user is divided into two parts, the attribute value of the first part of the two parts is adjusted through the data uploaded by the real user, and the attribute value of the second part of the two parts is adjusted at least according to the activity of the virtual user in the virtual system; and adjusting the first part of the attribute of the virtual user according to the category of the uploaded data and the data volume corresponding to each category.
Configuring an upper limit value for adjusting the first part of the attribute of the virtual user each time, and if the upper limit value is exceeded by one-time adjustment, adjusting the second part of the attribute of the virtual user according to the part exceeding the upper limit value.
Through the steps, the problem that the interaction between the metasma and the real world is lack due to the fact that no intersection exists between the attribute of the virtual character and the real user is solved, so that the attribute of the virtual user can be adjusted according to the contribution of the real user data, and the interaction between the metasma and the real world is increased.
The generation of the virtual user can be generated according to data collected from a real user, the real user wears VR glasses, and the attention of the real user to the content displayed on the VR glasses screen can be acquired through the VR glasses, wherein the attention is used for identifying the stay time of the content of the real user on the VR glasses screen, and if the stay time exceeds the preset time, the content displayed on the VR glasses screen is recorded and identified. User data of the real user uploaded by the real user can also be acquired. Other users who interact with the real user can be obtained through the VR glasses, and therefore the user network of the real user is established according to the other users who interact with the real user.
And generating a virtual user corresponding to the real user according to the user data, the content corresponding to the attention of the user and the user network. In another embodiment, the method may further include obtaining a text published by the real user in the network, where the text includes a published article and an evaluation on a predetermined network content, extracting a keyword and a sentence according to the text published by the real user in the network, establishing a relationship between the keyword and the sentence and the article and the predetermined network content, inputting the established relationship into a machine learning model, and training to obtain a machine learning model corresponding to the real user, where the machine learning model is used for interacting with other virtual users in the virtual network.
In the above step, a real user may be associated with hardware, and in this embodiment, verifying the identity information of the real user includes: acquiring a hardware identifier of the intelligent device which sends the data uploading request, wherein the hardware identifier is used for uniquely identifying the intelligent device; acquiring first identity information which is pre-stored and corresponds to the hardware identifier according to the hardware identifier of the intelligent device; and judging whether the identity information of the real user is the same as the first identity information or not, if so, passing the verification, and if not, failing the verification.
In order to prevent illegal acquisition of the hardware identifier, an authentication server can be introduced, and whether the acquired hardware identifier is legal or not can be determined through the authentication server. In this manner, obtaining the hardware identifier of the smart device that sends the data upload request includes: sending an acquisition message to a source party of a data uploading request according to a source network address in a received data uploading request, wherein the acquisition message carries an authentication token, and the authentication token is configured in advance through an authentication server; and receiving a hardware identifier of the intelligent device of the source party, which is sent by the source party, wherein the hardware identifier is sent after the authentication token is sent to the authentication server by the source party for authentication.
After the data is acquired, the data may be further stored, and when the data is stored, in order to prevent the data from being tampered and establish a corresponding relationship between the uploaded data this time and the uploaded data last time, the method may further include: extracting partial data from the data according to a preset condition to be used as first partial data; extracting a second part of data from the last uploaded data according to the preset condition to serve as a second part of data; combining the first part of data and the second part of data, and performing hash operation on the combined data to obtain a hash value; and taking the hash value as the identification information of the data, and storing the data and the identification information of the data.
In the above steps, a smart device is involved, and the smart device may be a VR device, and an alternative embodiment of the VR device is described below.
The Virtual Reality (VR) device comprises power amplifier equipment, image equipment and VR terminal equipment, wherein the power amplifier equipment and the image equipment are combined to form a virtual scene; a virtual sound source identification module is arranged in the power amplifier equipment and used for identifying the type of sound in a virtual scene emitted by the power amplifier equipment; the power amplifier equipment is internally provided with an audio control module for controlling the output intensity of power amplifier sound; a loudness identification module is arranged in the power amplifier equipment and used for identifying and recording the intensity of sound in a virtual scene emitted by the power amplifier; the distance measuring unit is used for measuring the distance from the sound in the virtual scene to the VR terminal equipment terminal according to the loudness attenuation between the loudness identification module and the loudness comparison module; the image focusing module is arranged in the image equipment and used for controlling the projection distance of the image equipment; the image equipment is internally provided with an image identification module and a real scene reference module, the image identification module is used for identifying images in a virtual scene, and the real scene reference module is used as a reference object of the images in the virtual scene; a loudness comparison module is arranged in the VR terminal equipment and used for detecting the loudness of sound heard by an experiencer; a distance measuring unit is arranged in the loudness identification module and used for measuring the distance from the sound in the virtual scene to the VR terminal equipment terminal according to the loudness attenuation between the loudness identification module and the loudness comparison module; and a distance comparison module is arranged between the distance measuring unit and the distance measuring and calculating unit and is used for comparing the distance analysis results between the distance measuring unit and the distance measuring and calculating unit.
Optionally, the VR terminal device is electrically connected to the audio control module, and is configured to control the sound output intensity of the power amplifier device through the audio control signal. The virtual sound source identification modules are multiple and are used for detecting and identifying different sounds output by the power amplifier equipment respectively. The loudness identification module has a plurality of, is arranged in the VR terminal equipment that the experience person wore, and is corresponding with the virtual sound source module.
Optionally, the image identified by the image identification module corresponds to the sound source detected by the virtual sound source identification module, and the distance comparison analysis module is electrically connected with the image focusing module.
When the VR device is used, the VR device can comprise the following operation steps: s1, the experiencer wears VR terminal equipment, starts the video equipment and the power amplifier equipment, and in a virtual scene of the journey within the visual range of the experiencer, the output intensity of power amplifier sound can be adjusted by using the audio control module, so that the power amplifier sound is suitable for the auditory experience of the experiencer; s2, when the virtual scene runs, detecting the sound of the virtual scene by using a virtual sound source identification module so as to simulate and detect the position of a virtual sound source in the virtual scene; s3, detecting the sound emitted by the power amplifier by using the loudness identification module, detecting the loudness received by the experiencer by using the loudness comparison module, comparing the detected loudness of the sound with the loudness of the sound in the loudness comparison module, and determining the attenuation of the loudness of the sound; s4, measuring the distance between the virtual sound source and the experiencer in the virtual scene according to the attenuation quantity of the sound loudness in S3; s5, capturing and identifying the image of the virtual scene in the video equipment by using the image identification module, and comparing the image with the reference object in the real scene reference module by using the image comparison analysis module; s6, calculating and calculating the visual sense distance between the image in the virtual scene and the experience person according to the comparison result between the image in the virtual scene identified by the image identification module in S5 and the reference object in the real scene reference module; s7, measuring and calculating a visual sense distance between an image and an experiencer in a virtual scene by utilizing S6, namely the size of L, comparing the distance S between a virtual sound source in the virtual scene and the experiencer with the visual sense distance L between the image in a simulated scene and the experiencer, when the deviation between L and S is in an allowable deviation range, indicating that the projection distance of the image in the virtual scene is suitable for the visual sense of the experiencer, and when the deviation between L and S exceeds the allowable deviation range, indicating that the projection distance of the image in the virtual scene is not matched with the visual sense distance of the experiencer; and S8, when the projection distance of the image in the virtual scene is not matched with the visual sense distance of the experiencer, the image focusing module controls the image equipment to adjust the image in the virtual scene until the projection distance of the image in the virtual scene is suitable for the visual sense of the experiencer.
Optionally, the position of the virtual sound source in S2 is the position from which sound perceived by the experiencer in the virtual scene is emitted.
Optionally, the projection angle of the image identified in the virtual scene in S6 is an included angle between the size of the image identified in the virtual scene and the position where the image is located in the virtual scene, and between the size of the image in the real scene and the position where the image is located in the experiencer, and a line connecting the highest points of the two images is in the horizontal direction, where the image identified in the virtual scene and the central point of the real image at the position of the experiencer are on the same horizontal line.
Of course, the intelligent device may also be other devices, such as a communication device such as a mobile terminal, and details thereof are not repeated herein.
In this embodiment, an electronic device is provided, comprising a memory in which a computer program is stored and a processor configured to run the computer program to perform the method in the above embodiments.
The programs described above may be run on a processor or may also be stored in memory (or referred to as computer-readable media), which includes both non-transitory and non-transitory, removable and non-removable media, that implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
These computer programs may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks, and corresponding steps may be implemented by different modules.
Such an apparatus or system is provided in this embodiment. The system is called a system for generating a virtual avatar by a user tag of a metauniverse, and comprises: the receiving module is used for receiving a data uploading request, wherein the data uploading request carries identity information of a real user; the searching module is used for verifying the identity information of the real user and searching a virtual user corresponding to the real user in a virtual system after the identity information of the real user passes the verification, wherein the virtual system is a software system realized by a computer; the reply module is used for replying a response message after the virtual user is found, wherein the response message is used for indicating the real user to upload data; the acquisition module is used for acquiring the data uploaded by the real user and classifying the data to obtain the category of the data; and the adjusting module is used for adjusting the attribute of the virtual user according to the category of the uploaded data and the data volume corresponding to each category.
The system or the apparatus is configured to implement the functions of the method in the foregoing embodiments, and each module in the system or the apparatus corresponds to each step in the method, which has been already described in the method, and is not described again here.
For example, the lookup module is configured to: acquiring a hardware identifier of the intelligent device which sends the data uploading request, wherein the hardware identifier is used for uniquely identifying the intelligent device; acquiring first identity information which is prestored and corresponds to the hardware identifier according to the hardware identifier of the intelligent equipment; and judging whether the identity information of the real user is the same as the first identity information, if so, passing the verification, and if not, failing the verification.
Optionally, the lookup module is configured to: sending an acquisition message to a source party of the data uploading request according to a source network address in the received data uploading request, wherein the acquisition message carries an authentication token, and the authentication token is configured in advance through an authentication server; and receiving a hardware identifier of the intelligent device of the source party, which is sent by the source party, wherein the hardware identifier is sent after the authentication token is sent to the authentication server by the source party for authentication.
For another example, the system may further include: the storage module is used for extracting partial data from the data according to a preset condition to be used as first partial data; extracting a second part of data from the last uploaded data according to the preset condition to be used as a second part of data; combining the first part of data and the second part of data, and performing hash operation on the combined data to obtain a hash value; and taking the hash value as the identification information of the data, and storing the data and the identification information of the data.
Optionally, the categories of data include: the physiological parameters of the real user, the behavior data of the real user, the social attribute information of the real user and the work information of the real user, wherein the behavior data comprises: the action track of the real user and/or the processing of the predetermined event by the real user, the social attribute information includes: the change of the associated person of the real user and the social identity of the real user, the work information: the real users publish text, audio and video on the network.
By the embodiment, the problem that the interaction between the metasma and the real world is lack due to the fact that no intersection exists between the attribute of the virtual character and the real user is solved, so that the attribute of the virtual user can be adjusted according to the contribution of the real user data, and the interaction between the metasma and the real world is increased.
The above are merely examples of the present application and are not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (8)

1. A method of generating a virtual avatar from a user tag of a metasma, comprising:
receiving a data uploading request, wherein the data uploading request carries identity information of a real user;
verifying the identity information of the real user, and searching a virtual user corresponding to the real user in a virtual system after the identity information of the real user passes the verification, wherein the virtual system is a software system realized by using a computer; verifying the identity information of the real user comprises: acquiring a hardware identifier of the intelligent device which sends the data uploading request, wherein the hardware identifier is used for uniquely identifying the intelligent device; acquiring first identity information which is prestored and corresponds to the hardware identifier according to the hardware identifier of the intelligent equipment; judging whether the identity information of the real user is the same as the first identity information or not, if so, passing the verification, and if not, failing the verification;
after the virtual user is found, replying a response message, wherein the response message is used for indicating the real user to upload data;
acquiring data uploaded by the real user, and classifying the data to obtain the category of the data; uploading the encrypted data, and decrypting the encrypted data after acquiring the encrypted data of the real user, wherein encrypting the data comprises: converting the identity information of the real user according to a predetermined algorithm to obtain converted identity information, acquiring a timestamp of the current time, connecting the converted identity information with the timestamp to generate a first character string, and encrypting the data for the first time by using the first character string; acquiring a hardware identifier of intelligent equipment sending the data uploading request and identification information of the virtual user, connecting the hardware identifier and the identification information of the virtual user into a second character string, encrypting the data obtained by the first encryption by using the second character string for the second time, uploading the data after the second encryption, and decrypting by using the second character string and then decrypting by using the first character string to obtain the data uploaded by the real user during decryption;
and adjusting the attribute of the virtual user according to the category of the uploaded data and the data volume corresponding to each category.
2. The method of claim 1, wherein obtaining a hardware identification of a smart device sending the data upload request comprises:
sending an acquisition message to a source party of the data uploading request according to a source network address in the received data uploading request, wherein the acquisition message carries an authentication token, and the authentication token is configured in advance through an authentication server;
and receiving a hardware identifier of the intelligent device of the source party, which is sent by the source party, wherein the hardware identifier is sent after the authentication token is sent to the authentication server by the source party for authentication.
3. The method of claim 1, further comprising:
extracting partial data from the data according to a preset condition to be used as first partial data;
extracting a second part of data from the last uploaded data according to the preset condition to be used as a second part of data;
combining the first part of data and the second part of data, and performing hash operation on the combined data to obtain a hash value;
and taking the hash value as the identification information of the data, and storing the data and the identification information of the data.
4. The method of any of claims 1 to 3, wherein the categories of data comprise: the physiological parameters of the real user, the behavior data of the real user, the social attribute information of the real user and the work information of the real user, wherein the behavior data comprises: the action track of the real user and/or the processing of the predetermined event by the real user, the social attribute information includes: the change of the associated person of the real user and the social identity of the real user, the work information: text, audio and video published by the real user on the network.
5. A system for generating a virtual avatar from a user tag of a universe, comprising:
the receiving module is used for receiving a data uploading request, wherein the data uploading request carries identity information of a real user;
the searching module is used for verifying the identity information of the real user and searching a virtual user corresponding to the real user in a virtual system after the identity information of the real user passes the verification, wherein the virtual system is a software system realized by a computer; verifying the identity information of the real user comprises: acquiring a hardware identifier of the intelligent device which sends the data uploading request, wherein the hardware identifier is used for uniquely identifying the intelligent device; acquiring first identity information which is prestored and corresponds to the hardware identifier according to the hardware identifier of the intelligent equipment; judging whether the identity information of the real user is the same as the first identity information or not, if so, passing the verification, and if not, failing the verification;
the reply module is used for replying a response message after the virtual user is found, wherein the response message is used for indicating the real user to upload data;
the acquisition module is used for acquiring the data uploaded by the real user and classifying the data to obtain the category of the data; uploading the encrypted data, and decrypting the encrypted data after acquiring the encrypted data of the real user, wherein encrypting the data comprises: converting the identity information of the real user according to a predetermined algorithm to obtain converted identity information, acquiring a timestamp of the current time, connecting the converted identity information with the timestamp to generate a first character string, and encrypting the data for the first time by using the first character string; acquiring a hardware identifier of intelligent equipment sending the data uploading request and identification information of the virtual user, connecting the hardware identifier and the identification information of the virtual user into a second character string, encrypting the data obtained by the first encryption by using the second character string for the second time, uploading the data after the second encryption, and decrypting by using the second character string and then decrypting by using the first character string to obtain the data uploaded by the real user during decryption;
and the adjusting module is used for adjusting the attribute of the virtual user according to the category of the uploaded data and the data volume corresponding to each category.
6. The system of claim 5, wherein the lookup module is configured to:
sending an acquisition message to a source party of the data uploading request according to a source network address in the received data uploading request, wherein the acquisition message carries an authentication token, and the authentication token is configured in advance through an authentication server;
and receiving a hardware identifier of the intelligent device of the source party, which is sent by the source party, wherein the hardware identifier is sent after the authentication token is sent to the authentication server by the source party for authentication.
7. The system of claim 5, further comprising:
the storage module is used for extracting partial data from the data according to a preset condition to be used as first partial data; extracting a second part of data from the last uploaded data according to the preset condition to be used as a second part of data; combining the first part of data and the second part of data, and performing hash operation on the combined data to obtain a hash value; and taking the hash value as the identification information of the data, and storing the data and the identification information of the data.
8. The system of any of claims 5 to 7, wherein the categories of data include: the real user physiological parameters, the real user behavior data, the real user social attribute information and the real user work information, wherein the behavior data comprises: the action track of the real user and/or the processing of the predetermined event by the real user, the social attribute information includes: the change of the associated person of the real user and the social identity of the real user, the work information: text, audio and video published by the real user on the network.
CN202210689200.7A 2022-06-17 2022-06-17 Method and system for generating virtual avatar by user tag of metauniverse Active CN114780868B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210689200.7A CN114780868B (en) 2022-06-17 2022-06-17 Method and system for generating virtual avatar by user tag of metauniverse

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210689200.7A CN114780868B (en) 2022-06-17 2022-06-17 Method and system for generating virtual avatar by user tag of metauniverse

Publications (2)

Publication Number Publication Date
CN114780868A CN114780868A (en) 2022-07-22
CN114780868B true CN114780868B (en) 2022-09-13

Family

ID=82422148

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210689200.7A Active CN114780868B (en) 2022-06-17 2022-06-17 Method and system for generating virtual avatar by user tag of metauniverse

Country Status (1)

Country Link
CN (1) CN114780868B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115426183B (en) * 2022-09-01 2024-04-12 中国联合网络通信集团有限公司 Identity authentication method, device, equipment and computer readable medium
CN115442123B (en) * 2022-09-01 2024-04-30 中国联合网络通信集团有限公司 Real-name authentication method, device, electronic equipment and computer readable medium
CN115544475A (en) * 2022-09-19 2022-12-30 京东方科技集团股份有限公司 Business service method and device
CN116088685A (en) * 2023-02-06 2023-05-09 武汉元一宇宙控股集团股份有限公司 Meta universe information interaction control system
CN116091007B (en) * 2023-03-06 2023-07-21 北京黑油数字展览股份有限公司 Office method and system based on meta universe and electronic equipment
CN117319441B (en) * 2023-09-27 2024-05-24 北京新知元浪网络科技有限公司 Remote interaction method and system of meta universe
CN117744051A (en) * 2023-12-21 2024-03-22 江苏云工场信息技术有限公司 Digital person identity right-determining method

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109091873A (en) * 2018-08-01 2018-12-28 西咸新区沣西新城小渣信息科技有限公司 The interactive approach of virtual portrait
CN114047817A (en) * 2021-10-15 2022-02-15 中邮通建设咨询有限公司 Meta universe virtual reality VR interactive system

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8424065B2 (en) * 2009-11-25 2013-04-16 International Business Machines Corporation Apparatus and method of identity and virtual object management and sharing among virtual worlds
US20170189815A1 (en) * 2016-01-05 2017-07-06 Acshun, Inc. Wearable activity tracking systems and technology
WO2021041746A1 (en) * 2019-08-27 2021-03-04 Mshift, Inc. Stable digital token processing and encryption on blockchain

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109091873A (en) * 2018-08-01 2018-12-28 西咸新区沣西新城小渣信息科技有限公司 The interactive approach of virtual portrait
CN114047817A (en) * 2021-10-15 2022-02-15 中邮通建设咨询有限公司 Meta universe virtual reality VR interactive system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于真实感约束的VR虚拟人物图形生成方法改进研究;覃海宁;《无线互联科技》;20170525(第10期);第141-146页 *

Also Published As

Publication number Publication date
CN114780868A (en) 2022-07-22

Similar Documents

Publication Publication Date Title
CN114780868B (en) Method and system for generating virtual avatar by user tag of metauniverse
EP3734489B1 (en) Evidence collection method and system based on blockchain evidence storage
JP7082569B2 (en) Two-dimensional code processing method and equipment
CN108197891B (en) Electronic signing device and method based on block chain
KR102444777B1 (en) Routing messages by message parameter
CN106878108B (en) Network flow playback test method and device
CN116506217A (en) Analysis method, system, storage medium and terminal for security risk of service data stream
CN114846465A (en) Authenticity assessment of modified content
CN106650495A (en) File verification method and device
CN113961940B (en) Override detection method and device based on authority dynamic update mechanism
CN108769749A (en) A kind of determining method, client and server for stealing brush data
CN112883425B (en) Block chain-based data processing method and block chain link point
US20210099772A1 (en) System and method for verification of video integrity based on blockchain
CN113791750A (en) Virtual content display method and device and computer readable storage medium
KR20210035757A (en) System and method for verification of video integrity based on blockchain
CN113518061B (en) Data transmission method, equipment, device, system and medium in face recognition
CN113704656A (en) Webpage display method, device, equipment and storage medium
CN114422856B (en) Video data verification method, device, equipment and storage medium
KR20170007159A (en) Central server and method for trading personal data
CN112434327A (en) Information protection method and device and electronic equipment
CN107172092A (en) Facility information guard method and device
CN109255596B (en) Method and device for getting password red envelope
CN114827731B (en) Advertisement delivery system and advertisement delivery method
TWI759838B (en) A graphical code generation method, apparatus, mobile device, service platform, and computer-readable storage medium
KR102636732B1 (en) Electronic apparatus for supporting transaction of non-fungible token for replacing original no longer existing, and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant