CN114840826A - Virtual identity generation method based on meta universe - Google Patents

Virtual identity generation method based on meta universe Download PDF

Info

Publication number
CN114840826A
CN114840826A CN202210352576.9A CN202210352576A CN114840826A CN 114840826 A CN114840826 A CN 114840826A CN 202210352576 A CN202210352576 A CN 202210352576A CN 114840826 A CN114840826 A CN 114840826A
Authority
CN
China
Prior art keywords
identity
virtual
user
conversion
card
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210352576.9A
Other languages
Chinese (zh)
Inventor
王磊
徐兵
兰春嘉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Neng Lian Tech Ltd
Original Assignee
Neng Lian Tech Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Neng Lian Tech Ltd filed Critical Neng Lian Tech Ltd
Priority to CN202210352576.9A priority Critical patent/CN114840826A/en
Publication of CN114840826A publication Critical patent/CN114840826A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Abstract

The invention provides a virtual identity generating method of a metacavity, which comprises a virtual identity generating and managing process and a using process of how a user uses and records a virtual identity.

Description

Virtual identity generation method based on meta universe
Technical Field
The invention relates to the field of identity application of computers, in particular to a virtual identity generation method based on a metauniverse.
Background
The concept of virtualization differentiation is often used in the meta universe, that is, a user in the real world will have one or more ID identities in the meta universe, and the identities have the characteristics of consistency, strong substitution sense and the like. The user can customize the exclusive virtual image according to the preference of the user, and the skin, the characteristics and the like of the image can lead the user to generate unique feeling and substitution feeling. Users often have more than one virtual identity, and how to efficiently manage and generate the virtual identity of the user is one of the current research breakthrough points. This is not only related to the efficient use of virtual identities in the meta universe, but also to how administrators can assist users in producing the desired virtual identities in bulk.
Disclosure of Invention
In view of the above, the present invention provides a method for generating a virtual identity based on a metasma, which solves or partially solves the above-mentioned problems;
in order to achieve the effect of the technical steps, the technical steps of the invention are as follows: the virtual identity generation method provided by the invention comprises the steps of constructing a virtual identity converter, an analog identity pile and an identity record file; the virtual identity converter is used for controlling the generation of the virtual identity of the user; the simulation identity stake is used as a carrier of a virtual identity card when a user performs virtual identity conversion; the identity record file is used for recording the virtual identity information of each user;
the virtual identity card is used for explaining the real identity of each user, when the user passes the authentication in the authentication area, the authentication area is responsible for forging one virtual identity card, the storage information of the user and the grade of the user are sealed and stored on the virtual identity card, and the maximum times that the virtual identity card can be inserted into the identity slot stack and the maximum time that the virtual identity card exists in the identity slot stack are set according to the grade of the user; when a user applies for inserting the virtual identity card into the identity slot stack, deducting once at most times of the identity slot stack, starting to calculate the time of inserting the virtual identity card into the identity slot stack, and then deducting the time of inserting the virtual identity card into the identity slot stack from the longest time of the virtual identity card existing in the identity slot stack; after the longest time that the virtual identity card exists in the identity slot stack is less than T, the user is not allowed to carry out identity conversion; the authentication area is used for manufacturing a virtual identity card after authenticating the identity of the user; t is a time period with the unit of second set by an administrator, and the virtual identity card is used for linking real identity information of the user;
Covering a validity period on the virtual identity card in the authentication area, wherein the validity period is used for explaining a valid time interval of the user identity; the storage information of the user records the address of the real information of the user stored in the private block chain, the private block chain can be checked only by an administrator within a determined time, and the storage information of the user is used for explaining the storage condition of the real identity information of the user; the simulation identity pile is a simulation virtual cylinder, the simulation identity pile is provided with annular grooves, the annular grooves are spirally distributed on the simulation identity pile from top to bottom, the annular grooves are used as carriers of identity slot stacks, the annular grooves are provided with more than one identity slot stacks, and the identity slot stacks are used for placing more than one virtual identity cards; the user applies for identity conversion in advance, and after the user passes the application, the administrator sets the effective state of the virtual identity card on the identity slot stack to be 1, so that the virtual identity card is effective; when the identity conversion is finished, the valid state of the virtual identity card is set to be 0, which indicates that the virtual identity card is invalid; the method comprises the steps that an administrator counts the number of virtual identity cards with an effective state of 1 in an identity slot stack, and when at least one virtual identity card with an effective state of 1 exists in the identity slot stack, the conversion state of the identity slot stack is 1; the conversion state is used for explaining that a virtual identity card with an effective state of 1 is inserted into the identity slot stack; the effective state is used for indicating that the user who owns the virtual identity card needs to convert the identity;
The administrator can set the maximum number of virtual identity cards which are in an effective state on the identity slot in advance; virtual coordinates exist on the simulated identity piles in the identity slot stacks, and the virtual coordinates are used for explaining the positions in the identity slot stacks; the virtual coordinate is set to be (h, theta), wherein h is the height of the identity slot stack in the simulated identity pile and is an absolute parameter, the absolute parameter is used for explaining a parameter with an unchangeable value, and theta is an angle deviation value and is an angle for converting the identity conversion pointing tangent plane to the identity slot; clockwise rotation theta of the simulation identity pile is a positive value, and anticlockwise rotation theta of the simulation identity pile is a negative value; theta is expressed by 32-bit double type number and IEEE745 double precision; theta is a relative parameter, the relative parameter is used for explaining a parameter of which the value can change along with the change of the identity conversion pointing section, the identity conversion pointing section is used for explaining the position of a simulated identity card needing identity conversion on the simulated identity pile, and all virtual identity cards of which the identity conversion pointing section points to the annular groove on the simulated identity pile and the effective state is 1 can carry out identity conversion;
identity conversion is carried out by a virtual identity converter, a central shaft of an analog identity pile is unchanged, the analog identity pile rotates around the central shaft clockwise or anticlockwise, virtual identity cards with the effective states of 1 in all annular grooves pointed by an identity conversion section carry out identity conversion, a user carrying out identity conversion for the first time is converted into nodes, the nodes are converted into virtual identities during identity conversion, the user can set nicknames, roles and effective periods of the virtual identities in advance, the effective periods are the effective periods of the virtual identities of the nodes, and the effective periods of the virtual identities of the nodes must be in the effective periods of the virtual identity cards;
The user has a virtual identity card, can carry out identity conversion more than once and has more than one virtual identity; before each identity conversion, an identity conversion open period is set, and the identity conversion open period is used for explaining the time that a user can apply for the identity conversion;
the administrator selects the direction of identity conversion by taking the identity conversion pointing to a tangent plane as a rotating initial position, the clockwise 90-degree range is a clockwise range, the anticlockwise 90-degree range is an anticlockwise range, the clockwise range is used for explaining whether the simulation identity pile rotates clockwise and selecting the range on the simulation identity pile, and the anticlockwise range is used for explaining whether the simulation identity pile rotates anticlockwise and selecting the range on the simulation identity pile; respectively extracting N identity slot stacks in a clockwise range and an anticlockwise range by an administrator, wherein N is a natural number, counting the number of virtual identity cards with an effective state of 1 in the extracted identity slot stacks, subtracting the number of the virtual identity cards with an effective state of 1 in the anticlockwise range from the number of the virtual identity cards with an effective state of 1 in the clockwise range, and selecting clockwise rotation in the direction of identity conversion when CF is 0 and selecting anticlockwise rotation in the direction of identity conversion when CF is 1 according to the comparison of the values of the flag bits; the simulation identity pile rotates according to the direction of identity conversion, the identity conversion points to the identity slot stacks with the same theta value, at least one identity slot stack with a conversion state of 1 exists at the position pointed by the identity conversion section, and the virtual identity card with the pointed conversion state of 1 is converted; the direction of identity conversion is used for explaining the direction of the rotation of the simulation identity pile during identity conversion;
After the user generates the virtual identities, the number of the virtual identities simultaneously owned by the user is M, the identity recording file comprises an identity recording head, a reserved space, an active space, more than one virtual identity entry and an identity description table, the identity recording head is arranged at the beginning of the identity recording file, the identity recording head comprises a file identification code, information of a virtual identity card, an identity description pointer and a storage mode, and the identity recording head is used for describing basic information of the identity recording file; the file identification code is used for identifying the identity recording file and is 8 hexadecimal numbers, as long as the file identification code in the identity recording head is read, an administrator confirms the file as the identity recording file, the information of the virtual identity card is the public key address of the virtual identity card, the identity description needle stores the address of the identity description table beginning in the identity recording file, and the identity description needle is used for describing the position of the identity description table; the initial address of the identity recording file is 0, the storage mode is a minimum data unit for storing the identity recording file, the data storage is in a small-end mode or a large-end mode, when the minimum data unit for storing the identity recording file is used for explaining that data in the identity recording file is stored, the minimum separation unit of the data, an identity recording head, a reserved space, an active space, more than one virtual identity item and a data space occupied by an identity description table are necessarily multiples of the minimum data unit for storing the identity recording file; m is a natural number, and the value of M is set by an administrator; the reserved space is a reserved storage space of the identity recording file, the active space is used for explaining the record of using the virtual identity by the user, the starting address of the active space is specified by the user, and the active space is stored in a descending manner from a high address to a low address;
The user uses the record of the virtual identity to contain the index code of the virtual identity and the time interval of the virtual identity, the time intervals of the default virtual identity are not intersected, the value of the minimum data unit stored in the identity recording file is subtracted from the identity instruction needle to be used as the starting address of the virtual identity entry, the virtual identity entry is stored in a descending manner from the high address to the low address, the virtual identity entry contains the index code of the virtual identity of the user, the nickname, the role and the valid period of the virtual identity, and the virtual identity entry is used for describing the information of each virtual identity of the user; the index code, the starting address and the occupied space of each virtual identity item are described in an identity description table, and the identity description table is used for managing the information of the virtual identity items of the user in an identity record file; the user selects to use the virtual identity, and then the virtual identity is mapped to the virtual identity item through the identity description table, and the information of using the virtual identity is recorded in the activity space.
The beneficial results of the invention are as follows: the virtual identity generating method based on the metasma comprises the steps of generating and managing virtual identities, recording the use of the virtual identities by using users, generating the virtual identities of the users in batches, wherein the users can have a plurality of virtual identities and own private identity record lists, and limiting the virtual identity conversion permission of the users.
Detailed Description
In order to make the technical problems, technical steps and advantageous effects of the present invention more apparent, the present invention will be described in detail with reference to the following embodiments. It should be noted that the specific embodiments described herein are only for illustrating the present invention and are not to be construed as limiting the present invention, and the equivalent substitutions and modifications of the products that can achieve the same functions are included in the scope of the present invention. The specific method comprises the following steps:
example 1: the meta universe currently has no clear, accepted definition as a concept that has just begun to prevail this year. Today the mainstream definition considers the metaspace to be a set of virtual time spaces, which is composed of a series of Augmented Reality (AR), Virtual Reality (VR) and Internet (Internet). Through AR, VR, 5G, artificial intelligence, wearable companion hardware facilities, etc., people can create new universes and civilizations in the meta universe. The meta universe is also known as "internet 3.0" or "post internet era", meaning that the virtual world is about to become the "parallel universe" of the real world. The metastic universe is not an independent world, but a world closely linked and complementary to the real world. In a virtual world with perfect infrastructure, people can realize personal and social requirements such as identity acceptance, currency transaction, professional development and the like in all directions as in a real world. It can be said that the metas is a very general and summarized word. The method not only contains the imagination of human beings to the future scientific and technological society to a certain extent, but also integrates a plurality of popular technologies and industries. This is why, in view of many skilled artisans, the concept of metastables is propagated exponentially, which is necessary in every field.
The recognition and identification of indicia or characteristics of variability among individuals by members of a society in interactive interactions was the first definition of the concept of identity in human society. The self-identity gives the human society relatively stable order and stable structure, is a mark and a name specific to members existing in a group, is used for judging the basic information and the rank status of individuals, and can also be regarded as relationship positioning of inter-individual connection and interaction. The identity of a person in a real society is subject to subjective factors such as age, gender, position, character, preferences, etc., and these determining factors are usually fixed and not modifiable at will. The social identity of a person who exists in a social relationship as a non-independent individual is to a large extent given that social norms, moral awareness, behavioral guidelines must be followed while corresponding duties and obligations are fulfilled. In the real society, the identity becomes the basic standard for determining the status of people, the size of rights and the degree of obligation, and the obtaining of higher identity means obtaining the status and gaining the honor, so the identity becomes the fundamental element for determining the status, the grade and other differences between people, is considered as the concrete embodiment of unfairness and inequality among individuals, and is the most direct and effective tool for maintaining the level and the feeling of separation among individuals.
In the new media era, people build a prosperous and prosperous internet virtual society by taking a network platform as a support. In this very specific society, a wide and huge variety of application services and the vast number of people with different personalities form the fundamental element of the internet, and in this way of communication with digital codes instead of real languages, expressions and emotions, people appear as anonymous, mobile, virtual identities. The premise of participating in network interactive communication is that people need to freely and randomly reconstruct the basic information of themselves and hide the character characteristics of parts, and one or more online virtual identities, namely network ID symbols, which are expected to be displayed and presented to others are freely established by utilizing freely-expanded symbol tools, such as texts, images, videos and the like, so that multiple aspects and multiple levels of self-display can be realized. On the brand-new network platform, people use virtual identities to experience an unprecedented novelty. However, it should be noted that although the construction and use of the network virtual identity presents relative freedom and randomness compared with the real identity, the participation of people in the virtual community process also needs to sequentially follow the corresponding rules and fulfill certain obligations. Therefore, the virtual identity in the network era can be regarded as a behavior which is defined by the virtual world, restricted by the network specification, expected by both interaction parties and suitable for the survival of the network. The generation of virtual identities and the personal management of virtual identities by users are real considerations. Therefore, the present invention has been studied in this direction.
Example 2:
the embodiment analyzes what kind of functions need to be completed by the mobile commerce virtual identity authentication model based on trust transfer, how to establish and manage a virtual identity authentication process with different safety, and simplifies identity authentication calculation and operation under the environment that multiple parties participate in mobile commerce. A virtual identity authentication model based on trust delivery. Although the final access control authority is ultimately decided and enforced by a party (typically the party providing and controlling the resource), such decision authority depends more on information provided by other parties in establishing a trust relationship and the formulated contract and its security information.
The model is characterized by being seamlessly integrated into existing identity authentication systems or frameworks without having to rebuild the associated authentication infrastructure. This means that the model must be adaptable to the currently prevailing authentication mechanisms. In addition, the topology, relationship and mechanism of the model must have high adaptability, and can adapt to the existing identity authentication system and its resources without changing.
The model can realize the following functions:
(1) identity authentication participants between security domains of different structures or modes are allowed to share identity information, authentication information, rights information, and other related data.
(2) Different security tokens, authentication modes and security frameworks are allowed to be used by security domains in which different identity authentication participants are located.
(3) The delivery of trust relationships and the exchange of critical information operate based on internet protocols and internet environments, particularly mobile internet environments.
(4) The virtual identity authentication process is bidirectional, and can provide services for the user side and the resource providing side.
(5) The trust relationship and the authentication information should be maintained, and when the information changes, the virtual identity authentication should be reestablished, so that potential safety hazards are avoided.
(6) Identity information and security models should be hierarchical to avoid unnecessary, excessive, and illegal trust and identity authentication processes.
(7) Anonymous identity authentication is not allowed.
The virtual identity authentication scheme may have the following several:
(1) virtual identity authentication scheme based on dynamic password
A virtual identity authentication scheme based on a dynamic password is realized by combining a virtual identity authentication flow with W on the basis of the dynamic password, so that on one hand, the computing strength of a server and a client can be reduced, and the denial of service attack can be resisted; and on the other hand, phishing attacks can be prevented by means of bidirectional authentication. The scheme simplifies the flow of user authentication and authorization on the premise of ensuring the safety and effectively improves the authentication efficiency.
(2) Virtual identity authentication scheme based on digital signature
A false and smart identity authentication scheme based on digital signatures adopts an asymmetric encryption technology, and utilizes a digital certificate and the digital signatures to ensure non-repudiation of transactions, thereby solving one of the biggest problems of virtual identity authentication compared with the identity authentication scheme involving multiple traditional parties: and (5) identity confirmation. The scheme needs the support of the client, namely, a U shield is used or a digital certificate plug-in is installed at the client.
(3) Virtual identity authentication scheme based on trusted H-th party
On one hand, the computing intensity of both the server side and the client side can be reduced, and the denial of service attack can be resisted; and on the other hand, phishing attacks can be prevented by means of bidirectional authentication. The scheme simplifies the flow of user authentication and authorization on the premise of ensuring the safety and effectively improves the authentication efficiency.
The beneficial results of the invention are as follows: the virtual identity generating method based on the meta-universe comprises a virtual identity generating and managing process and a method for recording the use of the virtual identity by a user.
The virtual identity generation method provided by the invention comprises the steps of constructing a virtual identity converter, an analog identity pile and an identity record file; the virtual identity converter is used for controlling the generation of the virtual identity of the user; the simulation identity stake is used as a carrier of a virtual identity card when a user performs virtual identity conversion; the identity record file is used for recording the virtual identity information of each user;
the virtual identity card is used for explaining the real identity of each user, when the user passes the authentication in the authentication area, the authentication area is responsible for forging one virtual identity card, the storage information of the user and the grade of the user are sealed and stored on the virtual identity card, and the maximum times that the virtual identity card can be inserted into the identity slot stack and the maximum time that the virtual identity card exists in the identity slot stack are set according to the grade of the user; when a user applies for inserting the virtual identity card into the identity slot stack, deducting once at most times of the identity slot stack, starting to calculate the time of inserting the virtual identity card into the identity slot stack, and then deducting the time of inserting the virtual identity card into the identity slot stack from the longest time of the virtual identity card existing in the identity slot stack; after the longest time that the virtual identity card exists in the identity slot stack is less than T, the user is not allowed to carry out identity conversion; the authentication area is used for manufacturing a virtual identity card after authenticating the identity of the user; t is a time period set by an administrator in a unit of second, and the virtual identity card is used for linking real identity information of the user;
Covering a validity period on the virtual identity card in the authentication area, wherein the validity period is used for explaining a valid time interval of the user identity; the storage information of the user records the address of the real information of the user stored in the private block chain, the private block chain can be checked only by an administrator within a determined time, and the storage information of the user is used for explaining the storage condition of the real identity information of the user; the simulation identity pile is a simulation virtual cylinder, the simulation identity pile is provided with annular grooves, the annular grooves are spirally distributed on the simulation identity pile from top to bottom, the annular grooves are used as carriers of identity slot stacks, the annular grooves are provided with more than one identity slot stacks, and the identity slot stacks are used for placing more than one virtual identity cards; the user applies for identity conversion in advance, and after the user passes the application, the administrator sets the effective state of the virtual identity card on the identity slot stack to be 1, which indicates that the virtual identity card is effective; when the identity conversion is finished, the valid state of the virtual identity card is set to be 0, which indicates that the virtual identity card is invalid; the method comprises the steps that an administrator counts the number of virtual identity cards with an effective state of 1 in an identity slot stack, and when at least one virtual identity card with an effective state of 1 exists in the identity slot stack, the conversion state of the identity slot stack is 1; the conversion state is used for explaining that a virtual identity card with an effective state of 1 is inserted into the identity slot stack; the effective state is used for indicating that the user who owns the virtual identity card needs to convert the identity;
The administrator can set the maximum number of virtual identity cards which are in an effective state on the identity slot in advance; virtual coordinates exist on the simulated identity piles in the identity slot stacks, and the virtual coordinates are used for explaining the positions in the identity slot stacks; the virtual coordinate is set to be (h, theta), wherein h is the height of the identity slot stack in the simulated identity pile and is an absolute parameter, the absolute parameter is used for explaining a parameter with an unchangeable value, and theta is an angle deviation value and is an angle for converting the identity conversion pointing tangent plane to the identity slot; clockwise rotation theta of the simulation identity pile is a positive value, and anticlockwise rotation theta of the simulation identity pile is a negative value; theta is expressed by 32-bit double type number and IEEE745 double precision; theta is a relative parameter, the relative parameter is used for explaining a parameter of which the value can change along with the change of the identity conversion pointing section, the identity conversion pointing section is used for explaining the position of a simulated identity card needing identity conversion on the simulated identity pile, and all virtual identity cards of which the identity conversion pointing section points to the annular groove on the simulated identity pile and the effective state is 1 can carry out identity conversion;
identity conversion is carried out by a virtual identity converter, a central shaft of an analog identity pile is unchanged, the analog identity pile rotates around the central shaft clockwise or anticlockwise, virtual identity cards with the effective states of 1 in all annular grooves pointed by an identity conversion section carry out identity conversion, a user carrying out identity conversion for the first time is converted into nodes, the nodes are converted into virtual identities during identity conversion, the user can set nicknames, roles and effective periods of the virtual identities in advance, the effective periods are the effective periods of the virtual identities of the nodes, and the effective periods of the virtual identities of the nodes must be in the effective periods of the virtual identity cards;
The user has a virtual identity card, can carry out identity conversion more than once and has more than one virtual identity; before each identity conversion, an identity conversion open period is set, and the identity conversion open period is used for explaining the time that a user can apply for the identity conversion;
the administrator selects the direction of identity conversion by taking the identity conversion pointing to a tangent plane as a rotating initial position, the clockwise 90-degree range is a clockwise range, the anticlockwise 90-degree range is an anticlockwise range, the clockwise range is used for explaining whether the simulation identity pile rotates clockwise and selecting the range on the simulation identity pile, and the anticlockwise range is used for explaining whether the simulation identity pile rotates anticlockwise and selecting the range on the simulation identity pile; respectively extracting N identity slot stacks in a clockwise range and an anticlockwise range by an administrator, wherein N is a natural number, counting the number of virtual identity cards with an effective state of 1 in the extracted identity slot stacks, subtracting the number of the virtual identity cards with an effective state of 1 in the anticlockwise range from the number of the virtual identity cards with an effective state of 1 in the clockwise range, and selecting clockwise rotation in the direction of identity conversion when CF is 0 and selecting anticlockwise rotation in the direction of identity conversion when CF is 1 according to the comparison of the values of the flag bits; the simulation identity pile rotates according to the direction of identity conversion, the identity conversion points to the identity slot stacks with the same theta value, at least one identity slot stack with a conversion state of 1 exists at the position pointed by the identity conversion section, and the virtual identity card with the pointed conversion state of 1 is converted; the direction of identity conversion is used for explaining the direction of the rotation of the simulation identity pile during identity conversion;
After the user generates the virtual identities, the number of the virtual identities simultaneously owned by the user is M, the identity recording file comprises an identity recording head, a reserved space, an active space, more than one virtual identity entry and an identity description table, the identity recording head is arranged at the beginning of the identity recording file, the identity recording head comprises a file identification code, information of a virtual identity card, an identity description pointer and a storage mode, and the identity recording head is used for describing basic information of the identity recording file; the file identification code is used for identifying the identity recording file and is 8 hexadecimal numbers, as long as the file identification code in the identity recording head is read, an administrator confirms the file as the identity recording file, the information of the virtual identity card is the public key address of the virtual identity card, the identity description needle stores the address of the identity description table beginning in the identity recording file, and the identity description needle is used for describing the position of the identity description table; the initial address of the identity recording file is 0, the storage mode is a minimum data unit for storing the identity recording file, the data storage is in a small-end mode or a large-end mode, when the minimum data unit for storing the identity recording file is used for explaining that data in the identity recording file is stored, the minimum separation unit of the data, an identity recording head, a reserved space, an active space, more than one virtual identity item and a data space occupied by an identity description table are necessarily multiples of the minimum data unit for storing the identity recording file; m is a natural number, and the value of M is set by an administrator; the reserved space is a reserved storage space of the identity recording file, the active space is used for explaining the record of using the virtual identity by the user, the starting address of the active space is designated by the user, and the active space is stored in a descending manner from a high address to a low address;
The user uses the record of the virtual identity to contain the index code of the virtual identity and the time interval of the virtual identity, the time intervals of the default virtual identity are not intersected, the value of the minimum data unit stored in the identity recording file is subtracted from the identity instruction needle to be used as the starting address of the virtual identity entry, the virtual identity entry is stored in a descending manner from the high address to the low address, the virtual identity entry contains the index code of the virtual identity of the user, the nickname, the role and the valid period of the virtual identity, and the virtual identity entry is used for describing the information of each virtual identity of the user; the index code, the starting address and the occupied space of each virtual identity item are described in an identity description table, and the identity description table is used for managing the information of the virtual identity items of the user in an identity record file; the user selects to use the virtual identity, and then the virtual identity is mapped to the virtual identity item through the identity description table, and the information of using the virtual identity is recorded in the activity space.
The above description is only for the preferred embodiment of the present invention, and should not be used to limit the scope of the claims of the present invention. While the foregoing description will be understood and appreciated by those skilled in the relevant art, other equivalents may be made thereto without departing from the scope of the claims.

Claims (1)

1. A virtual identity generation method based on a metauniverse is characterized in that: the method comprises the steps of firstly, constructing a virtual identity converter, an analog identity pile and an identity record file; the virtual identity converter is used for controlling the generation of the virtual identity of the user; the simulation identity pile is used as a carrier of a virtual identity card when a user performs virtual identity conversion; the identity record file is used for recording the virtual identity information of each user; step two, the virtual identity card is used for explaining the real identity of each user, when the user passes the authentication in the authentication area, the authentication area is responsible for forging one virtual identity card, the storage information of the user and the grade of the user are sealed and stored on the virtual identity card, and the maximum number of times that the virtual identity card can be inserted into the identity slot stack and the maximum time that the virtual identity card exists in the identity slot stack are set according to the grade of the user; when a user applies for inserting a virtual identity card into the identity slot stack, deducting once at most times of the identity slot stack, starting to calculate the time of inserting the virtual identity card into the identity slot stack, and then deducting the time of inserting the virtual identity card into the identity slot stack from the longest time of the virtual identity card existing in the identity slot stack; after the longest time that the virtual identity card exists in the identity slot stack is less than T, the user is not allowed to carry out identity conversion; the authentication area is used for manufacturing a virtual identity card after authenticating the identity of a user; t is a time period set by an administrator in a unit of second, and the virtual identity card is used for linking real identity information of the user; covering a validity period on the virtual identity card in the authentication area, wherein the validity period is used for explaining a validity time interval of the user identity; the storage information of the user records the address of the real information of the user stored in a private block chain, the private block chain can be checked only by an administrator within a determined time, and the storage information of the user is used for explaining the storage condition of the real identity information of the user; the simulation identity pile is a simulation virtual cylinder, an annular groove is formed in the simulation identity pile, the annular groove is spirally distributed on the simulation identity pile from top to bottom, the annular groove is used as a carrier of an identity slot stack, more than one identity slot stack is arranged on the annular groove, and the identity slot stack is used for placing more than one virtual identity card; the user applies for identity conversion in advance, and after the user passes the application, the administrator sets the effective state of the virtual identity card on the identity slot stack to be 1, so that the virtual identity card is effective; when the identity conversion is finished, the valid state of the virtual identity card is set to be 0, which indicates that the virtual identity card is invalid; the administrator counts the number of the virtual identity cards with the effective state of 1 on the identity slot stack, and when at least one virtual identity card with the effective state of 1 exists in the identity slot stack, the conversion state of the identity slot stack is 1; the conversion state is used for explaining that a virtual identity card with an effective state of 1 is inserted into the identity slot stack; the effective state is used for indicating that the user who owns the virtual identity card needs to convert the identity; step four, an administrator can set the maximum number of virtual identity cards which are in an effective state on the identity slot in advance; virtual coordinates exist on the simulated identity piles in the identity slot stacks, and the virtual coordinates are used for explaining the positions in the identity slot stacks; the virtual coordinate is set to be (h, theta), wherein h is the height of the identity slot stack in the simulated identity pile, the h is an absolute parameter which is used for explaining a parameter with an unchangeable value, and theta is an angle deviation value which is an angle for converting the identity conversion pointing tangent plane to the identity slot; clockwise rotation theta of the simulation identity pile is a positive value, and anticlockwise rotation theta of the simulation identity pile is a negative value; theta is expressed by 32-bit double type number and IEEE745 double precision; theta is a relative parameter, the relative parameter is used for explaining a parameter of which the value can change along with the change of an identity conversion pointing section, the identity conversion pointing section is used for explaining the position of a simulated identity card needing identity conversion on a simulated identity pile, and all the identity conversion pointing sections can perform identity conversion when pointing to the virtual identity card with the effective state of 1 in the annular groove on the simulated identity pile; step five, identity conversion is carried out by a virtual identity converter, the central shaft of the analog identity pile is unchanged, the analog identity pile rotates clockwise or anticlockwise around the central shaft, a virtual identity card with an effective state of 1 in all annular grooves pointed by an identity conversion section carries out identity conversion, a user carrying out identity conversion for the first time is converted into a node, the node is converted into a virtual identity during identity conversion, the user can set a nickname, a role and an effective period of the virtual identity in advance, the effective period is the effective period of the virtual identity of the node, and the effective period of the virtual identity of the node must be in the effective period of the virtual identity card; step six, the user has a virtual identity card, can carry out more than one identity conversion and has more than one virtual identity; before each identity conversion, setting an identity conversion open period, wherein the identity conversion open period is used for explaining the time that a user can apply for the identity conversion; step seven, the administrator selects the direction of identity conversion, the selection method is that the identity conversion pointing to the tangent plane is taken as the initial position of rotation, the clockwise 90-degree range is a clockwise range, the anticlockwise 90-degree range is an anticlockwise range, the clockwise range is used for explaining whether the simulation identity pile rotates clockwise and is selected on the simulation identity pile, and the anticlockwise range is used for explaining whether the simulation identity pile rotates anticlockwise and is selected on the simulation identity pile; respectively extracting N identity slot stacks by an administrator in a clockwise range and an anticlockwise range, wherein N is a natural number, counting the number of virtual identity cards with an effective state of 1 in the extracted identity slot stacks, subtracting the number of the virtual identity cards with an effective state of 1 in the anticlockwise range from the number of the virtual identity cards with an effective state of 1 in the clockwise range, and selecting clockwise rotation in the direction of identity conversion when a Carry Flag (Carry Flag) CF is 0 and selecting anticlockwise rotation in the direction of identity conversion when the Carry Flag (Carry Flag) CF is 1 according to the value comparison size of the Carry Flag; the simulation identity pile rotates according to the direction of identity conversion, the identity conversion points to the identity slot stacks with the same theta value, at least one identity slot stack with a conversion state of 1 exists at the position pointed by the identity conversion section, and the virtual identity card with the pointed conversion state of 1 is converted; the direction of identity conversion is used for explaining the direction of rotation of the simulation identity pile during identity conversion; step eight, after the user generates the virtual identities, the number of the virtual identities simultaneously owned by the user is M, the identity recording file comprises an identity recording head, a reserved space, an active space, more than one virtual identity entry and an identity description table, the identity recording head is arranged at the beginning of the identity recording file, the identity recording head comprises a file identification code, information of a virtual identity card, an identity description pointer and a storage mode, and the identity recording head is used for describing basic information of the identity recording file; the file identification code is used for identifying the identity recording file and is 8 hexadecimal numbers, as long as the file identification code in the identity recording head is read, an administrator confirms the file as the identity recording file, the information of the virtual identity card is the public key address of the virtual identity card, the identity description needle stores the address of the identity description table starting in the identity recording file, and the identity description needle is used for describing the position of the identity description table; the head address of the identity recording file is 0, the storage mode is a minimum data unit stored in the identity recording file, and whether the data storage is a small-end mode or a large-end mode, the minimum data unit stored in the identity recording file is used for explaining a minimum separation unit of data when the data in the identity recording file is stored, and the data space occupied by an identity recording head, a reserved space, an active space, more than one virtual identity entry and an identity description table is necessarily multiple of the minimum data unit stored in the identity recording file; m is a natural number, and the value of M is set by an administrator; the reserved space is a reserved storage space of the identity recording file, the active space is used for explaining the record of using the virtual identity by the user, the starting address of the active space is designated by the user, and the active space is stored in a descending manner from a high address to a low address; step nine, the record of the virtual identity used by the user comprises an index code of the virtual identity and a time interval of the virtual identity, the time intervals of the default virtual identity are not intersected, the value of the minimum data unit stored in the identity description needle minus the identity record file is used as the starting address of the virtual identity entry, the virtual identity entry is stored in a descending manner from the high address to the low address, the virtual identity entry comprises the index code of the virtual identity of the user, the nickname, the role and the effective period of the virtual identity, and the virtual identity entry is used for describing the information of each virtual identity of the user; the index code, the starting address and the occupied space of each virtual identity entry are described in an identity description table, and the identity description table is used for managing the information of the virtual identity entries of the user in the identity record file; the user selects to use the virtual identity, and then the virtual identity is mapped to the virtual identity item through the identity description table, and the information of using the virtual identity is recorded in the activity space.
CN202210352576.9A 2022-04-06 2022-04-06 Virtual identity generation method based on meta universe Pending CN114840826A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210352576.9A CN114840826A (en) 2022-04-06 2022-04-06 Virtual identity generation method based on meta universe

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210352576.9A CN114840826A (en) 2022-04-06 2022-04-06 Virtual identity generation method based on meta universe

Publications (1)

Publication Number Publication Date
CN114840826A true CN114840826A (en) 2022-08-02

Family

ID=82563055

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210352576.9A Pending CN114840826A (en) 2022-04-06 2022-04-06 Virtual identity generation method based on meta universe

Country Status (1)

Country Link
CN (1) CN114840826A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115439195A (en) * 2022-11-07 2022-12-06 杭州脸脸会网络技术有限公司 Virtual account creation method, system, server and computer readable storage medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115439195A (en) * 2022-11-07 2022-12-06 杭州脸脸会网络技术有限公司 Virtual account creation method, system, server and computer readable storage medium

Similar Documents

Publication Publication Date Title
Ryu et al. Design of secure mutual authentication scheme for metaverse environments using blockchain
CN111343001B (en) Social data sharing system based on block chain
Liu et al. Cooperative privacy preservation for wearable devices in hybrid computing-based smart health
Xu et al. Segment blockchain: A size reduced storage mechanism for blockchain
CN113127916B (en) Data set processing method, data processing method, device and storage medium
Guo et al. Data encryption based blockchain and privacy preserving mechanisms towards big data
CN103780393B (en) Virtual-desktop security certification system and method facing multiple security levels
US9032509B2 (en) Identity verification in virtual worlds using encoded data
CN105794145A (en) Server-aided private set intersection (PSI) with data transfer
CN105160210B (en) A kind of software authorization method and system, software terminal and software manager
CN107181600A (en) A kind of password login authentication method, system and user equipment and certificate server
Ghirmai et al. Self-sovereign identity for trust and interoperability in the metaverse
CN114840826A (en) Virtual identity generation method based on meta universe
CN109921905A (en) Anti- quantum calculation cryptographic key negotiation method and system based on private key pond
Chen et al. A review of research on metaverse defining taxonomy and adaptive architecture
Cui et al. Reforming supply chain systems in metaverse
CN114861211A (en) Meta-universe scene-oriented data privacy protection method, system and storage medium
Li et al. Three-tier storage framework based on TBchain and IPFS for protecting IoT security and privacy
CN1434598A (en) Safety All-in-one-card system realized by intelligent card
CN110324424A (en) A kind of credible cloud service framework based on block chain
US20190236258A1 (en) Dynamic User Interfaces For Authentication
Manzoor et al. NFT-based blockchain-oriented security framework for metaverse applications
Yan A comprehensive overview of the fundamental and applications of metaverse
Lei et al. When Blockchain-Enabled Internet of Things Meets Cloud Computing.
Zhang et al. Access Control Model Based on the Privacy of Crowdsourcing Task Content Protection in the Blockchain Environment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 200120 building C3, No. 101 Eshan Road, China (Shanghai) pilot Free Trade Zone, Pudong New Area, Shanghai

Applicant after: Shanghai Lingshuzhonghe Information Technology Co.,Ltd.

Address before: 200120 building C3, No. 101 Eshan Road, China (Shanghai) pilot Free Trade Zone, Pudong New Area, Shanghai

Applicant before: NENG LIAN TECH. LTD.