CN116249113A - Verification authorization method and device for virtual image of meta-universe, electronic equipment and storage medium - Google Patents

Verification authorization method and device for virtual image of meta-universe, electronic equipment and storage medium Download PDF

Info

Publication number
CN116249113A
CN116249113A CN202310251622.0A CN202310251622A CN116249113A CN 116249113 A CN116249113 A CN 116249113A CN 202310251622 A CN202310251622 A CN 202310251622A CN 116249113 A CN116249113 A CN 116249113A
Authority
CN
China
Prior art keywords
avatar
authentication
authorization
data
intelligent contract
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310251622.0A
Other languages
Chinese (zh)
Inventor
丘家宁
李泽峰
谢涵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Aipu Road Network Technology Co Ltd
Original Assignee
Guangzhou Aipu Road Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Aipu Road Network Technology Co Ltd filed Critical Guangzhou Aipu Road Network Technology Co Ltd
Priority to CN202310251622.0A priority Critical patent/CN116249113A/en
Publication of CN116249113A publication Critical patent/CN116249113A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]

Abstract

The application provides a meta-universe avatar verification authorization method, a meta-universe avatar verification authorization device, electronic equipment and a storage medium, wherein the 5G core network comprises a blockchain storage network constructed based on an avatar data model, and the blockchain storage network is used for storing the avatar data, and the method comprises the following steps: generating an intelligent contract and deploying the intelligent contract in the blockchain storage network; authenticating and authorizing the user terminal based on the authentication and authorization flow of the 5G core network; and when the user terminal triggers an access request for the data of the avatar, authorizing a third party entity based on the intelligent contract. The embodiment of the application can efficiently finish verification authentication and improve the safety and reliability of the data of the virtual information.

Description

Verification authorization method and device for virtual image of meta-universe, electronic equipment and storage medium
Technical Field
The present invention relates to the 5G field of mobile communications, and in particular, to a method, an apparatus, an electronic device, and a storage medium for verifying and authorizing an avatar of a meta-universe.
Background
The existing meta-universe virtual image verification authorization method is usually completed through digital signature, digital certificate, identity verification and other operations, and the method can improve the safety of the virtual image, but still has certain potential safety hazard. For example, the digital certificate may be counterfeited or stolen, and the digital signature may be tampered with, thereby causing the security of the avatar to be compromised, rendering the avatar untrusted. Meanwhile, in the scene that a large number of virtual images need to be verified and authorized, verification and authentication are difficult to be completed in an efficient mode.
Disclosure of Invention
The embodiment of the application aims to provide a verification authorization method, a device, electronic equipment and a storage medium for an avatar of a metauniverse, which are used for efficiently completing verification authentication and improving the safety and reliability of data of virtual information.
In a first aspect, the present invention provides a method for authenticating and authorizing an avatar of a metauniverse, the method being applied to a 5G core network, wherein the 5G core network includes a blockchain storage network constructed based on a data model of the avatar, the blockchain storage network being used for storing data of the avatar, the method comprising:
generating an intelligent contract and deploying the intelligent contract in the blockchain storage network;
authenticating and authorizing the user terminal based on the authentication and authorization flow of the 5G core network;
and when the user terminal triggers an access request for the data of the avatar, authorizing a third-party entity based on the information carried by the access request and the intelligent contract.
In the embodiment of the application, the authentication and authorization method of the meta-universe virtual image is applied to the 5G core network, so that the characteristics of high speed and low delay of 5G can be utilized to realize the transmission and synchronization of the virtual image data, and further the authentication speed of the virtual image is improved. Further, the embodiment of the application can authenticate and authorize the user terminal based on the authentication and authorization flow of the 5G core network, and compared with the prior art adopting a user name and password to carry out identity verification and authorization, the embodiment of the application can ensure the safety and the credibility of the user identity. On the other hand, the method and the device can enable the data of the virtual image to exist in the blockchain storage network and authorize the third party entity based on the intelligent contract, so that the access and authority management of the third party entity can be achieved by utilizing the characteristics of non-falsification, disclosure transparency and the like of the intelligent contract, and the credibility and reliability of the virtual image are improved.
In an alternative embodiment, the method further comprises:
the smart contract is associated with an avatar identifier.
In this alternative embodiment, by associating the smart contract with the avatar identifier, the user terminal can access data of the designated avatar through the smart contract.
In an alternative embodiment, the intelligent contract includes a user identity authentication rule and an authentication authorization rule, where the user identity authentication rule is used to determine a manner of user identity authentication, and the authentication authorization rule is used to determine whether the three-party entity is an owner of the data of the avatar.
In the above alternative embodiment, the user identity authentication mode can be determined by the user identity authentication rule, and on the other hand, whether the three-party entity is the owner of the data of the avatar can be judged by the authentication authorization rule.
In an alternative embodiment, the smart contract further includes avatar access record audit detection rules for security auditing and checking for abnormal behavior.
In this alternative embodiment, abnormal behavior may be safely audited and checked by avatar access record audit detection rules.
In an alternative embodiment, the blockchain storage network includes an avatar management and update module, wherein the intelligent contract is deployed on the avatar management and update module, and the avatar management and update module communicates with other network element modules in the 5G core network based on HTTP/3 protocol.
In this alternative embodiment, an intelligent contract may be deployed to the avatar management and update module, and the avatar management and update module may communicate with other network element modules in the 5G core network based on HTTP/3 protocol.
In an alternative embodiment, the avatar management and update module is deployed based on the cloud native architecture.
In the optional implementation mode, the cloud native architecture is an application program development and deployment mode based on technologies such as containerization, microservice, devOps and the like, and can realize functions such as rapid deployment, elastic expansion, fault recovery and the like
In a second aspect, the present invention provides a meta-universe avatar authentication and authorization apparatus, which is applied to a 5G core network, wherein the 5G core network includes a blockchain storage network constructed based on a data model of an avatar, the blockchain storage network being used for storing data of the avatar, the apparatus comprising:
the generation module is used for generating an intelligent contract and deploying the intelligent contract in the blockchain storage network, wherein the intelligent contract comprises an authentication authorization rule, a user identity authentication rule and an avatar access record audit rule;
the first verification module is used for carrying out authentication and authorization on the user terminal based on the authentication and authorization flow of the 5G core network;
and the second verification module is used for authorizing a third-party entity based on the information carried by the access request and the intelligent contract when the user terminal triggers the access request of the data of the virtual image.
According to the embodiment of the application, the characteristics of high speed and low delay of the 5G can be utilized to realize the transmission and synchronization of the virtual image data, so that the authentication speed of the virtual image is improved. Further, the embodiment of the application can authenticate and authorize the user terminal based on the authentication and authorization flow of the 5G core network, and compared with the prior art adopting a user name and password to carry out identity verification and authorization, the embodiment of the application can ensure the safety and the credibility of the user identity. On the other hand, the method and the device can enable the data of the virtual image to exist in the blockchain storage network and authorize the third party entity based on the intelligent contract, so that the access and authority management of the third party entity can be achieved by utilizing the characteristics of non-falsification, disclosure transparency and the like of the intelligent contract, and the credibility and reliability of the virtual image are improved.
In an alternative embodiment, the apparatus further comprises:
and the association module is used for associating the intelligent contract with the avatar identifier.
In a third aspect, the present invention provides an electronic device comprising:
a processor; and
a memory configured to store machine-readable instructions that, when executed by the processor, perform a method of authenticating an avatar of a metauniverse as in any one of the preceding embodiments.
According to the embodiment of the application, the characteristics of high speed and low delay of the 5G can be utilized to realize the transmission and synchronization of the virtual image data, so that the authentication speed of the virtual image is improved. Further, the embodiment of the application can authenticate and authorize the user terminal based on the authentication and authorization flow of the 5G core network, and compared with the prior art adopting a user name and password to carry out identity verification and authorization, the embodiment of the application can ensure the safety and the credibility of the user identity. On the other hand, the method and the device can enable the data of the virtual image to exist in the blockchain storage network and authorize the third party entity based on the intelligent contract, so that the access and authority management of the third party entity can be achieved by utilizing the characteristics of non-falsification, disclosure transparency and the like of the intelligent contract, and the credibility and reliability of the virtual image are improved.
In a fourth aspect, the present invention provides a storage medium storing a computer program that is executed by a processor to perform the method for authenticating an avatar of a meta-universe according to any one of the preceding embodiments.
According to the embodiment of the application, the characteristics of high speed and low delay of the 5G can be utilized to realize the transmission and synchronization of the virtual image data, so that the authentication speed of the virtual image is improved. Further, the embodiment of the application can authenticate and authorize the user terminal based on the authentication and authorization flow of the 5G core network, and compared with the prior art adopting a user name and password to carry out identity verification and authorization, the embodiment of the application can ensure the safety and the credibility of the user identity. On the other hand, the method and the device can enable the data of the virtual image to exist in the blockchain storage network and authorize the third party entity based on the intelligent contract, so that the access and authority management of the third party entity can be achieved by utilizing the characteristics of non-falsification, disclosure transparency and the like of the intelligent contract, and the credibility and reliability of the virtual image are improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are needed in the embodiments of the present application will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present application and should not be considered as limiting the scope, and other related drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a flowchart illustrating a meta-universe avatar authentication and authorization method according to an embodiment of the present application;
fig. 2 is a schematic diagram of an architecture of an avatar management and update module provided in an embodiment of the present application;
fig. 3 is a flowchart of UE registration in 5G according to an embodiment of the present disclosure;
fig. 4 is a schematic structural view of a meta-universe avatar authentication and authorization device according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be described below with reference to the drawings in the embodiments of the present application.
Example 1
Referring to fig. 1, fig. 1 is a flowchart of a meta-universe avatar authentication and authorization method disclosed in an embodiment of the present application, wherein the method is applied to a 5G core network, and the 5G core network includes a blockchain storage network constructed based on a data model of an avatar, and the blockchain storage network is used for storing data of the avatar. As shown in fig. 1, the method of the embodiment of the present application includes the following steps:
101. generating an intelligent contract and deploying the intelligent contract in the blockchain storage network;
102. authenticating and authorizing the user terminal based on the authentication and authorization flow of the 5G core network;
103. and when the user terminal triggers an access request for the data of the avatar, authorizing a third party entity based on the intelligent contract.
In the embodiment of the application, the authentication and authorization method of the meta-universe virtual image is applied to the 5G core network, so that the characteristics of high speed and low delay of 5G can be utilized to realize the transmission and synchronization of the virtual image data, and further the authentication speed of the virtual image is improved. Further, the embodiment of the application can authenticate and authorize the user terminal based on the authentication and authorization flow of the 5G core network, and compared with the prior art adopting a user name and password to carry out identity verification and authorization, the embodiment of the application can ensure the safety and the credibility of the user identity. On the other hand, the method and the device can enable the data of the virtual image to exist in the blockchain storage network and authorize the third party entity based on the intelligent contract, so that the access and authority management of the third party entity can be achieved by utilizing the characteristics of non-falsification, disclosure transparency and the like of the intelligent contract, and the credibility and reliability of the virtual image are improved.
In the embodiment of the application, specifically, since the data of the avatar is stored in the blockchain storage network, the data of the avatar is difficult to be illegally tampered, and thus the tampered avatar can be prevented from being used by an illegal user, so that the reliability and the credibility of the avatar are ensured, for example, the user is prevented from interacting with other users by using the tampered avatar, and the avatar used by the user is credible and reliable for other users.
In the embodiment of the application, specifically, in some scenes, an illegal user may not tamper with the data of the avatar, but the purpose of impersonating the avatar is achieved by modifying the data access rights of the avatar, and aiming at the scenes, the application utilizes the intelligent contract to manage the access rights of the data of the avatar, so that the illegal user is prevented from modifying the data access rights of the avatar by utilizing the characteristics of the intelligent contract, such as non-tampering, disclosure and transparency.
In the embodiment of the application, specifically, the authentication and authorization process of the 5G core network is adopted to authenticate and authorize the user terminal, so that the user identity can be safe and trusted, and because the authentication and authorization process of the 5G core network is used for authenticating and authorizing the user terminal itself, for example, the hardware ID of the user terminal or other unique identifiers of the user terminal, the authentication and authorization of the user terminal by the proper user name and password can be avoided.
It should be noted that, if the user terminal needs to access the data of the avatar, it needs to first go through the authentication and authorization process of the 5G core network, then go through the authentication and authorization of the intelligent contract, that is, there is a two-stage authentication and authorization process, specifically, the authentication and authorization is performed on the user terminal to ensure that the user terminal is legal, and then the authentication and authorization is performed on the identity of the user to ensure that only the authorized user can access and modify the avatar.
In the embodiment of the application, specifically, the blockchain storage network comprises a plurality of databases and an avatar management and update module, wherein the avatar management and update module is in communication connection with the databases, and the intelligent contract is deployed on the avatar management and update module, so that the intelligent contract can manage the avatar update management module, and thereby access authority management and control are performed on a third party entity. As an example, referring to fig. 2, fig. 2 is a schematic diagram illustrating an architecture of an avatar management and update module according to an embodiment of the present application. As shown in fig. 2, the avatar management and update module is communicatively connected to 3 databases, and the smart contract is deployed at the avatar management and update module to control the third party entity to access data in the 3 databases.
In the embodiment of the application, considering that a large amount of data of the avatar needs to be stored and a high-speed reading and writing requirement is needed, the blockchain storage network is a distributed storage system, for example, the blockchain storage network may be a distributed storage system such as an HDFS, a Ceph, and the like.
In an embodiment of the present application, the blockchain storage network further includes an API module, wherein other network element modules in the 5G core network may call the avatar management and update module through an API, for example, other network element modules may call the smart contract in the avatar management and update module through an API. Further, the API module may be a RESTful API module, where the RESTful API module is embedded in the call avatar management and update module, and it should be noted that, for a specific description of the RESTful API module, please refer to the prior art.
In the embodiment of the application, the avatar management and update module is in communication connection with the UDF in the 5G core network, wherein the UDM (The Unified Data Management, unified data management function) is used as a network element in the 5G core network for providing the unified data management function.
In the embodiment of the application, the communication process between the avatar management and update module and the UDF in the 5G core network can adopt an HTTP/3 protocol, and the communication process can adopt a WebRTC technology, wherein the WebRTC technology is used for realizing the data transmission requirements of low time delay and high bandwidth. It should be noted that, for a specific description of WebRTC technology, please refer to the prior art, and the embodiments of the present application will not be repeated.
In the embodiment of the application, the avatar management and update module comprises two sub-modules, wherein one sub-module is the avatar management module, and the other sub-module is the update module, wherein the avatar management module is used for authorizing a third party entity, and the update module is used for synchronizing a plurality of databases, so that the data consistency of the databases is ensured, and meanwhile, the update module also adopts the incremental update operation so as to reduce the consumption of transmission time and bandwidth and finally ensure the high availability of the data.
In an embodiment of the present application, the database communicatively connected to the avatar management and updating module may be an Apache Cassandra database, wherein for a detailed description of the Apache Cassandra database, please refer to the prior art.
In this embodiment of the present application, the avatar management and updating module may be further communicatively connected to a fee management module, where the fee management module may interface with the operator billing system and further transmit a ticket to the operator billing system, thereby performing a management function, for example, the avatar management and updating in the meta space may need to pay a certain fee, such as a storage fee, a network transmission fee, etc., and management of such fee may be performed by the fee management module.
In the embodiment of the application, the application program in the blockchain storage network is realized based on a cloud native architecture, wherein the cloud native architecture is an application program development and deployment mode based on technologies such as containerization, microservice, devOps and the like, and can realize functions such as rapid deployment, elastic expansion, fault recovery and the like.
In the embodiment of the application, the avatar management module comprises an avatar access control module, wherein the avatar access control module adopts a standardized access control model such as RBAC (role-based access control) or ABAC (attribute-based access control) and the like, and realizes access control through authority management and policy setting.
In the embodiment of the present application, the data model of the avatar includes attributes, metadata, identifiers, etc. of the avatar.
In the embodiment of the application, the cloud storage service can be used as disaster recovery backup of the data of the avatar.
In the embodiment of the application, the user terminal can install the meta-universe application program, and further after the user terminal passes the authentication and authorization, the meta-universe application program calls the API module, and further calls the intelligent contract to trigger the authentication and authorization for accessing the data. It should be noted that the avatar management and update module may be regarded as a proxy server, and the user terminal installed with the meta-universe application may be regarded as a client, and the client may access the data of the avatar in the database through the proxy server.
In this embodiment of the present application, for step 101, the smart contract may be defined by using a resolution or Truffle, for example, a data model defining an avatar, an access control rule, a data update manner, and the like, where the access control rule may include a user identity authentication rule, an authentication authorization rule, and an avatar access record audit detection rule.
In an embodiment of the present application, for step 101, an intelligent contract may be deployed using an Ethernet client tool (e.g., geth or Party) or an online blockchain service (e.g., infora). On the other hand, before deployment, the network ID of the blockchain storage network may be selected to ensure that the intelligent contract is deployed on the blockchain storage network, further, after deployment is completed, testing and verification are required to ensure that the functions and performances of the intelligent contract meet expectations, and finally, the intelligent contract needs to be updated periodically to add new functions or fix known problems.
In the embodiment of the present application, for step 102, referring to fig. 3 for a specific description of an authentication and authorization procedure of a 5G core network, fig. 3 is a flowchart of UE registration in 5G, where UE refers to a user terminal. NF (Network Function) refers to network function, PCF (Policy Control function) refers to policy control function, AF (Application Function) refers to network application function, NEF (Network Exposure Function) refers to network opening function, NRF (NF Repository Function) refers to network storage function S-NSSAI (Single Network Slice Selection Assistance Information) refers to network slice selection assistance information, SEPP (Security Edge Protection Proxies) refers to security edge protection agent, V-PLMN (Visited Public Land Mobile Network) refers to visited public land mobile network, H-PLMN (Home Public Land Mobile Network) refers to home public land mobile network, SMF (Session Management Function) refers to session management function, AMF (Access and Mobility Management Function) refers to access and mobility management function, UDM (The Unified Data Management) refers to unified data management function, NWDAF (NWDAF Network Data Analytics Function) refers to network data analysis function.
In an embodiment of the present application, as an optional implementation manner, the method of the embodiment of the present application further includes the following steps:
the smart contract is associated with an avatar identifier.
In this alternative embodiment, by associating the smart contract with the avatar identifier, the user terminal can access the data of the specified avatar through the smart contract, for example, when the authentication authorization of the third party entity is passed, the smart contract is associated with the avatar identifier a, and the third party entity can obtain the data pointed by the avatar identifier a through the smart contract.
In this embodiment of the present application, as an optional implementation manner, the smart contract includes a user identity authentication rule and an authentication authorization rule, where the user identity authentication rule is used to determine a manner of user identity authentication, and the authentication authorization rule is used to determine whether the three-party entity is an owner of the data of the avatar.
In the above alternative embodiment, the user identity authentication mode can be determined by the user identity authentication rule, and on the other hand, whether the three-party entity is the owner of the data of the avatar can be judged by the authentication authorization rule.
In the above alternative embodiment, optionally, the user identity authentication manner may be one of digital certificates, passwords, private keys, and other authentication manners.
In the above alternative embodiment, specifically, the authentication authorization rule may compare the identity information of the third party entity with the user management policy pre-stored in the 5G core network, and if the third party entity belongs to a specific user group, it may be determined that the third party entity is the owner of the data of the avatar. It should be noted that, the user management policy of the 5G core network defines which users can access, modify, or delete the avatar, etc. It should be noted that the third party entity may refer to a user using the user terminal.
In this embodiment, as an optional implementation manner, the smart contract further includes an avatar access record audit detection rule, where the avatar access record audit detection rule is used for security audit and abnormal behavior inspection.
In this alternative embodiment, the abnormal behavior may be safely audited and checked by the avatar access record audit detection rule, for example, whether the user terminal initiates access multiple times in a short time is detected by the avatar access record audit detection rule, and if so, it may be determined that the abnormal behavior is checked.
In an embodiment of the present application, as an optional implementation manner, the method of the embodiment of the present application further includes:
the third party entity is authorized based on role-based access control or attribute-based access control.
In this alternative embodiment, both the access control of the character and the access control of the attribute are standardized access control models, wherein the standardized access control models may be set in authentication authorization rules.
In this embodiment of the present application, as an optional implementation manner, the blockchain storage network includes an avatar management and update module, where the intelligent contract is deployed on the avatar management and update module, and the avatar management and update module communicates with other network element modules in the 5G core network based on HTTP/3 protocol.
In this alternative embodiment, an intelligent contract may be deployed to the avatar management and update module, and the avatar management and update module may communicate with other network element modules in the 5G core network based on HTTP/3 protocol.
In this embodiment, as an optional implementation manner, the module for managing and updating the avatar is deployed based on the cloud native architecture.
In the optional implementation mode, the cloud native architecture is an application program development and deployment mode based on technologies such as containerization, microservice, devOps and the like, and can realize functions such as rapid deployment, elastic expansion, fault recovery and the like.
It should be noted that, for other detailed descriptions of the apparatus in the embodiments of the present application, please refer to the related descriptions in the first embodiment of the present application, which are not repeated herein.
Example two
Referring to fig. 4, fig. 4 is a schematic structural diagram of an apparatus for verifying and authorizing an avatar of a meta-universe according to an embodiment of the present application, wherein the 5G core network includes a blockchain storage network constructed based on a data model of the avatar, and the blockchain storage network is used for storing data of the avatar as shown in fig. 4, and the apparatus of the embodiment of the present application includes the following functional modules:
a generation module 201, configured to generate a smart contract and deploy the smart contract in the blockchain storage network;
a first verification module 202, configured to perform authentication and authorization on a user terminal based on an authentication and authorization procedure of the 5G core network;
and a second verification module 203, configured to authorize a third party entity based on the smart contract when the user terminal triggers an access request for the data of the avatar.
According to the embodiment of the application, the characteristics of high speed and low delay of the 5G can be utilized to realize the transmission and synchronization of the virtual image data, so that the authentication speed of the virtual image is improved. Further, the embodiment of the application can authenticate and authorize the user terminal based on the authentication and authorization flow of the 5G core network, and compared with the prior art adopting a user name and password to carry out identity verification and authorization, the embodiment of the application can ensure the safety and the credibility of the user identity. On the other hand, the method and the device can enable the data of the virtual image to exist in the blockchain storage network and authorize the third party entity based on the intelligent contract, so that the access and authority management of the third party entity can be achieved by utilizing the characteristics of non-falsification, disclosure transparency and the like of the intelligent contract, and the credibility and reliability of the virtual image are improved.
In this embodiment of the present application, as an optional implementation manner, the apparatus of this embodiment of the present application further includes the following functional modules:
and the association module is used for associating the intelligent contract with the avatar identifier.
In this alternative embodiment, by associating the smart contract with the avatar identifier, the user terminal can access the data of the specified avatar through the smart contract, for example, when the authentication authorization of the third party entity is passed, the smart contract is associated with the avatar identifier a, and the third party entity can obtain the data pointed by the avatar identifier a through the smart contract.
Example III
Referring to fig. 5, fig. 5 is a schematic structural diagram of an electronic device disclosed in an embodiment of the present application, and as shown in fig. 5, the electronic device in the embodiment of the present application includes:
a processor 301; and
a memory 302 configured to store machine-readable instructions that, when executed by the processor 301, perform a method of authenticating an avatar of a metauniverse as in any one of the preceding embodiments.
According to the embodiment of the application, the characteristics of high speed and low delay of the 5G can be utilized to realize the transmission and synchronization of the virtual image data, so that the authentication speed of the virtual image is improved. Further, the embodiment of the application can authenticate and authorize the user terminal based on the authentication and authorization flow of the 5G core network, and compared with the prior art adopting a user name and password to carry out identity verification and authorization, the embodiment of the application can ensure the safety and the credibility of the user identity. On the other hand, the method and the device can enable the data of the virtual image to exist in the blockchain storage network and authorize the third party entity based on the intelligent contract, so that the access and authority management of the third party entity can be achieved by utilizing the characteristics of non-falsification, disclosure transparency and the like of the intelligent contract, and the credibility and reliability of the virtual image are improved.
Example IV
The present embodiment provides a storage medium storing a computer program that is executed by a processor to perform the authentication authorization method of an avatar of a meta-universe according to any one of the foregoing embodiments.
According to the embodiment of the application, the characteristics of high speed and low delay of the 5G can be utilized to realize the transmission and synchronization of the virtual image data, so that the authentication speed of the virtual image is improved. Further, the embodiment of the application can authenticate and authorize the user terminal based on the authentication and authorization flow of the 5G core network, and compared with the prior art adopting a user name and password to carry out identity verification and authorization, the embodiment of the application can ensure the safety and the credibility of the user identity. On the other hand, the method and the device can enable the data of the virtual image to exist in the blockchain storage network and authorize the third party entity based on the intelligent contract, so that the access and authority management of the third party entity can be achieved by utilizing the characteristics of non-falsification, disclosure transparency and the like of the intelligent contract, and the credibility and reliability of the virtual image are improved.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other manners. The above-described apparatus embodiments are merely illustrative, for example, the division of the units is merely a logical function division, and there may be other manners of division in actual implementation, and for example, multiple units or components may be combined or integrated into another system, or some features may be omitted, or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be through some communication interface, device or unit indirect coupling or communication connection, which may be in electrical, mechanical or other form.
Further, the units described as separate units may or may not be physically separate, and units displayed as units may or may not be physical units, may be located in one place, or may be distributed over a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
Furthermore, functional modules in various embodiments of the present application may be integrated together to form a single portion, or each module may exist alone, or two or more modules may be integrated to form a single portion.
It should be noted that the functions, if implemented in the form of software functional modules and sold or used as a stand-alone product, may be stored in a computer-readable storage medium. Based on such understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art or in a part of the technical solution, in the form of a software product stored in a storage medium, including several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to perform all or part of the steps of the methods described in the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM) random access Memory (Random Access Memory, RAM), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
In this document, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions.
The foregoing is merely exemplary embodiments of the present application and is not intended to limit the scope of the present application, and various modifications and variations may be suggested to one skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principles of the present application should be included in the protection scope of the present application.

Claims (10)

1. A method for authentication and authorization of an avatar of a metauniverse, the method being applied to a 5G core network, wherein the 5G core network includes a blockchain storage network constructed based on a data model of the avatar, the blockchain storage network being used to store data of the avatar, the method comprising:
generating an intelligent contract and deploying the intelligent contract in the blockchain storage network;
authenticating and authorizing the user terminal based on the authentication and authorization flow of the 5G core network;
and when the user terminal triggers an access request for the data of the avatar, authorizing a third party entity based on the intelligent contract.
2. The method of claim 1, wherein the method further comprises:
the smart contract is associated with an avatar identifier.
3. The method of claim 1, wherein the smart contract includes a user identity authentication rule for determining a manner of user identity authentication, an authentication authorization rule for determining whether the three-party entity is an owner of the avatar's data.
4. The method of claim 3, wherein the smart contract further includes avatar access record audit detection rules for security auditing and checking for abnormal behavior.
5. The method of claim 1, wherein the blockchain storage network includes an avatar management and update module, wherein the smart contract is deployed to the avatar management and update module, the avatar management and update module communicating with other network element modules in the 5G core network based on HTTP/3 protocols.
6. The method of claim 1, wherein the avatar management and update module is deployed based on the cloud native architecture.
7. A meta-universe avatar authentication and authorization apparatus, the apparatus being applied to a 5G core network, wherein the 5G core network includes a blockchain storage network constructed based on a data model of an avatar, the blockchain storage network being used to store data of the avatar, the apparatus comprising:
the generation module is used for generating an intelligent contract and deploying the intelligent contract in the blockchain storage network;
the first verification module is used for carrying out authentication and authorization on the user terminal based on the authentication and authorization flow of the 5G core network;
and the second verification module is used for authorizing a third party entity based on the intelligent contract when the user terminal triggers an access request for the data of the virtual image.
8. The apparatus of claim 7, wherein the apparatus further comprises:
and the association module is used for associating the intelligent contract with the avatar identifier.
9. An electronic device, comprising:
a processor; and
a memory configured to store machine-readable instructions that, when executed by the processor, perform the method of verifying authorization of an avatar of a metauniverse as claimed in any one of claims 1-6.
10. A storage medium storing a computer program to be executed by a processor to perform the method of authenticating an avatar of a meta-universe according to any one of claims 1 to 6.
CN202310251622.0A 2023-03-15 2023-03-15 Verification authorization method and device for virtual image of meta-universe, electronic equipment and storage medium Pending CN116249113A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310251622.0A CN116249113A (en) 2023-03-15 2023-03-15 Verification authorization method and device for virtual image of meta-universe, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310251622.0A CN116249113A (en) 2023-03-15 2023-03-15 Verification authorization method and device for virtual image of meta-universe, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN116249113A true CN116249113A (en) 2023-06-09

Family

ID=86627706

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310251622.0A Pending CN116249113A (en) 2023-03-15 2023-03-15 Verification authorization method and device for virtual image of meta-universe, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN116249113A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20200118068A1 (en) * 2018-10-10 2020-04-16 QuestaWeb, Inc. Hierarchical Blockchain Architecture for Global Trade Management
CN114493785A (en) * 2022-01-25 2022-05-13 浙江建林电子电气股份有限公司 Intelligent market service trading platform based on meta universe
CN115311045A (en) * 2022-07-26 2022-11-08 北京溪塔科技有限公司 Meta universe virtual image decoration method based on block chain and meta universe
CN115344841A (en) * 2022-09-01 2022-11-15 中国联合网络通信集团有限公司 Meta-universe access method based on block chain network and block chain network device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20200118068A1 (en) * 2018-10-10 2020-04-16 QuestaWeb, Inc. Hierarchical Blockchain Architecture for Global Trade Management
CN114493785A (en) * 2022-01-25 2022-05-13 浙江建林电子电气股份有限公司 Intelligent market service trading platform based on meta universe
CN115311045A (en) * 2022-07-26 2022-11-08 北京溪塔科技有限公司 Meta universe virtual image decoration method based on block chain and meta universe
CN115344841A (en) * 2022-09-01 2022-11-15 中国联合网络通信集团有限公司 Meta-universe access method based on block chain network and block chain network device

Similar Documents

Publication Publication Date Title
US11165579B2 (en) Decentralized data authentication
CN111429254A (en) Business data processing method and device and readable storage medium
CN110162936A (en) A kind of use authorization method of software content
CN111064757B (en) Application access method and device, electronic equipment and storage medium
US20150113259A1 (en) Computer with Flexible Operating System
WO2017192736A1 (en) Methods and apparatus for device authentication and secure data exchange between a server application and a device
CN111355713B (en) Proxy access method, device, proxy gateway and readable storage medium
CN110611657A (en) File stream processing method, device and system based on block chain
US11757877B1 (en) Decentralized application authentication
CN111586021B (en) Remote office business authorization method, terminal and system
CN111818088A (en) Authorization mode management method and device, computer equipment and readable storage medium
CN111143822A (en) Application system access method and device
CN107948235A (en) Cloud data safety management and audit device based on JAR
CN115242546A (en) Industrial control system access control method based on zero trust architecture
CN113225351A (en) Request processing method and device, storage medium and electronic equipment
US8051470B2 (en) Consolidation of user directories
CN116980163A (en) Data processing method, device, equipment and medium based on trusted execution environment
CN117155716B (en) Access verification method and device, storage medium and electronic equipment
CN112131041A (en) Method, apparatus and computer program product for managing data placement
CN109474431A (en) Client certificate method and computer readable storage medium
CN113852628B (en) Decentralizing single sign-on method, device and storage medium
CN112417403B (en) Automatic system authentication and authorization processing method based on GitLab API
CN116249113A (en) Verification authorization method and device for virtual image of meta-universe, electronic equipment and storage medium
CN116436624A (en) Storage system access method and device, computer readable medium and electronic equipment
CN114726606A (en) User authentication method, client, gateway and authentication server

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination