NL2032458B1 - Metaverse authentication method, system and apparatus, terminal device and storage medium - Google Patents

Metaverse authentication method, system and apparatus, terminal device and storage medium Download PDF

Info

Publication number
NL2032458B1
NL2032458B1 NL2032458A NL2032458A NL2032458B1 NL 2032458 B1 NL2032458 B1 NL 2032458B1 NL 2032458 A NL2032458 A NL 2032458A NL 2032458 A NL2032458 A NL 2032458A NL 2032458 B1 NL2032458 B1 NL 2032458B1
Authority
NL
Netherlands
Prior art keywords
identity
blockchain
real
information
virtual
Prior art date
Application number
NL2032458A
Other languages
Dutch (nl)
Inventor
Lin Xuefei
Ren Yanduo
Cao Feng
Original Assignee
Shenzhen Hande Finmaker Co Ltd
Shenzhen Blockchain Financial Services Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Hande Finmaker Co Ltd, Shenzhen Blockchain Financial Services Co Ltd filed Critical Shenzhen Hande Finmaker Co Ltd
Priority to NL2032458A priority Critical patent/NL2032458B1/en
Application granted granted Critical
Publication of NL2032458B1 publication Critical patent/NL2032458B1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Computer And Data Communications (AREA)

Abstract

Disclosed are a metaverse authentication method, system and apparatus, a terminal device and a storage medium. The metaverse authentication method includes: receiving, Via the terminal device, real identity information and/or Virtual identity information sent by a user, sending an identification request to the blockchain to obtain blockchain identification information, and 10 generating a real identity and/or a Virtual identity based on the blockchain identification information, the real identity information and/ or the Virtual identity information, and sending the real identity and/or the Virtual identity to the blockchain and the terminal deVice respectively for the user to perform authentication.

Description

METAVERSE AUTHENTICATION METHOD, SYSTEM AND APPARATUS,
TERMINAL DEVICE AND STORAGE MEDIUM
TECHNICAL FIELD
[0001] The present disclosure relates to the technical field of blockchain, and in particular, to a metaverse authentication method, a metaverse authentication system and a metaverse authentication apparatus, a terminal device and a storage medium.
BACKGROUND
[0002] As the technology develops, Metaverse has been gradually realized. The Metaverse is the iterative evolution of Internet ecology, and is the real-time information interconnection and the mutual mapping between the real world and the virtual world. This virtual world is persistent, not a copy of the real world, but another form of information existence and perception associated with the real world. The avatars of real-world users in the metaverse can be called digital avatars, usually represented by 2D or 3D avatars, with some actual characteristics of the user. People can interact and transact through their digital avatars, building and strengthening relationships with each other.
[0003] In the Metaverse, each decentralized digital identity (DID) 1s based on blockchain technology. Using decentralized infrastructure to change the control mode of the original identity requires users to recreate their own identities, and digital avatars may correspond to one or more user identities, resulting in a relative differentiation between the virtual world and the real world.
SUMMARY
[0004] The main objective of the present disclosure is to provide a metaverse authentication method, system and apparatus, a terminal device and a storage medium, which aims to solve the problem that a set of identity codes cannot be applied to the virtual world and the real world at the same time.
[0005] In order to achieve the above objective, the present disclosure provides a metaverse authentication method, applied to a server configured for interacting with a terminal device and a blockchain, and the metaverse authentication method includes following operations:
[0006] receiving, via the terminal device, real identity information and/or virtual identity information sent by a user;
[0007] sending an identification request to the blockchain to obtain blockchain identification information; and
[0008] generating a real identity and/or a virtual identity based on the blockchain identification information, the real identity information and/or the virtual identity information, and sending the real identity and/or the virtual identity to the blockchain and the terminal device respectively for the user to perform authentication.
[0009] In an embodiment, the operation of sending the identification request to the blockchain to obtain the blockchain identification information includes:
[0010] sending the identification request to the blockchain to obtain a blockchain type, a blockchain network identity and a blockchain address;
[0011] the operation of generating the real identity and/or the virtual identity based on the blockchain identification information, the real identity information and/or the virtual identity information includes:
[0012] obtaining a real space type and/or a virtual space type according to the real identity information and/or the virtual identity information;
[0013] obtaining the real identity based on the real space type, the blockchain type, the blockchain network identity and the blockchain address; and/or
[0014] obtaining the virtual identity based on the virtual space type, the blockchain type, the blockchain network identity and the blockchain address.
[0015] In an embodiment, the server also interacts with a trusted operator, and after the operation of generating the real identity and/or the virtual identity based on the blockchain identification information, the real identity information and/or the virtual identity information, the metaverse authentication method further includes:
[0016] invoking a real-name information comparison technology provided by the trusted operator, comparing and authenticating the real identity and/or the virtual identity to obtain an authentication result;
[0017] obtaining a real-name information identification according to the authentication result; and
[0018] sending the real-name information identification to the blockchain, for the blockchain to determine whether the real identity and/or the virtual identity have been real-named according to the real-name information identification.
[0019] In order to achieve the above objective, the present disclosure provides a metaverse authentication method, applied to a terminal device configured for interacting with a server and a blockchain, and the metaverse authentication method includes following operations:
[0020] receiving real identity information and virtual identity information sent by a user;
[0021] sending the real identity information and/or the virtual identity information to the server, for the server to send an identification request to the blockchain to obtain blockchain identification information, and generating, via the server, a real identity and/or a virtual identity based on the blockchain identification information, the real identity information and/or the virtual identity information; and
[0022] receiving the real identity and/or the virtual identity sent by the server for the user to perform authentication.
[0023] In order to achieve the above objective, the present disclosure provides a metaverse authentication method, applied to a blockchain configured for interacting with a terminal device and a server, and the metaverse authentication method includes following operations:
[0024] receiving an identification request sent by the server, and sending blockchain identification information to the server according to the identification request;
[0025] receiving and storing a real identity and/or a virtual identity sent by the server; and
[0026] receiving a verification request sent by the user, and querying whether a real identity and/or a virtual identity carried in the verification request is consistent with the real identity and/or the virtual identity, for the user to perform authentication.
[0027] In order to achieve the above objective, the present disclosure provides a metaverse authentication system, including a server and a terminal device;
[0028] the server for receiving real identity information and/or virtual identity information sent by a user through the terminal device; sending an identification request to a blockchain to obtain blockchain identification information; and generating a real identity and/or a virtual identity based on the blockchain identification information, the real identity information and/or the virtual identity information, and sending the real identity and/or the virtual identity to the blockchain and the terminal device respectively for the user to perform authentication;
[0029] the terminal device for receiving real identity information and/or virtual identity information input by the user; sending the real identity information and/or the virtual identity information to the server, for the server to send an identification request to the blockchain to obtain blockchain identification information, and generating a real identity and/or a virtual identity based on the blockchain identification information, the real identity information and/or the virtual identity information; and receiving the real identity and/or the virtual identity sent by the server for the user to perform authentication;
[0030] the blockchain for receiving an identification request sent by the server, and sending blockchain identification information to the server according to the identification request; receiving and storing a real identity and/or a virtual identity sent by the server; receiving a verification request sent by the user, and querying whether real identity and/or virtual identity carried in the verification request is consistent with the real identity and/or the virtual identity, for the user to perform authentication.
[0031] The present disclosure further provides a metaverse authentication apparatus, including:
[0032] a receiving module for receiving real identity information and/or virtual identity information sent by a user through a terminal device;
[0033] a sending module for sending an identification request to the blockchain to obtain blockchain identification information; and
[0034] an identify identification module for generating a real identity and/or a virtual identity based on the blockchain identification information, the real identity information and/or the virtual identity information for the user to perform authentication based on the real identity and/or the virtual identity.
[0035] The present disclosure further provides a terminal device, including a memory, a processor, a metaverse authentication program stored in the memory and executable on the processor, when the metaverse authentication program is executed by the processor, the operations of the metaverse authentication method as described above are implemented.
[0036] The present disclosure further provides a computer-readable storage medium, wherein a metaverse authentication program is stored in the computer-readable storage medium, when the metaverse authentication program is executed by a processor, the operations of the metaverse authentication method as described above are implemented.
[0037] The present disclosure provides a metaverse authentication method, system and apparatus, a terminal device and a storage medium. The metaverse authentication method includes: receiving, via the terminal device, real identity information and/or virtual identity information sent by a user; sending an identification request to the blockchain to obtain blockchain identification information; and generating a real identity and/or a virtual identity based on the blockchain identification information, the real identity information and/or the virtual identity information, and sending the real identity and/or the virtual identity to the blockchain and the terminal device respectively for the user to perform authentication. The generation and authentication of the unified digital identity of the real space and the virtual space in the metaverse scene through the server can solve the problem that a set of identity codes cannot be applied to the virtual world and the real world at the same time. Based on the solution of the present disclosure, starting from the problem that the virtual world and the real world are separated, a set of identities suitable for the virtual world and the real world is designed. The validity of the metaverse authentication method proposed in the present disclosure is verified on this data set, and finally, the problem that a set of identity codes cannot be applied to the virtual world and the real world at the same time is solved by the method of the present disclosure.
BRIEF DESCRIPTION OF THE DRAWINGS
[0038] FIG. 1 is a schematic diagram of functional modules of a terminal device to which a metaverse authentication apparatus belongs to according to an embodiment of the present disclosure.
[0039] FIG. 2 is a schematic flowchart of a metaverse authentication method according to a first exemplary embodiment of the present disclosure.
[0040] FIG. 3 is a schematic flowchart of the metaverse authentication method according to a second exemplary embodiment of the present disclosure. 5 [0041] FIG. 4 is a schematic flowchart of the metaverse authentication method according to a third exemplary embodiment of the present disclosure.
[0042] FIG. 5 is a schematic flowchart of the metaverse authentication method according to a fourth exemplary embodiment of the present disclosure.
[0043] FIG. 6 is a schematic flowchart of the metaverse authentication method according to a fifth exemplary embodiment of the present disclosure.
[0044] FIG. 7 is a schematic diagram of the authentication involved in a blockchain of the metaverse authentication method of the present disclosure.
[0045] The realization of the objective, functional characteristics, and advantages of the present disclosure are further described with reference to the accompanying drawings.
DETAILED DESCRIPTION OF THE EMBODIMENTS
[0046] It should be understood that the specific embodiments described herein are only used to explain the present disclosure, but not to limit the present disclosure.
[0047] The main solutions of the embodiments of the present disclosure are: receiving, via the terminal device, real identity information and/or virtual identity information sent by a user; sending an identification request to the blockchain to obtain blockchain identification information; and generating a real identity and/or a virtual identity based on the blockchain identification information, the real identity information and/or the virtual identity information, and sending the real identity and/or the virtual identity to the blockchain and the terminal device respectively for the user to perform authentication. The generation and authentication of the unified digital identity of the real space and the virtual space in the metaverse scene through the server can solve the problem that a set of identity codes cannot be applied to the virtual world and the real world at the same time. Based on the solution of the present disclosure, starting from the problem that the virtual world and the real world are separated, a set of identities suitable for the virtual world and the real world is designed. The validity of the metaverse authentication method proposed in the present disclosure is verified on this data set, and finally, the problem that a set of identity codes cannot be applied to the virtual world and the real world at the same time is solved by the method of the present disclosure.
[0048] The embodiments of the present disclosure consider that in the metaverse, each decentralized digital identity (DID) is based on blockchain technology. Using decentralized infrastructure to change the control mode of the original identity requires users to recreate their own identities, and digital avatars may correspond to one or more user identities, resulting in a relative differentiation between the virtual world and the real world.
[0049] Therefore, the solutions of the embodiments of the present disclosure start from the problem that the virtual world and the real world are separated, a set of identities suitable for the virtual world and the real world is designed. The validity of the metaverse authentication method proposed in the present disclosure is verified on this data set, and finally, the problem that a set of identity codes cannot be applied to the virtual world and the real world at the same time is solved by the method of the present disclosure.
[0050] As shown in FIG. 1, FIG. 1 is a schematic diagram of functional modules of a terminal device to which a metaverse authentication apparatus belongs to according to an embodiment of the present disclosure. The metaverse authentication apparatus may be an apparatus independent of the terminal device, capable of generating and verifying a real identity and/or a virtual identity, which may be carried on the terminal device in the form of hardware or software. The terminal device may be an intelligent mobile terminal with a data processing function, such as a mobile phone or a tablet computer, or a fixed terminal device or a server with a data processing function.
[0051] In this embodiment, the terminal device to which the metaverse authentication apparatus belongs at least includes an output module 110, a processor 120, a memory 130 and a communication module 140.
[0052] The operating system and the metaverse authentication program are stored in the memory 130. The metaverse authentication apparatus can receive the real identity information and/or virtual identity information sent by the user through the terminal device; sending an identification request to the blockchain to obtain blockchain identification information; and generate a real identity and/or a virtual identity based on the blockchain identification information, the real identity information and/or the virtual identity information. The information are stored in the memory 130. The output module 110 may be a display screen or the like. The communication module 140 may include a WIFI module, a mobile communication module, a
Bluetooth module, or the like, and communicate with an external device or a server through the communication module 140.
[0053] When the metaverse authentication program stored in the memory 130 is executed by the processor, the following operations are implemented:
[0054] receiving, via the terminal device, real identity information and/or virtual identity information sent by a user;
[0055] sending an identification request to the blockchain to obtain blockchain identification information; and
[0056] generating a real identity and/or a virtual identity based on the blockchain identification information, the real identity information and/or the virtual identity information, and sending the real identity and/or the virtual identity to the blockchain and the terminal device respectively for the user to perform authentication.
[0057] Further, when the metaverse authentication program stored in the memory 130 is executed by the processor, the following operations are implemented:
[0058] sending the identification request to the blockchain to obtain a blockchain type, a blockchain network identity and a blockchain address.
[0059] Further, when the metaverse authentication program stored in the memory 130 is executed by the processor, the following operations are implemented:
[0060] obtaining a real space type and/or a virtual space type according to the real identity information and/or the virtual identity information;
[0061] obtaining the real identity based on the real space type, the blockchain type, the blockchain network identity and the blockchain address;
[0062] obtaining the virtual identity based on the virtual space type, the blockchain type, the blockchain network identity and the blockchain address.
[0063] Further, when the metaverse authentication program stored in the memory 130 is executed by the processor, the following operations are implemented:
[0064] using a real-name information comparison technology provided by the trusted operator, comparing and authenticating the real identity and/or the virtual identity to obtain an authentication result;
[0065] obtaining a real-name information identification according to the authentication result; and
[0066] sending the real-name information identification to the blockchain, for the blockchain to determine whether the real identity and/or the virtual identity have been real-named according to the real-name information identification.
[0067] Further, when the metaverse authentication program stored in the memory 130 is executed by the processor, the following operations are implemented:
[0068] receiving real identity information and/or virtual identity information sent by a user;
[0069] sending the real identity information and/or the virtual identity information to the server, for the server to send an identification request to the blockchain to obtain blockchain identification information, and generating, via the server, a real identity and/or a virtual identity based on the blockchain identification information, the real identity information and/or the virtual identity information; and
[00790] receiving the real identity and/or the virtual identity sent by the server for the user to perform authentication.
[0071] Further, when the metaverse authentication program stored in the memory 130 is executed by the processor, the following operations are implemented:
[0072] receiving an identification request sent by the server, and sending blockchain identification information to the server according to the identification request;
[0073] receiving and storing a real identity and/or a virtual identity sent by the server; and
[0074] receiving a verification request sent by the user, and querying whether real identity and/or virtual identity carried in the verification request is consistent with the real identity and/or the virtual identity, for the user to perform authentication.
[0075] The solutions of the embodiments are: receiving, via the terminal device, real identity information and/or virtual identity information sent by a user; sending an identification request to the blockchain to obtain blockchain identification information; and generating a real identity and/or a virtual identity based on the blockchain identification information, the real identity information and/or the virtual identity information, and sending the real identity and/or the virtual identity to the blockchain and the terminal device respectively for the user to perform authentication. The generation and authentication of the unified digital identity of the real space and the virtual space in the metaverse scene through the server can solve the problem that a set of identity codes cannot be applied to the virtual world and the real world at the same time.
Based on the solution of the present disclosure, starting from the problem that the virtual world and the real world are separated, a set of identities suitable for the virtual world and the real world is designed. The validity of the metaverse authentication method proposed in the present disclosure is verified on this data set, and finally, the problem that a set of identity codes cannot be applied to the virtual world and the real world at the same time is solved by the method of the present disclosure.
[0076] Based on the above-mentioned terminal device architecture but not limited to the above-mentioned architecture, the method embodiments of the present disclosure are proposed.
[0077] As shown in FIG. 2, FIG. 2 is a schematic flowchart of a metaverse authentication method according to a first exemplary embodiment of the present disclosure. The metaverse authentication method is applied to a server. The metaverse authentication method includes following operations:
[0078] Operation S210, receiving, via the terminal device, real identity information and/or virtual identity information sent by a user.
[0079] As the technology develops, Metaverse has been gradually realized. The Metaverse is a virtual digital world parallel to the real world constructed using various scientific technologies and high-speed computing equipment. The technological foundations of the Metaverse are considered to include computers, network equipment, integrated circuits, communication components, new display systems, mixed reality devices, precision free-form optical systems, and high-resolution, high-resolution cameras. The industrial chain formed by Metaverse includes micro-nano processing, high-end manufacturing, high-precision maps, optical manufacturing, or the like, such as diffractive waveguide lenses, micro-display and chip manufacturing, and related software industries. The Metaverse is the iterative evolution of Internet ecology, and is real-time information interconnection and mutual mapping between the real world and the virtual world.
This virtual world is persistent, not a copy of the real world, but another form of information existence and perception associated with the real world. The avatars of real-world users in the metaverse can be called digital avatars, usually represented by 2D or 3D avatars, with some actual characteristics of the user. People can interact and transact through their digital avatars, building and strengthening relationships with each other.
[0080] In the Metaverse, each decentralized digital identity (DID) is based on blockchain technology. Using decentralized infrastructure to change the control mode of the original identity requires users to recreate their own identities, and digital avatars may correspond to one or more user identities, resulting in a relative differentiation between the virtual world and the real world.
In this context, a metaverse authentication method is proposed.
[0081] The server receives the real identity information and/or the virtual identity information sent by the user through the terminal device. The real identity information includes but is not limited to user name, ID number, start date of the validity period, end date of the validity period, front and back photos of the ID card, and user’s facial photo. The virtual identity information includes but is not limited to user name, blockchain address, avatar NFT, and voice
NFT.
[0082] Operation S220, sending an identification request to the blockchain to obtain blockchain identification information.
[0083] The server sends the identification request to the blockchain to obtain the blockchain identification information. The blockchain identification information includes at least a blockchain type, a blockchain network identity and a blockchain address.
[0084] Operation S230, generating a real identity and/or a virtual identity based on the blockchain identification information, the real identity information and/or the virtual identity information, and sending the real identity and/or the virtual identity to the blockchain and the terminal device respectively for the user to perform authentication.
[0085] The identity in this embodiment of the present disclosure may be a DID-based identity, an NFT-based identity, or an identity based on a D2D device, which is not limited in this embodiment of the present disclosure.
[0086] In this embodiment of the present disclosure, the DID-based identity is preferred. The operation of generating the real identity and/or the virtual identity includes: obtaining a real space type and/or a virtual space type according to the real identity information and/or the virtual identity information; obtaining the real identity based on the real space type, the blockchain type, the blockchain network identity and the blockchain address; obtaining the virtual identity based on the virtual space type, the blockchain type, the blockchain network identity and the blockchain address.
[0087] The real identity and/or the virtual identity is written on the blockchain for any user to verify the identity information of the user to which the real identity and/or virtual identity belongs by querying the real identity and/or the virtual identity.
[0088] Finally, the terminal device receives the real identity and/or virtual identity sent by the server. When a user needs to authenticate in any scenario, the real identity and the virtual identity provided by the terminal device are used to prove their identity to other users. Users or other users can send a verification request to the blockchain, and the verification request carries the real identity and virtual identity that need to be verified. The blockchain receives the verification request, and it is possible to query whether the real identify and the virtual identify are stored on the chain of the blockchain according to the real identity and the virtual identity. If the query is successful, the authentication is passed; otherwise, the authentication is not passed.
The scenarios include, but are not limited to: taking a plane or train and long-distance bus, staying in a hotel, purchasing controlled commodities, sending express delivery, drone registration, account and phone number application.
[0089] The solutions of this embodiment includes: receiving, via the terminal device, real identity information and/or virtual identity information sent by a user; sending an identification request to the blockchain to obtain blockchain identification information; and generating a real identity and/or a virtual identity based on the blockchain identification information, the real identity information and/or the virtual identity information, and sending the real identity and/or the virtual identity to the blockchain and the terminal device respectively for the user to perform authentication. The generation and authentication of the unified digital identity of the real space and the virtual space in the metaverse scene through the server can solve the problem that a set of identity codes cannot be applied to the virtual world and the real world at the same time.
[0090] As shown in FIG. 3, FIG. 3 1s a schematic flowchart of the metaverse authentication method according to a second exemplary embodiment of the present disclosure. Based on the embodiment shown in FIG. 2, the operation S220 of sending the identification request to the blockchain to obtain the blockchain identification information includes:
[0091] Operation S310, sending the identification request to the blockchain to obtain a i blockchain type, a blockchain network identity and a blockchain address.
[0092] The server sends the identification request to the blockchain to obtain the blockchain type, the blockchain network identity and one of the addresses on the blockchain. The blockchain address of the user’s corresponding real identity and/or virtual identity is the same blockchain address, and is the only address on the current blockchain. In addition, the blockchain address is used as a method of user identity verification, and the unique address on the blockchain chain binds the real identity and/or virtual identity together for query and verification of the user's identity when verifying the identity.
[0093] Operation S320, obtaining a real space type and/or a virtual space type according to the real identity information and/or the virtual identity information.
[0094] If the server detects that the identity information input by the user is real identity information, the space type is set to be the real space type. If the server detects that the identity information input by the user is virtual identity information, the space type is set to be the virtual space type.
[0095] Operation S330, obtaining the real identity based on the real space type, the blockchain type, the blockchain network identity and the blockchain address.
[0096] The real identity is obtained based on the real space type, the blockchain type, the blockchain network identity and the blockchain address, for users to authenticate in the real world with real identities. For example, DID:Real:Ethereum:1:0XABCDEFG123456789.
[0097] The specific format of the real identity is shown in the following table.
Format of | DID SpaceType ChainType | ChainID ChainTypeAddress
De
Description | Fixed | Space type | Blockchain | Blockchain Unique address on the of ID prefix | (Real) type network blockchain identity
[0098] Operation S340, obtaining the virtual identity based on the virtual space type, the blockchain type, the blockchain network identity and the blockchain address.
[0099] The virtual identity is obtained based on the virtual space type, the blockchain type, the blockchain network identity and the blockchain address, for users to authenticate in the virtual world with virtual identities. For example,
DID: Virtual:Ethereum: 1:0XABCDEFG123456789.
[0100] The specific format of the virtual identity is shown in the following table.
Format of | DID SpaceType ChainType | ChainID ChainTypeAddress oe of ID prefix | (Virtual) type network blockchain om fe MT
[0101] The embodiments of this embodiment include: sending the identification request to the blockchain to obtain a blockchain type, a blockchain network identity and a blockchain address; obtaining a real space type and/or a virtual space type according to the real identity information and/or the virtual identity information; obtaining the real identity based on the real space type, the blockchain type, the blockchain network identity and the blockchain address; and/or obtaining the virtual identity based on the virtual space type, the blockchain type, the blockchain network identity and the blockchain address. Each blockchain address is the unique address on the current blockchain chain, which binds real identities and/or virtual identities together to solve the problem that a set of identity codes cannot be applied to both the virtual world and the real world at the same time.
[0102] As shown in FIG. 4, FIG. 4 is a schematic flowchart of the metaverse authentication method according to a third exemplary embodiment of the present disclosure. Based on the embodiment shown in FIG. 2, after the operation S230 of generating the real identity and/or the virtual identity based on the blockchain identification information, the real identity information and/or the virtual identity information, the metaverse authentication method further includes:
[0103] Operation S410, invoking a real-name information comparison technology provided by the trusted operator, comparing and authenticating the real identity and/or the virtual identity to obtain an authentication result.
[0104] The server invokes the Cyber Trusted Identity (CTID) real-name information comparison technical service provided by the trusted operator to compare and authenticate the identity information. Network identity is an Internet identity authentication protocol, which has uniqueness and non-repudiation of information. Through the real-name information comparison technical service, it can be queried whether other users except the current user are using the real identity and/or virtual identity corresponding to the current user.
[0105] Operation S420, obtaining a real-name information identification according to the authentication result.
[0106] After passing the authentication, the trusted operator will authenticate the result to the server. In this embodiment, it is preferable to use Blockchain Identity (BID) as the authentication result, and it may also be other information data that can be used as authentication, which is not limited in this embodiment.
[0107] Operation S430, sending the real-name information identification to the blockchain, for the blockchain to determine whether the real identity and/or the virtual identity have been real-named according to the real-name information identification.
[0108] The real-name information identification is sent to the blockchain, and the blockchain can determine whether the real identify and/or virtual identify have been real-named according to the real-name information ID. Further verification of real-name identification through blockchain can reduce the probability of fraud, slander, personal attacks, etc., and is conducive to the establishment of a harmonious social management ecological environment.
[0109] The solution of this embodiment includes: invoking a real-name information comparison technology provided by the trusted operator, comparing and authenticating the real identity and/or the virtual identity to obtain an authentication result; obtaining a real-name information identification according to the authentication result, and sending the real-name information identification to the blockchain, for the blockchain to determine whether the real identity and/or the virtual identity have been real-named according to the real-name information identification. By invoking the CTID real-name information comparison technical service provided by the trusted operator, the identity information is compared and authenticated, so that the identity authentication has a strong authority.
[0110] As shown in FIG. 5, FIG. 5 is a schematic flowchart of the metaverse authentication method according to a fourth exemplary embodiment of the present disclosure. The metaverse authentication method is applied to a terminal device, and includes the following operations:
[0111] Operation S510, receiving real identity information and virtual identity information sent by a user.
[0112] The terminal device receives the real identity information and/or the virtual identity information sent by the user. The real identity information includes but is not limited to user name, ID number, start date of the validity period, end date of the validity period, front and back photos of the ID card, and user’s facial photo. The virtual identity information includes but is not limited to user name, blockchain address, avatar NFT, and voice NFT.
[0113] Operation S520, sending the real identity information and/or the virtual identity information to the server, for the server to send an identification request to the blockchain to obtain blockchain identification information, and generating, via the server, a real identity and/or a virtual identity based on the blockchain identification information, the real identity information and/or the virtual identity information.
[0114] The terminal device sends the real identity information and/or the virtual identity information to the server, for the server to send an identification request to the blockchain to obtain blockchain identification information, and generates, via the server, the real identity and/or the virtual identity based on the blockchain identification information, the real identity information and/or the virtual identity information. The identity in this embodiment of the present disclosure may be a DID-based identity, an NFT-based identity, or an identity based on a
D2D device, which is not limited in this embodiment of the present disclosure. In this embodiment of the present disclosure, the DID-based identity is preferred. The real identity and/or the virtual identity is generated based on the blockchain identification information, the real identity information and/or the virtual identity information. The real identify and/or the virtual identity are sent to the blockchain and the terminal device, respectively, for the user to perform authentication.
[0115] Operation S530, receiving the real identity and/or the virtual identity sent by the server for the user to perform authentication.
[0116] The terminal device receives the real identity and/or the virtual identity sent by the server. When a user needs to authenticate in any scenario, the real identity and the virtual identity provided by the terminal device are used to prove their identity to other users. Other users query whether the real identity and virtual identity are stored on the chain of the blockchain according to the real identity and virtual identity. If the query is successful, the authentication is passed; otherwise, the authentication is not passed. The scenarios include, but are not limited to: taking a plane or train and long-distance bus, staying in a hotel, purchasing controlled commodities, sending express delivery, drone registration, account and phone number application.
[0117] The solutions of this embodiment includes: receiving real identity information and virtual identity information sent by a user; sending the real identity information and/or the virtual identity information to the server, for the server to send an identification request to the blockchain to obtain blockchain identification information, and generating, via the server, a real identity and/or a virtual identity based on the blockchain identification information, the real identity information and/or the virtual identity information; and receiving the real identity and/or the virtual identity sent by the server for the user to perform authentication. By designing a set of identities applicable to the virtual world and the real world, the problem that a set of identity codes cannot be applied to both the virtual world and the real world at the same time is solved.
[0118] As shown in FIG. 6, FIG. 6 1s a schematic flowchart of the metaverse authentication method according to a fifth exemplary embodiment of the present disclosure. The metaverse authentication method is applied to a blockchain, and includes the following operations:
[0119] Operation S610, receiving an identification request sent by the server, and sending blockchain identification information to the server according to the identification request.
[0120] The blockchain receives the identification request sent by the server, and sends the blockchain identification information to the server according to the identification request. The blockchain identification information includes at least a blockchain type, a blockchain network identity and a blockchain address.
[0121] Operation S620, receiving and storing a real identity and/or a virtual identity sent by the server.
[0122] The blockchain receives the real identity and/or virtual identity generated by the server, and stores it to one of the addresses on the blockchain. The blockchain address of the user’s corresponding real identity and/or virtual identity is the same blockchain address, and is the only address on the current blockchain. In addition, the blockchain address is used as a method of user identity verification, and the unique address on the blockchain chain binds the real identity and/or virtual identity together for query and verification of the user's identity when verifying the identity.
[0123] Operation S630, receiving a verification request sent by the user, and querying whether real identity and/or virtual identity carried in the verification request is consistent with the real identity and/or the virtual identity, for the user to perform authentication.
[0124] As shown in FIG. 7, FIG. 7 is a schematic diagram of the authentication involved in a blockchain of the metaverse authentication method of the present disclosure. When a user needs to authenticate in any scenario, the real identity and the virtual identity provided by the terminal device are used to prove their identity to other users. Users or other users can send a verification request to the blockchain, and the verification request carries the real identity and virtual identity that need to be verified. The blockchain receives the verification request, and it is possible to query whether the real identify and the virtual identify are stored on the chain of the blockchain according to the real identity and the virtual 1dentity. If the query is successful, the authentication is passed; otherwise, the authentication is not passed. The scenarios include, but are not limited to: taking a plane or train and long-distance bus, staying in a hotel, purchasing controlled commodities, sending express delivery, drone registration, account and phone number application.
[0125] The solution of this embodiment includes: receiving an identification request sent by the server, and sending blockchain identification information to the server according to the identification request; receiving and storing a real identity and/or a virtual identity sent by the server; and receiving a verification request sent by the user, and querying whether real identity and/or virtual identity carried in the verification request is consistent with the real identity and/or the virtual identity, for the user to perform authentication. The real identities and/or the virtual identities are stored on the blockchain, and the generation and authentication of unified digital identities in real space and virtual space in the metaverse scene are realized, and the versatility and practicability are improved.
[0126] Besides, the embodiments of the present disclosure further provide a metaverse authentication system, including a server and a terminal device;
[0127] the server for receiving real identity information and/or virtual identity information sent by a user through the terminal device; sending an identification request to a blockchain to obtain blockchain identification information; and generating a real identity and/or a virtual identity based on the blockchain identification information, the real identity information and/or the virtual identity information, and sending the real identity and/or the virtual identity to the blockchain and the terminal device respectively for the user to perform authentication;
[0128] the terminal device for receiving real identity information and/or virtual identity information input by the user; sending the real identity information and/or the virtual identity information to the server, for the server to send an identification request to the blockchain to obtain blockchain identification information, and generating a real identity and/or a virtual identity based on the blockchain identification information, the real identity information and/or the virtual identity information; and receiving the real identity and/or the virtual identity sent by the server for the user to perform authentication;
[0129] the blockchain for receiving an identification request sent by the server, and sending blockchain identification information to the server according to the identification request; receiving and storing a real identity and/or a virtual identity sent by the server; receiving a verification request sent by the user, and querying whether real identity and/or virtual identity carried in the verification request is consistent with the real identity and/or the virtual identity, for the user to perform authentication.
[0130] In addition, the embodiments of the present disclosure further provide a metaverse authentication apparatus, including:
[0131] a receiving module for receiving real identity information and/or virtual identity information sent by a user through a terminal device;
[0132] a sending module for sending an identification request to the blockchain to obtain blockchain identification information; and
[0133] an identify identification module for generating a real identity and/or a virtual identity based on the blockchain identification information, the real identity information and/or the virtual identity information for the user to perform authentication based on the real identity and/or the virtual identity. The principle and implementation process of the metaverse authentication in this embodiment refer to the above-mentioned embodiments, which will not be repeated here.
[0134] Besides, the embodiments of the present disclosure further provide a terminal device, including a memory, a processor, a metaverse authentication program stored in the memory and executable on the processor, when the metaverse authentication program is executed by the processor, the operations of the metaverse authentication method as described above are implemented.
[0135] Since the metaverse authentication program is executed by the processor, all the technical solutions of the foregoing embodiments are adopted, there are at least all the beneficial effects brought about by all the technical solutions of all the foregoing embodiments, which will not be repeated herein.
[0136] Besides, the embodiments of the present disclosure further provide a computer-readable storage medium. A metaverse authentication program is stored in the computer-readable storage medium, when the metaverse authentication program is executed by a processor, the operations of the metaverse authentication method as described above are implemented.
[0137] Since the metaverse authentication program is executed by the processor, all the technical solutions of the foregoing embodiments are adopted, there are at least all the beneficial effects brought about by all the technical solutions of all the foregoing embodiments, which will not be repeated herein.
[0138] Compared with the related art, the embodiments of the present disclosure provide a metaverse authentication method, system and apparatus, a terminal device and a storage medium.
The metaverse authentication method includes: receiving, via the terminal device, real identity information and/or virtual identity information sent by a user; sending an identification request to the blockchain to obtain blockchain identification information; and generating a real identity and/or a virtual identity based on the blockchain identification information, the real identity information and/or the virtual identity information, and sending the real identity and/or the virtual identity to the blockchain and the terminal device respectively for the user to perform authentication. The generation and authentication of the unified digital identity of the real space and the virtual space in the metaverse scene through the server can solve the problem that a set of identity codes cannot be applied to the virtual world and the real world at the same time.
Based on the solution of the present disclosure, starting from the problem that the virtual world and the real world are separated, a set of identities suitable for the virtual world and the real world is designed. The validity of the metaverse authentication method proposed in the present disclosure is verified on this data set, and finally, the problem that a set of identity codes cannot be applied to the virtual world and the real world at the same time is solved by the method of the present disclosure.
[0139] It should be noted that in this document, the terms “comprise”, “include” or any other variants thereof are intended to cover a non-exclusive inclusion. Thus, a process, method, article, or system that includes a series of elements not only includes those elements, but also includes other elements that are not explicitly listed, or also includes elements inherent to the process, method, article, or system. If there are no more restrictions, the element defined by the sentence
“including a...” does not exclude the existence of other identical elements in the process, method, article or system that includes the element.
[0140] The serial numbers of the foregoing embodiments of the present disclosure are only for description, and do not represent the advantages and disadvantages of the embodiments.
[0141] Through the description of the above embodiment, those skilled in the art can clearly understand that the above-mentioned embodiments can be implemented by software plus a necessary general hardware platform, of course, it can also be implemented by hardware, but in many cases the former is a better implementation. Based on this understanding, the technical solution of the present disclosure can be embodied in the form of software product in essence or the part that contributes to the existing technology. The computer software product is stored on a storage medium (such as ROM/RAM, magnetic disk, optical disk) as described above, including several instructions to cause a terminal device (which can be a mobile phone, a computer, a server, a controlled terminal, or a network device, etc.) to execute the method described in each embodiment of the present disclosure.
[0142] The above are only some embodiments of the present disclosure, and do not limit the scope of the present disclosure thereto. Under the inventive concept of the present disclosure, equivalent structural transformations made according to the description and drawings of the present disclosure, or direct/indirect application in other related technical fields are included in the scope of the present disclosure.

Claims (9)

CONCLUSIESCONCLUSIONS 1. Metaverse authenticatiemethode, toegepast op een server die is geconfigureerd voor interactie met een eindinrichting en een blockchain, waarbij de metaverse authenticatiemethode de volgende bewerkingen bevat: het ontvangen, via de eindinrichting, van echte identiteitsinformatie en/of virtuele identiteitsinformatie die door een gebruiker is verzonden; het verzenden van een identificatieverzoek naar de blockchain om blockchain identificatie-informatie te verkrijgen; en het genereren van een echte identiteit en/of een virtuele identiteit op basis van de informatie van de blockchain-identificatie, de echte identiteitsnformatie en/of de virtuele identiteitsinformatie, en het verzenden van de echte identiteit en/of de virtuele identiteit naar respectievelijk de blockchain en de eindinrichting voor authenticatie uitvoering door de gebruiker1. Metaverse authentication method applied to a server configured to interact with a terminal device and a blockchain, where the metaverse authentication method includes the following operations: receiving, via the terminal device, real identity information and/or virtual identity information provided by a user sent; sending an identification request to the blockchain to obtain blockchain identification information; and generating a real identity and/or a virtual identity based on the information of the blockchain identification, the real identity information and/or the virtual identity information, and transmitting the real identity and/or the virtual identity to the respective blockchain and the end device for authentication performed by the user 2. Metaverse authenticatiemethode volgens conclusie 1, waarbij de bewerking van het verzenden van het identificatieverzoek naar de blockchain om de informatie van de blockchain-identificatie te verkrijgen bevat: het verzenden van het identificatieverzoek naar de blockchain om een blockchain-type, een blockchain-netwerkidentiteit en een blockchain-adres te verkrijgen; de bewerking van het genereren van de echte identiteit en/of de virtuele identiteit op basis van de informatie van de blockchain-identificatie, de echte identiteitsinformatie en/of de virtuele identiteitsinformatie bevat: het verkrijgen van een echt ruimtetype en/of een virtueel ruimtetype volgens de echte identiteitsinformatie en/of de virtuele identiteitsinformatie; het verkrijgen van de echte identiteit op basis van het echte ruimtetype, het blockchain-type, de blockchain-netwerkidentiteit en het blockchain-adres; en/of het verkrijgen van de virtuele identiteit op basis van het virtuele ruimtetype, het blockchain-type, de blockchain-netwerkidentiteit en het blockchain-adres.The metaverse authentication method of claim 1, wherein the operation of sending the identification request to the blockchain to obtain the information of the blockchain identification includes: sending the identification request to the blockchain to obtain a blockchain type, a blockchain network identity and obtain a blockchain address; the operation of generating the real identity and/or the virtual identity based on the information of the blockchain identification, the real identity information and/or the virtual identity information includes: obtaining a real space type and/or a virtual space type according to the real identity information and/or the virtual identity information; getting the real identity based on the real space type, blockchain type, blockchain network identity and blockchain address; and/or obtaining the virtual identity based on the virtual space type, blockchain type, blockchain network identity, and blockchain address. 3. Metaverse authenticatiemethode volgens conclusie 1, waarbij de server ook interageert met een vertrouwde operator, en na de bewerking van het genereren van de echte identiteit en/of de virtuele identiteit op basis van informatie van de blockchain-identificatie, de echte identiteitsinformatie en/of de virtuele identiteitsinformatie, de metaverse authenticatiemethode verder bevat:The metaverse authentication method according to claim 1, wherein the server also interacts with a trusted operator, and after the operation of generating the real identity and/or the virtual identity based on information of the blockchain identification, the real identity information and/or whether the virtual identity information, the metaverse authentication method further contains: het inroepen van een echte-naam informatievergelijkingstechnologie geleverd door de vertrouwde operator, waarbij de echte identiteit en/of de virtuele identiteit wordt vergeleken en geauthentificeerd om een authenticatieresultaat te verkrijgen; het verkrijgen van een echte-naam informatie-identificatie volgens het authenticatieresultaat; en het verzenden van de echte-naam informatie-identificatie naar de blockchain, zodat de blockchain kan bepalen of de echte identiteit en/of de virtuele identiteit een echte-naam zijn geweest, die overeen komt met de echte-naam informatie-identificatie.invoking a real name information matching technology provided by the trusted operator, comparing and authenticating the real identity and/or the virtual identity to obtain an authentication result; obtaining a real name information identification according to the authentication result; and sending the real name information identifier to the blockchain so that the blockchain can determine whether the real identity and/or the virtual identity has been a real name that matches the real name information identifier. 4. Metaverse authenticatiemethode, toegepast op een eindinrichting die geconfigureerd is voor interactie met een server en een blockchain, waarbij de metaverse authenticatiemethode de volgende bewerkingen bevat: het ontvangen van echte identiteitsinformatie en/of virtuele identiteitsinformatie die door een gebruiker is verzonden; het verzenden van de echte identiteitsinformatie en/of de virtuele identiteitsinformatie naar de server, zodat de server een identificatieverzoek naar de blockchain kan sturen om blockchain-identificatie-informatie te verkrijgen, en via de server een echte identiteit en/of een virtuele identiteit genereert op basis van de blockchain-identificatie-informatie, de echte 1dentiteitsinformatie en/of de virtuele identiteitsinformatie; en het ontvangen van de echte identiteit en/of de virtuele identiteit die door de server is verzonden zodat de gebruiker authenticatie kan uitvoeren.4. A metaverse authentication method applied to a terminal device configured to interact with a server and a blockchain, the metaverse authentication method including the following operations: receiving real identity information and/or virtual identity information sent by a user; sending the real identity information and/or the virtual identity information to the server, so that the server can send an identification request to the blockchain to obtain blockchain identification information, and through the server generate a real identity and/or a virtual identity on based on the blockchain identification information, the real identity information and/or the virtual identity information; and receiving the real identity and/or the virtual identity sent by the server so that the user can perform authentication. 5. Metaverse authenticatiemethode, toegepast op een blockchain die is geconfigureerd voor interactie met een eindinrichting en een server, waarbij de metaverse authenticatiemethode de volgende bewerkingen bevat: het ontvangen van een identificatieverzoek dat door de server is verzonden en het verzenden van blockchain-identificatie-informatie naar de server volgens het identificatieverzoek; het ontvangen en opslaan van een echte identiteit en/of een virtuele identiteit die door de server Is verzonden; en het ontvangen van een verificatieverzoek dat door de gebruiker is verzonden en het vragen of een echte identiteit en/of een virtuele identiteit die in het verificatieverzoek wordt opgenomen, consistent is met de echte identiteit en/of de virtuele identiteit, zodat de gebruiker authenticatie kan uitvoeren.5. Metaverse authentication method, applied to a blockchain configured to interact with an end device and a server, where the metaverse authentication method includes the following operations: receiving an identification request sent by the server and sending blockchain identification information to the server according to the identification request; receiving and storing a real identity and/or a virtual identity sent by the server; and receiving a verification request sent by the user and asking whether a real identity and/or a virtual identity included in the verification request is consistent with the real identity and/or the virtual identity, so that the user can authenticate to carry out. 6. Metaverse authenticatiesysteem, dat een server en een eindinrichting bevat;6. Metaverse authentication system, which includes a server and a terminal device; de server voor het ontvangen van echte identiteitsinformatie en/of virtuele identiteitsinformatie die door een gebruiker via de eindinrichting verzonden is; het verzenden van een identificatieverzoek naar een blockchain om blockchain-identificatie-informatie te verkrijgen; en het genereren van een echte identiteit en/of een virtuele identiteit op basis van de blockchain-identificatie-informatie, de echte identiteitsinformatie en/of de virtuele identiteitsinformatie, en het verzenden van de echte identiteit en/of de virtuele identiteit naar respectievelijk de blockchain en de eindinrichting voor authenticatie uitvoering door de gebruiker; de eindinrichting voor het ontvangen van echte identiteitsinformatie en/of virtuele identiteitsinformatie die door een gebruiker ingevoerd is; het verzenden van de echte identiteitsinformatie en/of de virtuele identiteitsinformatie naar de server zodat de server een identificatieverzoek naar een blockchain kan zenden om blockchain-identificatie-informatie te verkrijgen, en het genereren van een echte identiteit en/of een virtuele identiteit op basis van de blockchain-identificatie-informatie, de echte identiteitsinformatie en/of de virtuele identiteitsinformatie, en het ontvangen van de echte identiteit en/of de virtuele 1dentiteit verzonden door de server zodat de gebruiker authenticatie kan uitvoeren; de blockchain voor het ontvangen van een identificatieverzoek dat door de server is verzonden en het verzenden van blockchain-identificatie-informatie naar de server volgens het identificatieverzoek; het ontvangen en opslaan van een echte identiteit en/of een virtuele identiteit die door de server is verzonden; het ontvangen van een verificatieverzoek dat door de gebruiker is verzonden en het vragen of de echte identiteit en/of virtuele identiteit die in het verificatieverzoek wordt opgenomen, consistent is met de echte identiteit en/of de virtuele identiteit, voor authenticatie uitvoering door de gebruiker.the server for receiving real identity information and/or virtual identity information sent by a user through the terminal device; sending an identification request to a blockchain to obtain blockchain identification information; and generating a real identity and/or a virtual identity based on the blockchain identification information, the real identity information and/or the virtual identity information, and transmitting the real identity and/or the virtual identity to the blockchain, respectively and the terminal device for authentication performed by the user; the terminal device for receiving real identity information and/or virtual identity information entered by a user; sending the real identity information and/or the virtual identity information to the server so that the server can send an identification request to a blockchain to obtain blockchain identification information, and generating a real identity and/or a virtual identity based on the blockchain identification information, the real identity information and/or the virtual identity information, and receiving the real identity and/or the virtual identity information sent by the server so that the user can perform authentication; the blockchain for receiving an identification request sent by the server and sending blockchain identification information to the server according to the identification request; receiving and storing a real identity and/or a virtual identity sent by the server; receiving a verification request sent by the user and asking whether the real identity and/or virtual identity included in the verification request is consistent with the real identity and/or virtual identity, for authentication to be performed by the user. 7. Metaverse authenticatie apparaat, bevattende: een ontvangende module voor het ontvangen van echte identiteitsinformatie en/of virtuele identiteitsinformatie verzonden door een gebruiker via een eindinrichting ; een verzendingsmodule voor het verzenden van een identificatieverzoek naar de blockchain om blockchain identificatie-informatie te verkrijgen; en een identificerende identificatiemodule voor het genereren van een echte identiteit en/of een virtuele identiteit op basis van de blockchain-identificatie-informatie, de echte identiteitsinformatie en/of de virtuele identiteitsinformatie voor authenticatie uitvoering door de gebruiker op basis van de echte identiteit en/of de virtuele identiteit.7. A metaverse authentication device, comprising: a receiving module for receiving real identity information and/or virtual identity information sent by a user via a terminal device; a transmission module for sending an identification request to the blockchain to obtain blockchain identification information; and an identifying identification module for generating a real identity and/or a virtual identity based on the blockchain identification information, the real identity information and/or the virtual identity information for authentication performed by the user based on the real identity and/or or the virtual identity. 8. Eindinrichting, die een geheugen, een processor, een metaverse authenticatieprogramma dat opgeslagen is in het geheugen en het uitvoerbare bestand op de processor bevat; waarbij bij het uitvoeren van het metaverse authenticatieprogramma door de processor de bewerkingen van de metaverse authenticatiemethode volgens één van de conclusies 1 tot en met 3 implementeerbaar zijn.8. A terminal device comprising a memory, a processor, a metaverse authentication program stored in the memory and the executable on the processor; wherein when the processor executes the metaverse authentication program, the operations of the metaverse authentication method according to any one of claims 1 to 3 are implementable. 9. Computerleesbaar opslagmedium, waarin een metaverse authenticatieprogramma in het computerleesbare opslagmedium opgeslagen is; waarbij bij het uitvoeren het metaverse authenticatieprogramma door een processor, de bewerkingen van de metaverse authenticatiemethode volgens één van de conclusies 1 tot en met 3 implementeerbaar zijn .9. Computer readable storage medium, wherein a metaverse authentication program is stored in the computer readable storage medium; wherein upon execution of the metaverse authentication program by a processor, the operations of the metaverse authentication method according to any one of claims 1 to 3 are implementable.
NL2032458A 2022-07-12 2022-07-12 Metaverse authentication method, system and apparatus, terminal device and storage medium NL2032458B1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
NL2032458A NL2032458B1 (en) 2022-07-12 2022-07-12 Metaverse authentication method, system and apparatus, terminal device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
NL2032458A NL2032458B1 (en) 2022-07-12 2022-07-12 Metaverse authentication method, system and apparatus, terminal device and storage medium

Publications (1)

Publication Number Publication Date
NL2032458B1 true NL2032458B1 (en) 2023-06-16

Family

ID=84462540

Family Applications (1)

Application Number Title Priority Date Filing Date
NL2032458A NL2032458B1 (en) 2022-07-12 2022-07-12 Metaverse authentication method, system and apparatus, terminal device and storage medium

Country Status (1)

Country Link
NL (1) NL2032458B1 (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11082233B2 (en) * 2019-07-02 2021-08-03 Advanced New Technologies Co., Ltd. System and method for issuing verifiable claims
US20210326880A1 (en) * 2020-08-31 2021-10-21 Alipay (Hangzhou) Information Technology Co., Ltd. Information sharing methods, apparatuses, and devices

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11082233B2 (en) * 2019-07-02 2021-08-03 Advanced New Technologies Co., Ltd. System and method for issuing verifiable claims
US20210326880A1 (en) * 2020-08-31 2021-10-21 Alipay (Hangzhou) Information Technology Co., Ltd. Information sharing methods, apparatuses, and devices

Similar Documents

Publication Publication Date Title
CN108335207B (en) Asset management method and device and electronic equipment
CN108335206B (en) Asset management method and device and electronic equipment
AU2019222743B2 (en) Asset management method and apparatus, and electronic device
JP2021512379A (en) Blockchain-based smart contract calling methods and devices, and electronic devices
CN111047321A (en) Service processing method and device, electronic equipment and storage medium
CN110601858B (en) Certificate management method and device
CN103139172A (en) Service implementation method and device
US10666793B1 (en) Secure call center communications
CN111178840A (en) Service processing method, device, system, electronic equipment and storage medium
CN110601896A (en) Data processing method and equipment based on block chain nodes
CN104866976A (en) Multi-tenant-oriented information managing system
TWI839875B (en) Payment method, user terminal, device, equipment, system and medium
CN111985000A (en) Model service output method, device, equipment and storage medium
CN110209671A (en) A kind of the access system and its application of distribution account book data
CN107453872A (en) A kind of unified safety authentication method and system based on Mesos container cloud platforms
CN113034281A (en) Service data processing method based on block chain, related system and node
CN113221165B (en) User element authentication method and device based on block chain
NL2032458B1 (en) Metaverse authentication method, system and apparatus, terminal device and storage medium
CN112988311A (en) On-line experimental method based on WEB server
EP4239518A1 (en) Nfc tag verification method and related device
KR20210127383A (en) Electronic device for sending cryptocurrency to blockchain account and method of operating the same
KR20170051916A (en) Mobile simple payment support device based on the connection information and operating method thereof
CN115222392A (en) Service access method, device, medium and electronic equipment based on block chain
CN116862679B (en) Block chain-based data processing method, device, equipment and readable storage medium
CN116015770A (en) Communication method, communication system, communication device and electronic equipment for server