NL2032458B1 - Metaverse authentication method, system and apparatus, terminal device and storage medium - Google Patents
Metaverse authentication method, system and apparatus, terminal device and storage medium Download PDFInfo
- Publication number
- NL2032458B1 NL2032458B1 NL2032458A NL2032458A NL2032458B1 NL 2032458 B1 NL2032458 B1 NL 2032458B1 NL 2032458 A NL2032458 A NL 2032458A NL 2032458 A NL2032458 A NL 2032458A NL 2032458 B1 NL2032458 B1 NL 2032458B1
- Authority
- NL
- Netherlands
- Prior art keywords
- identity
- blockchain
- real
- information
- virtual
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0853—Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Computer And Data Communications (AREA)
Abstract
Disclosed are a metaverse authentication method, system and apparatus, a terminal device and a storage medium. The metaverse authentication method includes: receiving, Via the terminal device, real identity information and/or Virtual identity information sent by a user, sending an identification request to the blockchain to obtain blockchain identification information, and 10 generating a real identity and/or a Virtual identity based on the blockchain identification information, the real identity information and/ or the Virtual identity information, and sending the real identity and/or the Virtual identity to the blockchain and the terminal deVice respectively for the user to perform authentication.
Description
METAVERSE AUTHENTICATION METHOD, SYSTEM AND APPARATUS,
TERMINAL DEVICE AND STORAGE MEDIUM
[0001] The present disclosure relates to the technical field of blockchain, and in particular, to a metaverse authentication method, a metaverse authentication system and a metaverse authentication apparatus, a terminal device and a storage medium.
[0002] As the technology develops, Metaverse has been gradually realized. The Metaverse is the iterative evolution of Internet ecology, and is the real-time information interconnection and the mutual mapping between the real world and the virtual world. This virtual world is persistent, not a copy of the real world, but another form of information existence and perception associated with the real world. The avatars of real-world users in the metaverse can be called digital avatars, usually represented by 2D or 3D avatars, with some actual characteristics of the user. People can interact and transact through their digital avatars, building and strengthening relationships with each other.
[0003] In the Metaverse, each decentralized digital identity (DID) 1s based on blockchain technology. Using decentralized infrastructure to change the control mode of the original identity requires users to recreate their own identities, and digital avatars may correspond to one or more user identities, resulting in a relative differentiation between the virtual world and the real world.
[0004] The main objective of the present disclosure is to provide a metaverse authentication method, system and apparatus, a terminal device and a storage medium, which aims to solve the problem that a set of identity codes cannot be applied to the virtual world and the real world at the same time.
[0005] In order to achieve the above objective, the present disclosure provides a metaverse authentication method, applied to a server configured for interacting with a terminal device and a blockchain, and the metaverse authentication method includes following operations:
[0006] receiving, via the terminal device, real identity information and/or virtual identity information sent by a user;
[0007] sending an identification request to the blockchain to obtain blockchain identification information; and
[0008] generating a real identity and/or a virtual identity based on the blockchain identification information, the real identity information and/or the virtual identity information, and sending the real identity and/or the virtual identity to the blockchain and the terminal device respectively for the user to perform authentication.
[0009] In an embodiment, the operation of sending the identification request to the blockchain to obtain the blockchain identification information includes:
[0010] sending the identification request to the blockchain to obtain a blockchain type, a blockchain network identity and a blockchain address;
[0011] the operation of generating the real identity and/or the virtual identity based on the blockchain identification information, the real identity information and/or the virtual identity information includes:
[0012] obtaining a real space type and/or a virtual space type according to the real identity information and/or the virtual identity information;
[0013] obtaining the real identity based on the real space type, the blockchain type, the blockchain network identity and the blockchain address; and/or
[0014] obtaining the virtual identity based on the virtual space type, the blockchain type, the blockchain network identity and the blockchain address.
[0015] In an embodiment, the server also interacts with a trusted operator, and after the operation of generating the real identity and/or the virtual identity based on the blockchain identification information, the real identity information and/or the virtual identity information, the metaverse authentication method further includes:
[0016] invoking a real-name information comparison technology provided by the trusted operator, comparing and authenticating the real identity and/or the virtual identity to obtain an authentication result;
[0017] obtaining a real-name information identification according to the authentication result; and
[0018] sending the real-name information identification to the blockchain, for the blockchain to determine whether the real identity and/or the virtual identity have been real-named according to the real-name information identification.
[0019] In order to achieve the above objective, the present disclosure provides a metaverse authentication method, applied to a terminal device configured for interacting with a server and a blockchain, and the metaverse authentication method includes following operations:
[0020] receiving real identity information and virtual identity information sent by a user;
[0021] sending the real identity information and/or the virtual identity information to the server, for the server to send an identification request to the blockchain to obtain blockchain identification information, and generating, via the server, a real identity and/or a virtual identity based on the blockchain identification information, the real identity information and/or the virtual identity information; and
[0022] receiving the real identity and/or the virtual identity sent by the server for the user to perform authentication.
[0023] In order to achieve the above objective, the present disclosure provides a metaverse authentication method, applied to a blockchain configured for interacting with a terminal device and a server, and the metaverse authentication method includes following operations:
[0024] receiving an identification request sent by the server, and sending blockchain identification information to the server according to the identification request;
[0025] receiving and storing a real identity and/or a virtual identity sent by the server; and
[0026] receiving a verification request sent by the user, and querying whether a real identity and/or a virtual identity carried in the verification request is consistent with the real identity and/or the virtual identity, for the user to perform authentication.
[0027] In order to achieve the above objective, the present disclosure provides a metaverse authentication system, including a server and a terminal device;
[0028] the server for receiving real identity information and/or virtual identity information sent by a user through the terminal device; sending an identification request to a blockchain to obtain blockchain identification information; and generating a real identity and/or a virtual identity based on the blockchain identification information, the real identity information and/or the virtual identity information, and sending the real identity and/or the virtual identity to the blockchain and the terminal device respectively for the user to perform authentication;
[0029] the terminal device for receiving real identity information and/or virtual identity information input by the user; sending the real identity information and/or the virtual identity information to the server, for the server to send an identification request to the blockchain to obtain blockchain identification information, and generating a real identity and/or a virtual identity based on the blockchain identification information, the real identity information and/or the virtual identity information; and receiving the real identity and/or the virtual identity sent by the server for the user to perform authentication;
[0030] the blockchain for receiving an identification request sent by the server, and sending blockchain identification information to the server according to the identification request; receiving and storing a real identity and/or a virtual identity sent by the server; receiving a verification request sent by the user, and querying whether real identity and/or virtual identity carried in the verification request is consistent with the real identity and/or the virtual identity, for the user to perform authentication.
[0031] The present disclosure further provides a metaverse authentication apparatus, including:
[0032] a receiving module for receiving real identity information and/or virtual identity information sent by a user through a terminal device;
[0033] a sending module for sending an identification request to the blockchain to obtain blockchain identification information; and
[0034] an identify identification module for generating a real identity and/or a virtual identity based on the blockchain identification information, the real identity information and/or the virtual identity information for the user to perform authentication based on the real identity and/or the virtual identity.
[0035] The present disclosure further provides a terminal device, including a memory, a processor, a metaverse authentication program stored in the memory and executable on the processor, when the metaverse authentication program is executed by the processor, the operations of the metaverse authentication method as described above are implemented.
[0036] The present disclosure further provides a computer-readable storage medium, wherein a metaverse authentication program is stored in the computer-readable storage medium, when the metaverse authentication program is executed by a processor, the operations of the metaverse authentication method as described above are implemented.
[0037] The present disclosure provides a metaverse authentication method, system and apparatus, a terminal device and a storage medium. The metaverse authentication method includes: receiving, via the terminal device, real identity information and/or virtual identity information sent by a user; sending an identification request to the blockchain to obtain blockchain identification information; and generating a real identity and/or a virtual identity based on the blockchain identification information, the real identity information and/or the virtual identity information, and sending the real identity and/or the virtual identity to the blockchain and the terminal device respectively for the user to perform authentication. The generation and authentication of the unified digital identity of the real space and the virtual space in the metaverse scene through the server can solve the problem that a set of identity codes cannot be applied to the virtual world and the real world at the same time. Based on the solution of the present disclosure, starting from the problem that the virtual world and the real world are separated, a set of identities suitable for the virtual world and the real world is designed. The validity of the metaverse authentication method proposed in the present disclosure is verified on this data set, and finally, the problem that a set of identity codes cannot be applied to the virtual world and the real world at the same time is solved by the method of the present disclosure.
[0038] FIG. 1 is a schematic diagram of functional modules of a terminal device to which a metaverse authentication apparatus belongs to according to an embodiment of the present disclosure.
[0039] FIG. 2 is a schematic flowchart of a metaverse authentication method according to a first exemplary embodiment of the present disclosure.
[0040] FIG. 3 is a schematic flowchart of the metaverse authentication method according to a second exemplary embodiment of the present disclosure. 5 [0041] FIG. 4 is a schematic flowchart of the metaverse authentication method according to a third exemplary embodiment of the present disclosure.
[0042] FIG. 5 is a schematic flowchart of the metaverse authentication method according to a fourth exemplary embodiment of the present disclosure.
[0043] FIG. 6 is a schematic flowchart of the metaverse authentication method according to a fifth exemplary embodiment of the present disclosure.
[0044] FIG. 7 is a schematic diagram of the authentication involved in a blockchain of the metaverse authentication method of the present disclosure.
[0045] The realization of the objective, functional characteristics, and advantages of the present disclosure are further described with reference to the accompanying drawings.
[0046] It should be understood that the specific embodiments described herein are only used to explain the present disclosure, but not to limit the present disclosure.
[0047] The main solutions of the embodiments of the present disclosure are: receiving, via the terminal device, real identity information and/or virtual identity information sent by a user; sending an identification request to the blockchain to obtain blockchain identification information; and generating a real identity and/or a virtual identity based on the blockchain identification information, the real identity information and/or the virtual identity information, and sending the real identity and/or the virtual identity to the blockchain and the terminal device respectively for the user to perform authentication. The generation and authentication of the unified digital identity of the real space and the virtual space in the metaverse scene through the server can solve the problem that a set of identity codes cannot be applied to the virtual world and the real world at the same time. Based on the solution of the present disclosure, starting from the problem that the virtual world and the real world are separated, a set of identities suitable for the virtual world and the real world is designed. The validity of the metaverse authentication method proposed in the present disclosure is verified on this data set, and finally, the problem that a set of identity codes cannot be applied to the virtual world and the real world at the same time is solved by the method of the present disclosure.
[0048] The embodiments of the present disclosure consider that in the metaverse, each decentralized digital identity (DID) is based on blockchain technology. Using decentralized infrastructure to change the control mode of the original identity requires users to recreate their own identities, and digital avatars may correspond to one or more user identities, resulting in a relative differentiation between the virtual world and the real world.
[0049] Therefore, the solutions of the embodiments of the present disclosure start from the problem that the virtual world and the real world are separated, a set of identities suitable for the virtual world and the real world is designed. The validity of the metaverse authentication method proposed in the present disclosure is verified on this data set, and finally, the problem that a set of identity codes cannot be applied to the virtual world and the real world at the same time is solved by the method of the present disclosure.
[0050] As shown in FIG. 1, FIG. 1 is a schematic diagram of functional modules of a terminal device to which a metaverse authentication apparatus belongs to according to an embodiment of the present disclosure. The metaverse authentication apparatus may be an apparatus independent of the terminal device, capable of generating and verifying a real identity and/or a virtual identity, which may be carried on the terminal device in the form of hardware or software. The terminal device may be an intelligent mobile terminal with a data processing function, such as a mobile phone or a tablet computer, or a fixed terminal device or a server with a data processing function.
[0051] In this embodiment, the terminal device to which the metaverse authentication apparatus belongs at least includes an output module 110, a processor 120, a memory 130 and a communication module 140.
[0052] The operating system and the metaverse authentication program are stored in the memory 130. The metaverse authentication apparatus can receive the real identity information and/or virtual identity information sent by the user through the terminal device; sending an identification request to the blockchain to obtain blockchain identification information; and generate a real identity and/or a virtual identity based on the blockchain identification information, the real identity information and/or the virtual identity information. The information are stored in the memory 130. The output module 110 may be a display screen or the like. The communication module 140 may include a WIFI module, a mobile communication module, a
Bluetooth module, or the like, and communicate with an external device or a server through the communication module 140.
[0053] When the metaverse authentication program stored in the memory 130 is executed by the processor, the following operations are implemented:
[0054] receiving, via the terminal device, real identity information and/or virtual identity information sent by a user;
[0055] sending an identification request to the blockchain to obtain blockchain identification information; and
[0056] generating a real identity and/or a virtual identity based on the blockchain identification information, the real identity information and/or the virtual identity information, and sending the real identity and/or the virtual identity to the blockchain and the terminal device respectively for the user to perform authentication.
[0057] Further, when the metaverse authentication program stored in the memory 130 is executed by the processor, the following operations are implemented:
[0058] sending the identification request to the blockchain to obtain a blockchain type, a blockchain network identity and a blockchain address.
[0059] Further, when the metaverse authentication program stored in the memory 130 is executed by the processor, the following operations are implemented:
[0060] obtaining a real space type and/or a virtual space type according to the real identity information and/or the virtual identity information;
[0061] obtaining the real identity based on the real space type, the blockchain type, the blockchain network identity and the blockchain address;
[0062] obtaining the virtual identity based on the virtual space type, the blockchain type, the blockchain network identity and the blockchain address.
[0063] Further, when the metaverse authentication program stored in the memory 130 is executed by the processor, the following operations are implemented:
[0064] using a real-name information comparison technology provided by the trusted operator, comparing and authenticating the real identity and/or the virtual identity to obtain an authentication result;
[0065] obtaining a real-name information identification according to the authentication result; and
[0066] sending the real-name information identification to the blockchain, for the blockchain to determine whether the real identity and/or the virtual identity have been real-named according to the real-name information identification.
[0067] Further, when the metaverse authentication program stored in the memory 130 is executed by the processor, the following operations are implemented:
[0068] receiving real identity information and/or virtual identity information sent by a user;
[0069] sending the real identity information and/or the virtual identity information to the server, for the server to send an identification request to the blockchain to obtain blockchain identification information, and generating, via the server, a real identity and/or a virtual identity based on the blockchain identification information, the real identity information and/or the virtual identity information; and
[00790] receiving the real identity and/or the virtual identity sent by the server for the user to perform authentication.
[0071] Further, when the metaverse authentication program stored in the memory 130 is executed by the processor, the following operations are implemented:
[0072] receiving an identification request sent by the server, and sending blockchain identification information to the server according to the identification request;
[0073] receiving and storing a real identity and/or a virtual identity sent by the server; and
[0074] receiving a verification request sent by the user, and querying whether real identity and/or virtual identity carried in the verification request is consistent with the real identity and/or the virtual identity, for the user to perform authentication.
[0075] The solutions of the embodiments are: receiving, via the terminal device, real identity information and/or virtual identity information sent by a user; sending an identification request to the blockchain to obtain blockchain identification information; and generating a real identity and/or a virtual identity based on the blockchain identification information, the real identity information and/or the virtual identity information, and sending the real identity and/or the virtual identity to the blockchain and the terminal device respectively for the user to perform authentication. The generation and authentication of the unified digital identity of the real space and the virtual space in the metaverse scene through the server can solve the problem that a set of identity codes cannot be applied to the virtual world and the real world at the same time.
Based on the solution of the present disclosure, starting from the problem that the virtual world and the real world are separated, a set of identities suitable for the virtual world and the real world is designed. The validity of the metaverse authentication method proposed in the present disclosure is verified on this data set, and finally, the problem that a set of identity codes cannot be applied to the virtual world and the real world at the same time is solved by the method of the present disclosure.
[0076] Based on the above-mentioned terminal device architecture but not limited to the above-mentioned architecture, the method embodiments of the present disclosure are proposed.
[0077] As shown in FIG. 2, FIG. 2 is a schematic flowchart of a metaverse authentication method according to a first exemplary embodiment of the present disclosure. The metaverse authentication method is applied to a server. The metaverse authentication method includes following operations:
[0078] Operation S210, receiving, via the terminal device, real identity information and/or virtual identity information sent by a user.
[0079] As the technology develops, Metaverse has been gradually realized. The Metaverse is a virtual digital world parallel to the real world constructed using various scientific technologies and high-speed computing equipment. The technological foundations of the Metaverse are considered to include computers, network equipment, integrated circuits, communication components, new display systems, mixed reality devices, precision free-form optical systems, and high-resolution, high-resolution cameras. The industrial chain formed by Metaverse includes micro-nano processing, high-end manufacturing, high-precision maps, optical manufacturing, or the like, such as diffractive waveguide lenses, micro-display and chip manufacturing, and related software industries. The Metaverse is the iterative evolution of Internet ecology, and is real-time information interconnection and mutual mapping between the real world and the virtual world.
This virtual world is persistent, not a copy of the real world, but another form of information existence and perception associated with the real world. The avatars of real-world users in the metaverse can be called digital avatars, usually represented by 2D or 3D avatars, with some actual characteristics of the user. People can interact and transact through their digital avatars, building and strengthening relationships with each other.
[0080] In the Metaverse, each decentralized digital identity (DID) is based on blockchain technology. Using decentralized infrastructure to change the control mode of the original identity requires users to recreate their own identities, and digital avatars may correspond to one or more user identities, resulting in a relative differentiation between the virtual world and the real world.
In this context, a metaverse authentication method is proposed.
[0081] The server receives the real identity information and/or the virtual identity information sent by the user through the terminal device. The real identity information includes but is not limited to user name, ID number, start date of the validity period, end date of the validity period, front and back photos of the ID card, and user’s facial photo. The virtual identity information includes but is not limited to user name, blockchain address, avatar NFT, and voice
NFT.
[0082] Operation S220, sending an identification request to the blockchain to obtain blockchain identification information.
[0083] The server sends the identification request to the blockchain to obtain the blockchain identification information. The blockchain identification information includes at least a blockchain type, a blockchain network identity and a blockchain address.
[0084] Operation S230, generating a real identity and/or a virtual identity based on the blockchain identification information, the real identity information and/or the virtual identity information, and sending the real identity and/or the virtual identity to the blockchain and the terminal device respectively for the user to perform authentication.
[0085] The identity in this embodiment of the present disclosure may be a DID-based identity, an NFT-based identity, or an identity based on a D2D device, which is not limited in this embodiment of the present disclosure.
[0086] In this embodiment of the present disclosure, the DID-based identity is preferred. The operation of generating the real identity and/or the virtual identity includes: obtaining a real space type and/or a virtual space type according to the real identity information and/or the virtual identity information; obtaining the real identity based on the real space type, the blockchain type, the blockchain network identity and the blockchain address; obtaining the virtual identity based on the virtual space type, the blockchain type, the blockchain network identity and the blockchain address.
[0087] The real identity and/or the virtual identity is written on the blockchain for any user to verify the identity information of the user to which the real identity and/or virtual identity belongs by querying the real identity and/or the virtual identity.
[0088] Finally, the terminal device receives the real identity and/or virtual identity sent by the server. When a user needs to authenticate in any scenario, the real identity and the virtual identity provided by the terminal device are used to prove their identity to other users. Users or other users can send a verification request to the blockchain, and the verification request carries the real identity and virtual identity that need to be verified. The blockchain receives the verification request, and it is possible to query whether the real identify and the virtual identify are stored on the chain of the blockchain according to the real identity and the virtual identity. If the query is successful, the authentication is passed; otherwise, the authentication is not passed.
The scenarios include, but are not limited to: taking a plane or train and long-distance bus, staying in a hotel, purchasing controlled commodities, sending express delivery, drone registration, account and phone number application.
[0089] The solutions of this embodiment includes: receiving, via the terminal device, real identity information and/or virtual identity information sent by a user; sending an identification request to the blockchain to obtain blockchain identification information; and generating a real identity and/or a virtual identity based on the blockchain identification information, the real identity information and/or the virtual identity information, and sending the real identity and/or the virtual identity to the blockchain and the terminal device respectively for the user to perform authentication. The generation and authentication of the unified digital identity of the real space and the virtual space in the metaverse scene through the server can solve the problem that a set of identity codes cannot be applied to the virtual world and the real world at the same time.
[0090] As shown in FIG. 3, FIG. 3 1s a schematic flowchart of the metaverse authentication method according to a second exemplary embodiment of the present disclosure. Based on the embodiment shown in FIG. 2, the operation S220 of sending the identification request to the blockchain to obtain the blockchain identification information includes:
[0091] Operation S310, sending the identification request to the blockchain to obtain a i blockchain type, a blockchain network identity and a blockchain address.
[0092] The server sends the identification request to the blockchain to obtain the blockchain type, the blockchain network identity and one of the addresses on the blockchain. The blockchain address of the user’s corresponding real identity and/or virtual identity is the same blockchain address, and is the only address on the current blockchain. In addition, the blockchain address is used as a method of user identity verification, and the unique address on the blockchain chain binds the real identity and/or virtual identity together for query and verification of the user's identity when verifying the identity.
[0093] Operation S320, obtaining a real space type and/or a virtual space type according to the real identity information and/or the virtual identity information.
[0094] If the server detects that the identity information input by the user is real identity information, the space type is set to be the real space type. If the server detects that the identity information input by the user is virtual identity information, the space type is set to be the virtual space type.
[0095] Operation S330, obtaining the real identity based on the real space type, the blockchain type, the blockchain network identity and the blockchain address.
[0096] The real identity is obtained based on the real space type, the blockchain type, the blockchain network identity and the blockchain address, for users to authenticate in the real world with real identities. For example, DID:Real:Ethereum:1:0XABCDEFG123456789.
[0097] The specific format of the real identity is shown in the following table.
Format of | DID SpaceType ChainType | ChainID ChainTypeAddress
De
Description | Fixed | Space type | Blockchain | Blockchain Unique address on the of ID prefix | (Real) type network blockchain identity
[0098] Operation S340, obtaining the virtual identity based on the virtual space type, the blockchain type, the blockchain network identity and the blockchain address.
[0099] The virtual identity is obtained based on the virtual space type, the blockchain type, the blockchain network identity and the blockchain address, for users to authenticate in the virtual world with virtual identities. For example,
DID: Virtual:Ethereum: 1:0XABCDEFG123456789.
[0100] The specific format of the virtual identity is shown in the following table.
Format of | DID SpaceType ChainType | ChainID ChainTypeAddress oe of ID prefix | (Virtual) type network blockchain om fe MT
[0101] The embodiments of this embodiment include: sending the identification request to the blockchain to obtain a blockchain type, a blockchain network identity and a blockchain address; obtaining a real space type and/or a virtual space type according to the real identity information and/or the virtual identity information; obtaining the real identity based on the real space type, the blockchain type, the blockchain network identity and the blockchain address; and/or obtaining the virtual identity based on the virtual space type, the blockchain type, the blockchain network identity and the blockchain address. Each blockchain address is the unique address on the current blockchain chain, which binds real identities and/or virtual identities together to solve the problem that a set of identity codes cannot be applied to both the virtual world and the real world at the same time.
[0102] As shown in FIG. 4, FIG. 4 is a schematic flowchart of the metaverse authentication method according to a third exemplary embodiment of the present disclosure. Based on the embodiment shown in FIG. 2, after the operation S230 of generating the real identity and/or the virtual identity based on the blockchain identification information, the real identity information and/or the virtual identity information, the metaverse authentication method further includes:
[0103] Operation S410, invoking a real-name information comparison technology provided by the trusted operator, comparing and authenticating the real identity and/or the virtual identity to obtain an authentication result.
[0104] The server invokes the Cyber Trusted Identity (CTID) real-name information comparison technical service provided by the trusted operator to compare and authenticate the identity information. Network identity is an Internet identity authentication protocol, which has uniqueness and non-repudiation of information. Through the real-name information comparison technical service, it can be queried whether other users except the current user are using the real identity and/or virtual identity corresponding to the current user.
[0105] Operation S420, obtaining a real-name information identification according to the authentication result.
[0106] After passing the authentication, the trusted operator will authenticate the result to the server. In this embodiment, it is preferable to use Blockchain Identity (BID) as the authentication result, and it may also be other information data that can be used as authentication, which is not limited in this embodiment.
[0107] Operation S430, sending the real-name information identification to the blockchain, for the blockchain to determine whether the real identity and/or the virtual identity have been real-named according to the real-name information identification.
[0108] The real-name information identification is sent to the blockchain, and the blockchain can determine whether the real identify and/or virtual identify have been real-named according to the real-name information ID. Further verification of real-name identification through blockchain can reduce the probability of fraud, slander, personal attacks, etc., and is conducive to the establishment of a harmonious social management ecological environment.
[0109] The solution of this embodiment includes: invoking a real-name information comparison technology provided by the trusted operator, comparing and authenticating the real identity and/or the virtual identity to obtain an authentication result; obtaining a real-name information identification according to the authentication result, and sending the real-name information identification to the blockchain, for the blockchain to determine whether the real identity and/or the virtual identity have been real-named according to the real-name information identification. By invoking the CTID real-name information comparison technical service provided by the trusted operator, the identity information is compared and authenticated, so that the identity authentication has a strong authority.
[0110] As shown in FIG. 5, FIG. 5 is a schematic flowchart of the metaverse authentication method according to a fourth exemplary embodiment of the present disclosure. The metaverse authentication method is applied to a terminal device, and includes the following operations:
[0111] Operation S510, receiving real identity information and virtual identity information sent by a user.
[0112] The terminal device receives the real identity information and/or the virtual identity information sent by the user. The real identity information includes but is not limited to user name, ID number, start date of the validity period, end date of the validity period, front and back photos of the ID card, and user’s facial photo. The virtual identity information includes but is not limited to user name, blockchain address, avatar NFT, and voice NFT.
[0113] Operation S520, sending the real identity information and/or the virtual identity information to the server, for the server to send an identification request to the blockchain to obtain blockchain identification information, and generating, via the server, a real identity and/or a virtual identity based on the blockchain identification information, the real identity information and/or the virtual identity information.
[0114] The terminal device sends the real identity information and/or the virtual identity information to the server, for the server to send an identification request to the blockchain to obtain blockchain identification information, and generates, via the server, the real identity and/or the virtual identity based on the blockchain identification information, the real identity information and/or the virtual identity information. The identity in this embodiment of the present disclosure may be a DID-based identity, an NFT-based identity, or an identity based on a
D2D device, which is not limited in this embodiment of the present disclosure. In this embodiment of the present disclosure, the DID-based identity is preferred. The real identity and/or the virtual identity is generated based on the blockchain identification information, the real identity information and/or the virtual identity information. The real identify and/or the virtual identity are sent to the blockchain and the terminal device, respectively, for the user to perform authentication.
[0115] Operation S530, receiving the real identity and/or the virtual identity sent by the server for the user to perform authentication.
[0116] The terminal device receives the real identity and/or the virtual identity sent by the server. When a user needs to authenticate in any scenario, the real identity and the virtual identity provided by the terminal device are used to prove their identity to other users. Other users query whether the real identity and virtual identity are stored on the chain of the blockchain according to the real identity and virtual identity. If the query is successful, the authentication is passed; otherwise, the authentication is not passed. The scenarios include, but are not limited to: taking a plane or train and long-distance bus, staying in a hotel, purchasing controlled commodities, sending express delivery, drone registration, account and phone number application.
[0117] The solutions of this embodiment includes: receiving real identity information and virtual identity information sent by a user; sending the real identity information and/or the virtual identity information to the server, for the server to send an identification request to the blockchain to obtain blockchain identification information, and generating, via the server, a real identity and/or a virtual identity based on the blockchain identification information, the real identity information and/or the virtual identity information; and receiving the real identity and/or the virtual identity sent by the server for the user to perform authentication. By designing a set of identities applicable to the virtual world and the real world, the problem that a set of identity codes cannot be applied to both the virtual world and the real world at the same time is solved.
[0118] As shown in FIG. 6, FIG. 6 1s a schematic flowchart of the metaverse authentication method according to a fifth exemplary embodiment of the present disclosure. The metaverse authentication method is applied to a blockchain, and includes the following operations:
[0119] Operation S610, receiving an identification request sent by the server, and sending blockchain identification information to the server according to the identification request.
[0120] The blockchain receives the identification request sent by the server, and sends the blockchain identification information to the server according to the identification request. The blockchain identification information includes at least a blockchain type, a blockchain network identity and a blockchain address.
[0121] Operation S620, receiving and storing a real identity and/or a virtual identity sent by the server.
[0122] The blockchain receives the real identity and/or virtual identity generated by the server, and stores it to one of the addresses on the blockchain. The blockchain address of the user’s corresponding real identity and/or virtual identity is the same blockchain address, and is the only address on the current blockchain. In addition, the blockchain address is used as a method of user identity verification, and the unique address on the blockchain chain binds the real identity and/or virtual identity together for query and verification of the user's identity when verifying the identity.
[0123] Operation S630, receiving a verification request sent by the user, and querying whether real identity and/or virtual identity carried in the verification request is consistent with the real identity and/or the virtual identity, for the user to perform authentication.
[0124] As shown in FIG. 7, FIG. 7 is a schematic diagram of the authentication involved in a blockchain of the metaverse authentication method of the present disclosure. When a user needs to authenticate in any scenario, the real identity and the virtual identity provided by the terminal device are used to prove their identity to other users. Users or other users can send a verification request to the blockchain, and the verification request carries the real identity and virtual identity that need to be verified. The blockchain receives the verification request, and it is possible to query whether the real identify and the virtual identify are stored on the chain of the blockchain according to the real identity and the virtual 1dentity. If the query is successful, the authentication is passed; otherwise, the authentication is not passed. The scenarios include, but are not limited to: taking a plane or train and long-distance bus, staying in a hotel, purchasing controlled commodities, sending express delivery, drone registration, account and phone number application.
[0125] The solution of this embodiment includes: receiving an identification request sent by the server, and sending blockchain identification information to the server according to the identification request; receiving and storing a real identity and/or a virtual identity sent by the server; and receiving a verification request sent by the user, and querying whether real identity and/or virtual identity carried in the verification request is consistent with the real identity and/or the virtual identity, for the user to perform authentication. The real identities and/or the virtual identities are stored on the blockchain, and the generation and authentication of unified digital identities in real space and virtual space in the metaverse scene are realized, and the versatility and practicability are improved.
[0126] Besides, the embodiments of the present disclosure further provide a metaverse authentication system, including a server and a terminal device;
[0127] the server for receiving real identity information and/or virtual identity information sent by a user through the terminal device; sending an identification request to a blockchain to obtain blockchain identification information; and generating a real identity and/or a virtual identity based on the blockchain identification information, the real identity information and/or the virtual identity information, and sending the real identity and/or the virtual identity to the blockchain and the terminal device respectively for the user to perform authentication;
[0128] the terminal device for receiving real identity information and/or virtual identity information input by the user; sending the real identity information and/or the virtual identity information to the server, for the server to send an identification request to the blockchain to obtain blockchain identification information, and generating a real identity and/or a virtual identity based on the blockchain identification information, the real identity information and/or the virtual identity information; and receiving the real identity and/or the virtual identity sent by the server for the user to perform authentication;
[0129] the blockchain for receiving an identification request sent by the server, and sending blockchain identification information to the server according to the identification request; receiving and storing a real identity and/or a virtual identity sent by the server; receiving a verification request sent by the user, and querying whether real identity and/or virtual identity carried in the verification request is consistent with the real identity and/or the virtual identity, for the user to perform authentication.
[0130] In addition, the embodiments of the present disclosure further provide a metaverse authentication apparatus, including:
[0131] a receiving module for receiving real identity information and/or virtual identity information sent by a user through a terminal device;
[0132] a sending module for sending an identification request to the blockchain to obtain blockchain identification information; and
[0133] an identify identification module for generating a real identity and/or a virtual identity based on the blockchain identification information, the real identity information and/or the virtual identity information for the user to perform authentication based on the real identity and/or the virtual identity. The principle and implementation process of the metaverse authentication in this embodiment refer to the above-mentioned embodiments, which will not be repeated here.
[0134] Besides, the embodiments of the present disclosure further provide a terminal device, including a memory, a processor, a metaverse authentication program stored in the memory and executable on the processor, when the metaverse authentication program is executed by the processor, the operations of the metaverse authentication method as described above are implemented.
[0135] Since the metaverse authentication program is executed by the processor, all the technical solutions of the foregoing embodiments are adopted, there are at least all the beneficial effects brought about by all the technical solutions of all the foregoing embodiments, which will not be repeated herein.
[0136] Besides, the embodiments of the present disclosure further provide a computer-readable storage medium. A metaverse authentication program is stored in the computer-readable storage medium, when the metaverse authentication program is executed by a processor, the operations of the metaverse authentication method as described above are implemented.
[0137] Since the metaverse authentication program is executed by the processor, all the technical solutions of the foregoing embodiments are adopted, there are at least all the beneficial effects brought about by all the technical solutions of all the foregoing embodiments, which will not be repeated herein.
[0138] Compared with the related art, the embodiments of the present disclosure provide a metaverse authentication method, system and apparatus, a terminal device and a storage medium.
The metaverse authentication method includes: receiving, via the terminal device, real identity information and/or virtual identity information sent by a user; sending an identification request to the blockchain to obtain blockchain identification information; and generating a real identity and/or a virtual identity based on the blockchain identification information, the real identity information and/or the virtual identity information, and sending the real identity and/or the virtual identity to the blockchain and the terminal device respectively for the user to perform authentication. The generation and authentication of the unified digital identity of the real space and the virtual space in the metaverse scene through the server can solve the problem that a set of identity codes cannot be applied to the virtual world and the real world at the same time.
Based on the solution of the present disclosure, starting from the problem that the virtual world and the real world are separated, a set of identities suitable for the virtual world and the real world is designed. The validity of the metaverse authentication method proposed in the present disclosure is verified on this data set, and finally, the problem that a set of identity codes cannot be applied to the virtual world and the real world at the same time is solved by the method of the present disclosure.
[0139] It should be noted that in this document, the terms “comprise”, “include” or any other variants thereof are intended to cover a non-exclusive inclusion. Thus, a process, method, article, or system that includes a series of elements not only includes those elements, but also includes other elements that are not explicitly listed, or also includes elements inherent to the process, method, article, or system. If there are no more restrictions, the element defined by the sentence
“including a...” does not exclude the existence of other identical elements in the process, method, article or system that includes the element.
[0140] The serial numbers of the foregoing embodiments of the present disclosure are only for description, and do not represent the advantages and disadvantages of the embodiments.
[0141] Through the description of the above embodiment, those skilled in the art can clearly understand that the above-mentioned embodiments can be implemented by software plus a necessary general hardware platform, of course, it can also be implemented by hardware, but in many cases the former is a better implementation. Based on this understanding, the technical solution of the present disclosure can be embodied in the form of software product in essence or the part that contributes to the existing technology. The computer software product is stored on a storage medium (such as ROM/RAM, magnetic disk, optical disk) as described above, including several instructions to cause a terminal device (which can be a mobile phone, a computer, a server, a controlled terminal, or a network device, etc.) to execute the method described in each embodiment of the present disclosure.
[0142] The above are only some embodiments of the present disclosure, and do not limit the scope of the present disclosure thereto. Under the inventive concept of the present disclosure, equivalent structural transformations made according to the description and drawings of the present disclosure, or direct/indirect application in other related technical fields are included in the scope of the present disclosure.
Claims (9)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
NL2032458A NL2032458B1 (en) | 2022-07-12 | 2022-07-12 | Metaverse authentication method, system and apparatus, terminal device and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
NL2032458A NL2032458B1 (en) | 2022-07-12 | 2022-07-12 | Metaverse authentication method, system and apparatus, terminal device and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
NL2032458B1 true NL2032458B1 (en) | 2023-06-16 |
Family
ID=84462540
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
NL2032458A NL2032458B1 (en) | 2022-07-12 | 2022-07-12 | Metaverse authentication method, system and apparatus, terminal device and storage medium |
Country Status (1)
Country | Link |
---|---|
NL (1) | NL2032458B1 (en) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11082233B2 (en) * | 2019-07-02 | 2021-08-03 | Advanced New Technologies Co., Ltd. | System and method for issuing verifiable claims |
US20210326880A1 (en) * | 2020-08-31 | 2021-10-21 | Alipay (Hangzhou) Information Technology Co., Ltd. | Information sharing methods, apparatuses, and devices |
-
2022
- 2022-07-12 NL NL2032458A patent/NL2032458B1/en active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11082233B2 (en) * | 2019-07-02 | 2021-08-03 | Advanced New Technologies Co., Ltd. | System and method for issuing verifiable claims |
US20210326880A1 (en) * | 2020-08-31 | 2021-10-21 | Alipay (Hangzhou) Information Technology Co., Ltd. | Information sharing methods, apparatuses, and devices |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108335207B (en) | Asset management method and device and electronic equipment | |
CN108335206B (en) | Asset management method and device and electronic equipment | |
AU2019222743B2 (en) | Asset management method and apparatus, and electronic device | |
JP2021512379A (en) | Blockchain-based smart contract calling methods and devices, and electronic devices | |
CN111047321A (en) | Service processing method and device, electronic equipment and storage medium | |
CN110601858B (en) | Certificate management method and device | |
CN103139172A (en) | Service implementation method and device | |
US10666793B1 (en) | Secure call center communications | |
CN111178840A (en) | Service processing method, device, system, electronic equipment and storage medium | |
CN110601896A (en) | Data processing method and equipment based on block chain nodes | |
CN104866976A (en) | Multi-tenant-oriented information managing system | |
TWI839875B (en) | Payment method, user terminal, device, equipment, system and medium | |
CN111985000A (en) | Model service output method, device, equipment and storage medium | |
CN110209671A (en) | A kind of the access system and its application of distribution account book data | |
CN107453872A (en) | A kind of unified safety authentication method and system based on Mesos container cloud platforms | |
CN113034281A (en) | Service data processing method based on block chain, related system and node | |
CN113221165B (en) | User element authentication method and device based on block chain | |
NL2032458B1 (en) | Metaverse authentication method, system and apparatus, terminal device and storage medium | |
CN112988311A (en) | On-line experimental method based on WEB server | |
EP4239518A1 (en) | Nfc tag verification method and related device | |
KR20210127383A (en) | Electronic device for sending cryptocurrency to blockchain account and method of operating the same | |
KR20170051916A (en) | Mobile simple payment support device based on the connection information and operating method thereof | |
CN115222392A (en) | Service access method, device, medium and electronic equipment based on block chain | |
CN116862679B (en) | Block chain-based data processing method, device, equipment and readable storage medium | |
CN116015770A (en) | Communication method, communication system, communication device and electronic equipment for server |