TWI829435B - Metaverse application gateway connection mechanism for use in a private communication architecture - Google Patents

Metaverse application gateway connection mechanism for use in a private communication architecture Download PDF

Info

Publication number
TWI829435B
TWI829435B TW111144098A TW111144098A TWI829435B TW I829435 B TWI829435 B TW I829435B TW 111144098 A TW111144098 A TW 111144098A TW 111144098 A TW111144098 A TW 111144098A TW I829435 B TWI829435 B TW I829435B
Authority
TW
Taiwan
Prior art keywords
metaverse
virtual private
private network
server
smart device
Prior art date
Application number
TW111144098A
Other languages
Chinese (zh)
Other versions
TW202345550A (en
Inventor
維斌 陳
Original Assignee
美商元數實驗室有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US17/736,103 external-priority patent/US20220385638A1/en
Priority claimed from US17/849,741 external-priority patent/US20220329569A1/en
Application filed by 美商元數實驗室有限公司 filed Critical 美商元數實驗室有限公司
Publication of TW202345550A publication Critical patent/TW202345550A/en
Application granted granted Critical
Publication of TWI829435B publication Critical patent/TWI829435B/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4633Interconnection of networks using encapsulation techniques, e.g. tunneling
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4641Virtual LANs, VLANs, e.g. virtual private networks [VPN]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/66Arrangements for connecting between networks having differing types of switching systems, e.g. gateways
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0272Virtual private networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/566Grouping or aggregating service requests, e.g. for unified processing

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Telephonic Communication Services (AREA)

Abstract

A method for a connection mechanism in a public cloud network is disclosed. The method includes acquiring a plurality of connection credentials from a public cloud portal (PCP) Admin Device; pairing and registration with a metaverse virtual private network (VPN) server (MVVS) from a metaverse app gateway (MVAG); establishing a plurality of initial VPN tunnels between the MVVS and the MVAG; connecting to the MVAG on demand between a MVVS smart device client and the MVAG through the MVVS; and running a plurality of vertical peer-to-peer (P2P) private and secure MVVS smart device client applications.

Description

一種用於私有通訊架構的元宇宙應用程序閘道器連結機制A Metaverse application gateway connection mechanism for private communication architecture

本發明相關於一種用於私有通訊架構的元宇宙應用程序閘道器連結機制。The present invention relates to a Metaverse application gateway connection mechanism for private communication architecture.

在網際網路連接環境中,包含有智能手機、平板電腦、電子書閱讀器、筆記型電腦、個人電腦及各種智能小工具的智能裝置客戶無處不在。除了連接(connectivity),智能裝置客戶的價值之一是能隨時隨地連接,以從一個或多個服務方或伺服器獲得服務。服務包含有語音、影像文本、直播或存檔資訊及應用程序、社交媒體、訊息傳遞、電子郵件、存儲、備份、日曆、聯繫人、同步、共享、遠端桌面、物聯網(Internet of Things,IoT)等的執行。另一個服務包含有至少兩個智能裝置客戶間的即時私有及安全影像、語音、文本及應用程序通訊。服務來自智能裝置客戶的多種請求的伺服器有不同的類型。一般來說,伺服器的類型可被分為兩類:公共雲及私有雲。在公共雲中的伺服器,如“公共”一詞所暗示,提供有限功能的免費服務或需收費的較複雜服務,以及與大眾互動。公共雲伺服器的實施例包含有資料中心、社交媒體服務及通過網際網路的存儲∕文本提供者。另一個方面,在私有雲中的伺服器傾向於滿足私有需求。與公共雲提供的服務相比,私有雲所提供的服務更加私密及個性化。In an Internet-connected environment, smart device users including smartphones, tablets, e-book readers, laptops, personal computers and various smart gadgets are everywhere. In addition to connectivity, one of the values of smart device customers is the ability to connect anytime and anywhere to obtain services from one or more service providers or servers. Services include voice, image text, live or archived information and applications, social media, messaging, email, storage, backup, calendar, contacts, synchronization, sharing, remote desktop, Internet of Things (IoT) ) and so on. Another service includes real-time private and secure image, voice, text and app communications between at least two smart device clients. There are different types of servers that serve various requests from smart device clients. Generally speaking, server types can be divided into two categories: public cloud and private cloud. Servers in the public cloud, as the word "public" implies, provide free services with limited functionality or more complex services for a fee, as well as interact with the public. Examples of public cloud servers include data centers, social media services, and storage/text providers over the Internet. On the other hand, servers in private clouds tend to serve private needs. Compared with the services provided by the public cloud, the services provided by the private cloud are more private and personalized.

私有雲伺服器(private cloud server,PCS)應用的一個實施例是私有雲存儲伺服器(private cloud storage server,PCSS)。私有雲存儲伺服器位於用戶管理的區域網路(local area network,LAN)內。它為區域網路或廣域網路(wide area network,WAN)中的用戶提供線上及備份存儲。用戶可以隨時隨地使用智能裝置客戶,以存取私有雲存儲伺服器中的資訊。因此,私有雲存儲伺服器及相關智能裝置客戶形成私有雲伺服器及客戶架構的實施例。One example of a private cloud server (PCS) application is a private cloud storage server (PCSS). Private cloud storage servers are located within a user-managed local area network (LAN). It provides online and backup storage for users in a local area network or wide area network (WAN). Users can use smart device clients anytime and anywhere to access information in private cloud storage servers. Accordingly, the private cloud storage server and associated smart device clients form an embodiment of the private cloud server and client architecture.

傳統上,有許多存儲伺服器的解決方案,包含有網路附加存儲(network attached storage,NAS)、Windows/Mac/Linux伺服器及直接附加存儲裝置(direct attached storage,DAS),以滿足私有雲存儲伺服器要求。但是,現場智能裝置客戶面臨的挑戰是如何避免繁瑣的設定,以穿透在區域網路上路由器後面的防火牆,以存取家庭或辦公室環境中的私有雲存儲伺服器。對於這挑戰,至少有四種解決方案。Traditionally, there are many storage server solutions, including network attached storage (NAS), Windows/Mac/Linux servers and direct attached storage (DAS), to meet the needs of private clouds. Storage server requirements. However, the challenge for on-site smart device customers is how to avoid cumbersome setup to penetrate the firewall behind the router on the local area network to access a private cloud storage server in a home or office environment. There are at least four solutions to this challenge.

第一種解決方案是分配一固定的網際網路協議(Internet Protocol,IP)地址以及打開在私有雲存儲伺服器前的路由器的特定端口,以便智能裝置客戶能夠從區域網路外部定位私有雲存儲伺服器以及進行身份驗證,穿透防火牆以及與私有雲存儲伺服器建立安全的通訊通道。The first solution is to assign a fixed Internet Protocol (IP) address and open a specific port on the router in front of the private cloud storage server so that smart device customers can locate the private cloud storage from outside the local network. Servers and perform authentication, penetrate firewalls, and establish secure communication channels with private cloud storage servers.

第二種解決方案適用於固定網際網路協議地址不可用時。用戶設定私有雲存儲伺服器的區域網路路由器,以及打開特定端口,以映射到私有雲存儲伺服器。因此,透過區域網路上的動態區域名稱服務(dynamic domain name service,DDNS),路由器能夠被目標智能裝置客戶定位。智能裝置客戶可自行驗證,穿透防火牆,以及與私有雲存儲伺服器建立安全的通訊通道。The second solution is suitable when a fixed Internet Protocol address is not available. The user configures the local area network router of the private cloud storage server and opens specific ports to map to the private cloud storage server. Therefore, through the dynamic domain name service (DDNS) on the local area network, the router can be located by the target smart device client. Smart device customers can authenticate themselves, penetrate firewalls, and establish secure communication channels with private cloud storage servers.

第三種解決方案是依靠廣域網路中的另一個路由伺服器來執行智能裝置客戶及私有雲存儲伺服器間的虛擬私有網路(virtual private network,VPN)通訊。虛擬私有網路通訊允許智能裝置客戶定位私有雲存儲伺服器,自行驗證,穿透防火牆,以及與私有雲存儲伺服器建立安全的通訊通道。A third solution relies on another routing server in the WAN to perform virtual private network (VPN) communication between the smart device client and the private cloud storage server. Virtual private network communication allows smart device customers to locate private cloud storage servers, self-authenticate, penetrate firewalls, and establish secure communication channels with private cloud storage servers.

第四種解決方案是依靠廣域網路中的另一個路由伺服器在智能裝置客戶及私有雲存儲伺服器間執行遠端桌面協議(remote desktop protocol,RDP)或虛擬網路計算(VNC)通訊。遠端桌面協議∕虛擬網路計算通訊允許智能裝置客戶定位私有雲存儲伺服器,自行驗證,穿透防火牆,以及與私有雲存儲伺服器建立安全的通訊通道。另一個解決方案可為上述解決方案的混合搭配。The fourth solution relies on another routing server in the WAN to perform remote desktop protocol (RDP) or virtual network computing (VNC) communication between the smart device client and the private cloud storage server. Remote Desktop Protocol/Virtual Network Computing Communication allows smart device customers to locate private cloud storage servers, self-authenticate, penetrate firewalls, and establish secure communication channels with private cloud storage servers. Another solution could be a mix and match of the above solutions.

在第一種情況下,需要一個固定的網際網路協定地址,以及需要設置及設定路由器。缺點是固定的網際網路協定涉及更多成本,以及通常在家庭及小型企業環境中不可用。路由器的設置及設定可能非常複雜,對大多數消費者來說並不友善。In the first case, a fixed Internet Protocol address is required, and the router needs to be set up and configured. The disadvantages are that fixed Internet protocols involve more cost and are often unavailable in home and small business environments. Router setup and settings can be very complicated and not user-friendly for most consumers.

在第二種情況下,需要動態區域名稱服務服務,以及路由器需要更複雜的設置。同樣地,動態區域名稱服務地設置涉及到系統的額外成本及復雜性。路由器的設置及設定可能非常複雜,對大多數消費者來說並不友善。In the second case, a dynamic zone name service is required, and the router requires a more complex setup. Likewise, setting up a dynamic zone name service involves additional cost and complexity to the system. Router setup and settings can be very complicated and not user-friendly for most consumers.

在第三種及第四種情況下,需要建立外部路由伺服器或服務,不需要設置路由器。外部路由伺服器或服務控制及處理智能裝置客戶及伺服器間的登入∕認證。通過基於公共雲的伺服器或服務,私有雲變得較不私有及不安全。若由於任何原因伺服器或服務出現故障,私有雲存儲伺服器的通訊及可用性將受到威脅。In the third and fourth cases, an external routing server or service needs to be established, and a router does not need to be set up. The external routing server or service controls and handles login/authentication between the smart device client and the server. With public cloud-based servers or services, private clouds become less private and less secure. If the server or service fails for any reason, the communication and availability of the private cloud storage server will be threatened.

這些所有的情況需要可適用於傳統企業環境的技術專長,但這些情況不適合以智能裝置客戶中心部署為主的消費者。All of these scenarios require technical expertise that is applicable to traditional enterprise environments, but these scenarios are not suitable for consumer-focused customer-centric deployments of smart devices.

在大多數傳統系統中,在存取私有雲服務期間,外部或基於公共雲的路由伺服器被智能裝置客戶使用。使用外部伺服器創造許多問題到智能裝置客戶所有者。In most traditional systems, external or public cloud-based routing servers are used by smart device clients during access to private cloud services. Using external servers creates many problems for smart device customer owners.

首先,信任感是一直存在問題,因為外部或基於公共雲的路由伺服器是智能裝置客戶及私有雲服務間所有通訊交易的中間人。它可保存所有用戶帳戶,例如智能裝置客戶及私有雲服務的密碼及其對應的網際網路協定地址。路由伺服器能探查兩者間的任何通訊,以及認為其不安全。First, trust is always an issue because external or public cloud-based routing servers are the middlemen for all communication transactions between smart device customers and private cloud services. It saves all user accounts, such as passwords for smart device clients and private cloud services, and their corresponding Internet Protocol addresses. The routing server can detect any communication between the two and consider it unsafe.

其次,作為外部及基於公共雲的路由伺服器,伺服器所有者的商業模式無法總是與智能裝置客戶所有者一致或同步。若路由伺服器由於任何商業原因停止服務,將沒有補救措施或更換選項以恢復服務。路由伺服器會給用戶帶來巨大的商業風險,因為通訊中的重要鏈路可能在沒有求助的情況下被破壞。Second, as external and public cloud-based routing servers, the server owner's business model cannot always be consistent or synchronized with the smart device customer owner. If a routing server goes out of service for any business reason, there will be no remedy or replacement option to restore service. Routing servers pose a huge business risk to users because important links in communications can be destroyed without recourse.

傳統上,在兩個智能裝置客戶間進行通訊的情況下,雙方都需要登入一個基於公共雲的伺服器,以執行即時的影像、語音、文本或應用程序通訊。如上所述,由於通訊必須透過基於公共雲的伺服器,隱私及安全性很容易受到損害。Traditionally, in the case of communication between two smart device clients, both parties need to log in to a public cloud-based server to perform real-time image, voice, text or application communication. As mentioned above, since communications must go through public cloud-based servers, privacy and security can easily be compromised.

此外,物聯網裝置是家庭智能電器的組成成分,一直受到來自 Matter、Apple HomeKit、Google Nest、Amazon Alexa 等許多標準的碎片化(fragmentation)的困擾。由於物聯網裝置的交互運作、兼容性及隱私及安全性問題,家庭智能家電的採用率一直低於預期。In addition, IoT devices, which are components of home smart appliances, have been plagued by fragmentation from standards such as Matter, Apple HomeKit, Google Nest, Amazon Alexa, and many others. The adoption rate of smart home appliances has been lower than expected due to issues around interoperability, compatibility, and privacy and security of IoT devices.

因此,需要一種解決上述問題的系統及方法。先前的發明在私有原宇宙(private metaverse,PM)的環境中具有私有雲虛擬私有網路伺服器(private cloud VPN server,PCVS)以及私有物質閘道器(private matter gateway,PMG),解決了這種需要。Therefore, a system and method are needed to solve the above problems. Previous inventions have a private cloud VPN server (PCVS) and a private matter gateway (PMG) in a private metaverse (PM) environment to solve this problem. kind of need.

此外,隨著網際網路演進至Web 3.0,元界開始出現,以便為特定的用戶群體提供用例場景,以私密及安全的方式存取一組特定內容。在公共雲元宇宙中的用例場景,在更廣泛的範圍內模仿了先前發明的私有元宇宙。相似之處在於,私有雲虛擬私有網路伺服器被元宇宙虛擬私有網路伺服器(Metaverse VPN Server,MVVS)取代,以及私有物質閘道器被元宇宙應用程序閘道器(Metaverse App Gateway,MVAG)取代。不同之處在於,元宇宙應用程序閘道器由元宇宙提供者部署在自己的元宇宙應用程序環境中,而不是由用戶在私有區域網路(local area network,LAN)中部署的私有物質閘道器的情況。此外,元宇宙應用程序閘道器的內容是虛擬世界應用程序特定的,例如存檔內容、實況串流事件及域特定內容,與私有物質閘道器的內容不同。私有物質閘道器更傾向於用戶私有區域網路上的物聯網裝置或網絡服務。本發明解決了這種需要。In addition, as the Internet evolved into Web 3.0, Metaverse began to emerge to provide use case scenarios for specific user groups to access a specific set of content in a private and secure manner. The use case scenarios in the public cloud metaverse mimic the previously invented private metaverse to a broader extent. The similarities are that the Private Cloud VPS was replaced by the Metaverse VPN Server (MVVS), and the Private Matter Gateway was replaced by the Metaverse App Gateway (Metaverse App Gateway, MVAG). The difference is that the Metaverse Application Gateway is deployed by the Metaverse Provider in its own Metaverse Application Environment, rather than being a private matter gateway deployed by the user in a private area network (LAN) The situation of Taoist tools. Additionally, the content of the Metaverse Application Gateway is specific to the virtual world application, such as archived content, live streaming events, and domain-specific content, unlike the content of the Private Matter Gateway. Private physical gateways prefer IoT devices or network services on the user's private local area network. The present invention addresses this need.

本發明揭露一種用於公共雲網路的方法。方法包含有主從式在一個客戶的伺服器關係中,設定至少一個公共雲入口網站(public cloud portal,PCP)、至少一個虛擬機伺服器(virtual machine server,VMS)、至少一個公共雲入口網站管理裝置、至少一個元宇宙虛擬私有網路(virtual private network,VPN)伺服器(metaverse VPN server,MVVS)、至少一個虛擬私有網路通道(tunnel)、在至少一個元宇宙虛擬私有網路伺服器一側的至少一個元宇宙虛擬私有網路伺服器智能裝置客戶以提供複數個基於雲端的網路服務、包含有至少一個私有路由器的至少一個元宇宙應用程序(metaverse application,MA)、至少一個私有區域網路(local area network,LAN)、至少一個元宇宙應用程序閘道器(metaverse application gateway,MVAG)、至少一個元宇宙應用程序閘道器管理裝置、至少一個元宇宙應用程序閘道器網路服務及在一元宇宙應用程序閘道器私有區域網路一側的至少一個元宇宙應用程序閘道器智能裝置客戶。元宇宙虛擬私有網路伺服器智能裝置客戶,例如智能手機、平板電腦、筆記型電腦(notebook,NB)或在公共雲中運作的特斯拉儀表板,及元宇宙應用程序閘道器智能裝置客戶,如筆記型電腦、物聯網(Internet of Things,IoT)裝置、網路連接存儲裝置(network attached storage,NAS)、機上盒(set-top-box,STB)、智能設備、存檔內容伺服器、直播活動內容或媒體伺服器,位在私有及安全的區域網路上。本發明基於去中心化的節點對節點(peer-to-peer,P2P)通訊架構,以提供用戶存取便利性的同時,也提供隱私及安全性。至少一個公共雲入口網站及包含有元宇宙虛擬私有網路伺服器的至少一個虛擬機伺服器通常位在(reside)公共雲網路上的一個超大規模資料中心,以及至少一個元宇宙應用程序連同(along with)元宇宙應用程序閘道器及至少一個元宇宙應用程序閘道器智能裝置客戶或網路服務位在複數個元宇宙提供者的應用程序環境。元宇宙虛擬私有網路伺服器中繼(relay)元宇宙虛擬私有網路伺服器一側的元宇宙虛擬私有網路伺服器智能裝置客戶及元宇宙應用程序閘道器間的通訊。根據元宇宙虛擬私有網路伺服器智能裝置客戶請求,元宇宙虛擬私有網路伺服器按照需求回撥元宇宙應用程序閘道器。在元宇宙虛擬私有網路伺服器及元宇宙應用程序閘道器間,至少一個虛擬私有網路通道被啟用及被建立。在元宇宙虛擬私有網路伺服器及元宇宙虛擬私有網路伺服器智能裝置客戶間,至少一個虛擬私有網路通道被啟用及被建立。兩條虛擬私有網路通道被合併為元宇宙虛擬私有網路伺服器智能裝置客戶及元宇宙應用程序閘道器間透過元宇宙虛擬私有網路伺服器的單一虛擬私有網路通道。從此時起,透過元宇宙虛擬私有網路伺服器,元宇宙虛擬私有網路伺服器智能裝置客戶及元宇宙應用程序閘道器間進行的所有通訊都是安全及私有的。所有元宇宙應用程序閘道器智能裝置客戶連同元宇宙應用程序的私有區域網路上的網路服務可在區域網路模式下存取,用於來自元宇宙虛擬私有網路伺服器智能裝置客戶的未來虛擬私有網路連結。從此時起,元宇宙應用程序閘道器及元宇宙虛擬私有網路伺服器處於待機模式,等待來自在網際網路的公共雲中的元宇宙虛擬私有網路伺服器智能裝置客戶的未來存取。The invention discloses a method for a public cloud network. The method includes setting up at least one public cloud portal (PCP), at least one virtual machine server (VMS), and at least one public cloud portal in a client's server relationship in a master-slave manner. Management device, at least one metaverse virtual private network (VPN) server (metaverse VPN server, MVVS), at least one virtual private network channel (tunnel), at least one metaverse virtual private network server At least one Metaverse virtual private network server smart device client on one side provides a plurality of cloud-based network services, at least one Metaverse application (MA) including at least one private router, at least one private A local area network (LAN), at least one metaverse application gateway (MVAG), at least one metaverse application gateway management device, at least one metaverse application gateway network Road services and at least one Metaverse Application Gateway smart device client on one side of the Metaverse Application Gateway private area network. Metaverse VPS smart device customers such as smartphones, tablets, notebooks (NB) or Tesla Dashboards running in the public cloud, and Metaverse Application Gateway smart devices Customers such as laptops, Internet of Things (IoT) devices, network attached storage (NAS), set-top-box (STB), smart devices, and archived content servers server, live event content or media server, located on a private and secure LAN. The present invention is based on a decentralized peer-to-peer (P2P) communication architecture to provide user access convenience while also providing privacy and security. At least one public cloud portal and at least one virtual machine server containing a Metaverse virtual private network server typically located in a hyperscale data center on a public cloud network, and at least one Metaverse application along with ( Along with) the Metaverse Application Gateway and at least one Metaverse Application Gateway smart device client or network service located in the application environment of a plurality of Metaverse Providers. The Metaverse VPN Server relays communications between the Metaverse VPN Server smart device clients on the Metaverse VPN Server side and the Metaverse Application Gateway. Based on the Metaverse VPN Server smart device client request, the Metaverse VPN Server calls back to the Metaverse Application Gateway as needed. At least one virtual private network channel is enabled and established between the Metaverse Virtual Private Network Server and the Metaverse Application Gateway. At least one virtual private network channel is enabled and established between the Metaverse Virtual Private Network Server and the Metaverse Virtual Private Network Server smart device client. The two virtual private network channels are merged into a single virtual private network channel between the Metaverse VPN Server smart device client and the Metaverse Application Gateway through the Metaverse VPN Server. From this point on, through the Metaverse VPS, all communications between the Metaverse VPS smart device clients and the Metaverse Application Gateway are secure and private. All Metaverse Application Gateway smart device customers along with network services on the Metaverse Application's private LAN are accessible in LAN mode for use by Metaverse Virtual Private Network Server smart device customers. The virtual private network connection of the future. From this point forward, the Metaverse Application Gateway and the Metaverse VPN Server are in standby mode, awaiting future access from Metaverse VPN Server smart device customers in the public cloud on the Internet .

至少一個公共雲入口網站最初被至少一個元宇宙虛擬私有網路伺服器客戶存取,以登入以及獲得包含有元宇宙虛擬私有網路伺服器密碼、虛擬機伺服器區域名稱、元宇宙虛擬私有網路伺服器虛擬私有網路客戶配置文件及元宇宙虛擬私有網路伺服器虛擬私有網路客戶密碼的連結認證。元宇宙虛擬私有網路伺服器虛擬私有網路客戶配置文件及元宇宙虛擬私有網路伺服器虛擬私有網路客戶密碼可被傳送到任一授權的元宇宙虛擬私有網路伺服器客戶,以供未來存取。使用這兩個認證,授權的元宇宙虛擬私有網路伺服器客戶可透過公共雲入口網站連接到目標虛擬機伺服器,進而連接到對應的 元宇宙虛擬私有網路伺服器。連接後,元宇宙虛擬私有網路伺服器客戶及元宇宙虛擬私有網路伺服器間的第一虛擬私有網路通道被啟用。一旦(或若)複數個適當認證被建立,在元宇宙應用程序的私有區域網路中的至少一個元宇宙應用程序閘道器與在公共雲中的至少一個元宇宙虛擬私有網路伺服器將按照需求啟用第三虛擬私有網路通道。在公共雲中的至少一個元宇宙虛擬私有網路伺服器將依序回撥在私有區域網路中的至少一個元宇宙應用程序閘道器,以啟用第一虛擬私有網路通道。一旦(或若)第一虛擬私有網路通道被元宇宙虛擬私有網路伺服器啟用,在元宇宙應用程序的私有區域網路中的至少一個元宇宙應用程序閘道器與在公共雲中的至少一個元宇宙虛擬私有網路伺服器建立第一虛擬私有網路通道。第二虛擬私有網路通道也被元宇宙虛擬私有網路伺服器啟用,其用於元宇宙虛擬私有網路伺服器智能裝置客戶。透過元宇宙虛擬私有網路伺服器虛擬私有網路客戶配置文件,至少一個元宇宙虛擬私有網路伺服器智能裝置客戶啟動用於連接到至少一個元宇宙虛擬私有網路伺服器的一個請求,以按照需求建立第三虛擬私有網路通道,以防在至少一個元宇宙應用程序的私有區域網路中,至少一個元宇宙虛擬私有網路伺服器智能裝置客戶試圖存取在元宇宙應用程序的區域網路上的任一元宇宙應用程序閘道器智能裝置客戶或元宇宙網路服務。在公共雲中的至少一個元宇宙虛擬私有網路伺服器將依序回撥在元宇宙應用程序的私有區域網路中的至少一個元宇宙應用程序閘道器,以按照需求建立第三條虛擬私有網路通道,以及中繼來自網際網路的元宇宙虛擬私有網路伺服器智能裝置客戶及元宇宙應用程序閘道器間的通訊。元宇宙應用程序閘道器位在元宇宙應用程序的私有區域網路上。按照需求建立的第二虛擬私有網路通道及按照需求建立的第三虛擬私有網路通道被合併為元宇宙虛擬私有網路伺服器智能裝置客戶及元宇宙應用程序閘道器間透過元宇宙虛擬私有網路伺服器的單一虛擬私有網路通道。從此時起,元宇宙虛擬私有網路伺服器智能裝置客戶及元宇宙應用程序閘道器間透過元宇宙虛擬私有網路伺服器的進行的所有通訊是安全及私有的。所有元宇宙應用程序閘道器智能裝置客戶連同在元宇宙應用程序的私有區域網路上的網路服務可在區域網路模式下存取,用於來自元宇宙虛擬私有網路伺服器智能裝置客戶的未來虛擬私有網路連結。元宇宙應用程序閘道器及元宇宙虛擬私有網路伺服器都處於待機模式,等待來自在網際網路的公共雲中的元宇宙虛擬私有網路伺服器智能裝置客戶的未來存取。At least one public cloud portal is initially accessed by at least one Metaverse VPN server client to log in and obtain information including the Metaverse VPN server password, the VM server zone name, the Metaverse VPN server Link authentication of Route Server VPN Client Profile and Metaverse VPN Server VPN Client Password. The Metaverse VPN Server VPN Client Profile and the Metaverse VPN Server VPN Client Password can be sent to any authorized Metaverse VPN Server Client for use by Future access. Using these two authentications, authorized Metaverse VPS customers can connect to the target virtual machine server through the public cloud portal, and then connect to the corresponding Metaverse VPS server. After the connection, the first virtual private network channel between the Metaverse VPN server client and the Metaverse VPN server is enabled. Once (or if) appropriate authentication is established, at least one Metaverse Application Gateway in the Metaverse Application's private local area network and at least one Metaverse Virtual Private Network Server in the public cloud will Enable the third virtual private network channel as required. At least one Metaverse virtual private network server in the public cloud will sequentially call back at least one Metaverse application gateway in the private local area network to enable the first virtual private network channel. Once (or if) the first VPN channel is enabled by the Metaverse VPN server, at least one Metaverse application gateway in the Metaverse application's private area network communicates with the Metaverse application gateway in the public cloud. At least one Metaverse virtual private network server establishes the first virtual private network channel. The second VPN channel is also enabled by the Metaverse VPN Server, which is used by Metaverse VPN Server smart device customers. Through the Metaverse VPN Server VPN Client Profile, at least one Metaverse VPN Server Smart Device Client initiates a request for connecting to at least one Metaverse VPN Server to Establishing a third virtual private network channel on demand to prevent at least one Metaverse virtual private network server smart device client from attempting to access the area within the Metaverse application within the private area network of at least one Metaverse application Any Metaverse application gateway smart device client or Metaverse network service on the network. At least one Metaverse virtual private network server in the public cloud will in turn call back at least one Metaverse application gateway in the Metaverse application's private area network to establish a third virtual private network as needed. Private network channels and relays communications from the Internet between Metaverse VPN Server smart device clients and the Metaverse Application Gateway. The Metaverse Application Gateway is located on the Metaverse Application's private local network. The second virtual private network channel established on demand and the third virtual private network channel established on demand are merged into Metaverse Virtual Private Network Server Smart Device Client and Metaverse Application Gateway through Metaverse Virtual A single virtual private network channel for a private network server. From this point on, all communications between the Metaverse VPN Server smart device clients and the Metaverse Application Gateway via the Metaverse VPN Server are secure and private. All Metaverse Application Gateway smart device clients along with network services on the Metaverse Application's private LAN are accessible in LAN mode for smart device clients from the Metaverse Virtual Private Network Server future virtual private network connections. Both the Metaverse Application Gateway and the Metaverse VPN Server are in standby mode, awaiting future access from Metaverse VPN Server smart device customers in the public cloud on the Internet.

綜上所述,本發明建立至少一個元宇宙虛擬私有網路伺服器及至少一個元宇宙應用程序閘道器主從式在一個客戶的伺服器關係中。透過公共雲網路,至少一個元宇宙虛擬私有網路伺服器及至少一個元宇宙應用程序閘道器私有及安全地互相通訊。本發明建立至少一個元宇宙虛擬私有網路伺服器智能裝置客戶及至少一個元宇宙虛擬私有網路伺服器主從式在一個客戶的伺服器關係中。本發明建立至少一個元宇宙應用程序閘道器智能裝置客戶、至少一個元宇宙應用程序閘道器元宇宙網路服務及至少一個元宇宙應用程序閘道器主從式在一個客戶的伺服器關係中。本發明建立至少一個元宇宙虛擬私有網路伺服器智能裝置客戶及至少一個元宇宙應用程序閘道器主從式在一個客戶的伺服器關係中。透過公共雲網路,至少一個元宇宙虛擬私有網路伺服器智能裝置客戶及至少一個元宇宙應用程序閘道器互相通訊。透過公共雲網路,至少一個元宇宙虛擬私有網路伺服器智能裝置客戶及至少一個元宇宙應用程序閘道器智能裝置客戶私有及安全地互相通訊。透過公共雲網路,至少一個元宇宙虛擬私有網路伺服器智能裝置客戶及至少一個元宇宙應用程序閘道器元宇宙網路服務私有及安全地互相通訊。In summary, the present invention establishes at least one Metaverse virtual private network server and at least one Metaverse application gateway master-slave in a client-server relationship. Through the public cloud network, at least one Metaverse virtual private network server and at least one Metaverse application gateway communicate with each other privately and securely. The present invention establishes at least one Metaverse virtual private network server smart device client and at least one Metaverse virtual private network server master-slave in a client-server relationship. The present invention establishes a client-server relationship of at least one Metaverse application gateway smart device client, at least one Metaverse application gateway Metaverse network service and at least one Metaverse application gateway master-slave mode. middle. The present invention establishes at least one Metaverse virtual private network server smart device client and at least one Metaverse application gateway master-slave in a client-server relationship. Through the public cloud network, at least one Metaverse virtual private network server smart device client and at least one Metaverse application gateway communicate with each other. Through the public cloud network, at least one Metaverse virtual private network server smart device client and at least one Metaverse application gateway smart device client communicate with each other privately and securely. Through the public cloud network, at least one Metaverse virtual private network server smart device client and at least one Metaverse application gateway Metaverse network service communicate with each other privately and securely.

虛擬私有網路通道基於產業標準,確保隱私及安全性,以及通訊中防過時的交互運作(interoperability)及兼容性(compatibility)。透過以私有及安全的方式執行的虛擬私有網路連結,所有元宇宙應用程序閘道器客戶,包含物聯網裝置,連同私有區域網路上的網路服務都可從元宇宙虛擬私有網路伺服器客戶在區域網路模式中存取。現有技術依賴於透過基於雲端的中繼伺服器在私有區域網路上的客戶或物聯網裝置的雲端模式存取。不同於現有技術,本發明僅依賴於透過虛擬私有網路通道的區域網路模式存取。由於產業公認的虛擬私有網路通道的強度,存取文本本身永遠不會也不能被監控或記錄。因此,與大多數另一個現有技術所提供的技術相比,本發明在存取通訊方面更加私有及安全。網路連結基於網際網路協定。Virtual private network channels are based on industry standards to ensure privacy and security, as well as anti-obsolescence interoperability and compatibility in communications. Through a VPN connection that is implemented in a private and secure manner, all Metaverse Application Gateway clients, including IoT devices, as well as network services on the private area network, can access the Metaverse VPN servers from Client accesses in LAN mode. Existing technologies rely on cloud-mode access to clients or IoT devices on a private area network through a cloud-based relay server. Unlike the prior art, the present invention only relies on LAN mode access through a virtual private network channel. Due to the industry-recognized strength of virtual private network channels, the access text itself is never and cannot be monitored or logged. Therefore, the present invention is more private and secure in accessing communications than most other technologies provided by the prior art. Network connections are based on the Internet Protocol.

因此,該解決方案與平台無關,同時與所有現存碎片化的(fragmented)物聯網裝置平台相容,無論是Matter、Apple HomeKit、Google Nest或是Amazon Alexa,只要物聯網裝置是區域網路可發現的及可聯網的。為進一步考慮安全性,透過網際網路,根據來自雲端的元宇宙虛擬私有網路伺服器客戶的管理員帳戶的請求,包含有元宇宙虛擬私有網路伺服器密碼、虛擬機伺服器區域名稱、元宇宙虛擬私有網路伺服器虛擬私有網路客戶配置文件及元宇宙虛擬私有網路伺服器虛擬私有網路客戶密碼的連結認證可被撤銷及被重新頒發。本發明請求未來的元宇宙應用程序閘道器客戶,即物聯網裝置,運作在區域網路模式中,而不是運作在雲端模式中,以實現用戶的絕對隱私及安全性。透過上述做法,物聯網裝置不再需要提供他們自己的基於雲端的中繼伺服器。給用戶帶來的相應好處是:Therefore, the solution is platform agnostic and compatible with all existing fragmented IoT device platforms, whether it is Matter, Apple HomeKit, Google Nest or Amazon Alexa, as long as the IoT device is discoverable by the local network and internet-enabled. In order to further consider security, through the Internet, according to the request from the administrator account of the Metaverse Virtual Private Server customer in the cloud, the Metaverse Virtual Private Network server password, virtual machine server zone name, Link certificates for Metaverse VPN Server VPN Client Profiles and Metaverse VPN Server VPN Client Passwords may be revoked and reissued. The present invention requires future Metaverse application gateway clients, that is, IoT devices, to operate in local network mode instead of operating in cloud mode to achieve absolute privacy and security of users. With the above approach, IoT devices no longer need to provide their own cloud-based relay servers. The corresponding benefits to users are:

A. 打破Apple及Google等行動作業系統(operating system,OS)提供商對應用程序及物聯網裝置存取的壟斷;A. Break the monopoly of mobile operating system (OS) providers such as Apple and Google on access to applications and IoT devices;

B. 透過網際網路從世界任何地方存取的方便性;B. Convenience of access from anywhere in the world via the Internet;

C. 真正的存取隱私及安全性;C. True access privacy and security;

D. 同時與 Matter、Apple HomeKit、Google Nest及Amazon Alexa 的交互運作及兼容性;D. Simultaneous interaction and compatibility with Matter, Apple HomeKit, Google Nest and Amazon Alexa;

E. 降低物聯網裝置製造的進入門檻,因為物聯網製造商不再需要基於雲端的中繼伺服器;E. Lower the entry barrier for IoT device manufacturing because IoT manufacturers no longer need cloud-based relay servers;

F. 重新灌輸消費者信心,以刺激未來物聯網裝置銷售;F. Re-instill consumer confidence to stimulate future IoT device sales;

G. 在安全聊天、語音及影像等方面為物聯網市場開闢新的垂直應用程序;以及G. Open up new vertical applications for the IoT market in secure chat, voice and imaging; and

H. 基於在網路中的產業網際網路協定及通訊存取的防過時的實施。H. Anti-obsolescence implementation of industrial Internet protocols and communications access in networks.

本發明提供,來自世界任何地方的另一個元宇宙虛擬私有網路伺服器智能裝置客戶,存取一個元宇宙應用程序閘道器智能裝置客戶或家中的物聯網裝置的功能;同時也維持存取方便性、易於部屬、極大的隱私及安全性、完整的兼容性∕交互運作及高性能的好處。The invention provides another Metaverse virtual private network server smart device client from anywhere in the world to access the functions of a Metaverse application gateway smart device client or an IoT device at home; while also maintaining access Benefits of convenience, ease of deployment, extreme privacy and security, complete compatibility/interoperability and high performance.

本發明相關於聯網(networking),尤指一種私有雲網路的使用。以下描述被呈現,以使本領域具通常知識者能製造及使用本發明,以及在專利申請及其要求的背景下被提供。對於本領域具通常知識者來說,在此描述的實施例及一般原理及特徵的各種修改將是顯而易見的。因此,本發明不限於所示的實施例,而是要符合與本文所述的原理及特徵一致的最寬範圍。The present invention relates to networking, and in particular to the use of a private cloud network. The following description is presented to enable one of ordinary skill in the art to make and use the invention, and is provided in the context of patent applications and their claims. Various modifications to the embodiments and general principles and features described herein will be apparent to those of ordinary skill in the art. Thus, the present invention is not intended to be limited to the embodiments shown but is to be accorded the widest scope consistent with the principles and features described herein.

在本文中的整個討論中,術語“客戶”可與“智能裝置客戶”互換。在本文中的整個討論中,術語“路由器”通常可與“閘道器”(gateway)、“存取點”(access point,AP)及∕或“網路地址轉換”(network address translation,NAT)互換。“平台”(platform) 通常可與“生態系統”(ecosystem)互換。Throughout the discussion herein, the term "customer" is interchangeable with "smart device customer." Throughout the discussion in this article, the term "router" is often used interchangeably with "gateway", "access point" (AP), and/or "network address translation" (NAT). ) interchange. "Platform" is often interchangeable with "ecosystem".

本發明的系統及方法解決面向消費者的環境中的以下挑戰,以使區域網路(wide area network,WAN)中的智能裝置客戶能從私有雲存儲伺服器(Private Cloud Storage Server,PCSS)或任一私有雲伺服器(Private Cloud Server,PCS)獲得服務:The system and method of the present invention solve the following challenges in consumer-oriented environments to enable smart device customers in a wide area network (WAN) to obtain data from a Private Cloud Storage Server (PCSS) or Any private cloud server (Private Cloud Server, PCS) obtains services:

1. 隨時隨地存取私有雲伺服器。1. Access private cloud servers anytime and anywhere.

2. 使用固定或動態網際網路協定(Internet Protocol,IP)地址存取防火牆後的私有雲伺服器。2. Use fixed or dynamic Internet Protocol (IP) addresses to access private cloud servers behind the firewall.

3. 在廣域網路中不需要基於公共雲的路由伺服器。3. No public cloud-based routing server is required in the WAN.

4. 無需在區域網路(local area network,LAN)中設置額外的路由器。4. No need to set up additional routers in the local area network (LAN).

5. 與私有雲伺服器進行身份驗證。5. Authenticate with the private cloud server.

6. 與私有雲伺服器建立安全的通訊通道。6. Establish a secure communication channel with the private cloud server.

若這些挑戰可被滿足及解決,由於即插即用的簡單性及可用性,私有雲伺服或服務的部署將成倍增加。藉由不使用基於公共雲的路由伺服器,技術及業務問題被消除。用於存儲、遠端桌面服務及物聯網(Internet of Things,IoT)的私有雲伺服器在私有雲基礎設施中變得非常實惠及無處不在。If these challenges can be met and solved, the deployment of private cloud servers or services will increase exponentially due to plug-and-play simplicity and availability. By not using public cloud-based routing servers, technical and business issues are eliminated. Private cloud servers for storage, remote desktop services, and the Internet of Things (IoT) have become extremely affordable and ubiquitous in private cloud infrastructure.

在私有雲環境中,若同時存在多個私有雲伺服器或服務,將 私有雲伺服器的功能分成兩個功能塊是有利的。功能塊包含有私有雲路由服務(Private Cloud Routing Service,PRS)及元宇宙網路服務(Metaverse Network Service,MVNS)。In a private cloud environment, if there are multiple private cloud servers or services at the same time, it is advantageous to divide the functions of the private cloud server into two functional blocks. Functional blocks include Private Cloud Routing Service (PRS) and Metaverse Network Service (MVNS).

元宇宙網路服務被設計為由智能裝置客戶在私有網路環境(無論是有線的還是無線的)上管理及存取。元宇宙網路服務的實施例包含有應用程序程式伺服器,以提供遠程桌面協議(remote desktop protocol,RDP)、虛擬網路計算(VNC)、辦公工具、媒體播放器及另一個用戶特定的應用程序。元宇宙網路服務也可用作存儲伺服器,其包含有服務私有雲的多個兆位元組(terabyte,TB)存儲裝置。接著,可將多個元宇宙應用程序閘道器(Metaverse Application Gateway,MVAG)的私有雲路由服務的功能聚合為一個元宇宙應用程序閘道器。元宇宙應用程序閘道器通常可稱為私有雲路由器。Metaverse Network Services are designed to be managed and accessed by smart device customers over a private network environment (whether wired or wireless). Examples of Metaverse network services include application servers to provide remote desktop protocol (RDP), virtual network computing (VNC), office tools, media players, and another user-specific application program. Metaverse Network Services can also be used as storage servers, which contain multiple terabyte (TB) storage devices serving private clouds. Then, the functions of the private cloud routing services of multiple Metaverse Application Gateways (MVAG) can be aggregated into one Metaverse Application Gateway. The Metaverse Application Gateway is often referred to as a private cloud router.

本發明的系統及方法解決了在面向消費者的環境中使用在廣域網路中能夠管理及存取來自元宇宙應用程序閘道器的元宇宙網路服務的智能裝置客戶的以下挑戰:The systems and methods of the present invention address the following challenges for customers in consumer-facing environments using smart devices over wide area networks capable of managing and accessing Metaverse network services from Metaverse application gateways:

1. 隨時隨地存取元宇宙應用程序閘道器。1. Access the Metaverse application gateway anytime, anywhere.

2. 使用固定或動態存取防火牆後的元宇宙應用程序閘道器。2. Use the Metaverse Application Gateway behind a fixed or dynamic access firewall.

3. 在廣域網路中不需要外部或基於公共雲的路由伺服器。3. No external or public cloud-based routing servers are required in the WAN.

4. 無需在區域網路中設置額外的路由器。4. No need to set up additional routers in the local network.

5. 與元宇宙應用程序閘道器進行身份驗證。5. Authenticate with the Metaverse Application Gateway.

6. 與私有雲伺服器建立安全的通訊通道,以進行管理及存取。6. Establish a secure communication channel with the private cloud server for management and access.

若元宇宙應用程序閘道器能滿足上述挑戰,來自不同製造商及供應商的異質類(heterogeneous)私有雲伺服器可被分解為更簡單的元宇宙網路服務,以及移除私有雲設置、設定及存取的複雜性。If the Metaverse Application Gateway can meet the above challenges, heterogeneous private cloud servers from different manufacturers and vendors can be broken down into simpler Metaverse network services, and the private cloud settings can be removed. Complexity of setup and access.

本發明的系統及方法的目的是在不使用路由伺服器的情況下提供元宇宙應用程序閘道器、元宇宙網路服務及客戶端架構。本發明的系統及方法解決了上述挑戰,以允許客戶能隨時隨地存取元宇宙網路服務。系統及方法也使用固定或動態網際網路協定存取防火牆後的元宇宙網路服務,不需額外的路由器設置,也不需要在廣域網路中基於公共雲的路由伺服器,以與元宇宙應用程序閘道器進行身份驗證,以及直接與元宇宙網路服務建立安全的通訊通道。The purpose of the system and method of the present invention is to provide the Metaverse application gateway, Metaverse network services and client architecture without using a routing server. The system and method of the present invention solve the above challenges to allow customers to access Metaverse network services anytime and anywhere. Systems and methods also use fixed or dynamic Internet protocols to access Metaverse network services behind firewalls, requiring no additional router setup or public cloud-based routing servers in the wide area network to interface with Metaverse applications The procedural gateway performs authentication and establishes a secure communication channel directly with Metaverse network services.

如第1圖所示,雲端網路基礎設施包含有公共雲100、公共雲伺服器113、公共路由伺服器112、公共虛擬私有網路(virtual private network,VPN)路由伺服器114、在廣域網路中的智能裝置客戶101、Router_P 102及Router_S 103。Router_S 103連接在區域網路105及在公共雲100中的網際網路間。Router_S 102連接區域網路104及公共雲100中的網際網路間。智能裝置客戶106、107及私有雲伺服器108在區域網路104後。智能裝置客戶109、110及111在區域網路105後。智能裝置客戶可為個人電腦、筆記型電腦、平板電腦、特斯拉儀表板、智能手機、電子書閱讀器、全球定位系統、智能電視、機上盒、MP3播放器或任一可聯網的嵌入式裝置。As shown in Figure 1, the cloud network infrastructure includes a public cloud 100, a public cloud server 113, a public routing server 112, a public virtual private network (VPN) routing server 114, and a wide area network Smart device client 101, Router_P 102 and Router_S 103 in . Router_S 103 is connected between the local network 105 and the Internet in the public cloud 100 . Router_S 102 connects the local network 104 and the Internet in the public cloud 100 . Smart device clients 106, 107 and private cloud server 108 are behind the local network 104. Smart device clients 109, 110 and 111 are behind local area network 105. Smart device customers can be PCs, laptops, tablets, Tesla dashboards, smartphones, e-book readers, GPS, smart TVs, set-top boxes, MP3 players or any internet-enabled embedded device device.

智能裝置客戶在雲端網路基礎設施中被表示為 101、106、107、109、110及111。上述任一智能裝置客戶在本文的討論中是可互換的。本文的討論焦點是智能裝置客戶109,作為該本文的代表。Smart device clients are represented in the cloud network infrastructure as 101, 106, 107, 109, 110 and 111. Any of the above smart device clients are interchangeable in the discussion of this article. The focus of this article is smart device customer 109, as the representative of this article.

實際上,智能裝置客戶101、107或109可連接到私有雲伺服器108的有三個情境。第一,智能裝置客戶107決定目標是否在本地可存取的區域網路104中,以及決定直接連接到私有雲伺服器108。第二,智能裝置客戶101決定目標不在本地可存取的區域網路104中,以及決定透過廣域網路連接到公共雲100。廣域網路定位Router_P 102及區域網路104,以及連接到私有雲伺服器108。第三,智能裝置客戶109決定目標不在本地可存取的區域網路105中,並決定透過區域網路105及Router_S 103,連接到廣域網路中的公共雲100。In fact, there are three scenarios in which the smart device client 101, 107 or 109 can connect to the private cloud server 108. First, the smart device client 107 determines whether the target is in a locally accessible local network 104 and decides to connect directly to the private cloud server 108 . Second, the smart device client 101 determines that the target is not within the locally accessible local area network 104 and decides to connect to the public cloud 100 over the wide area network. WAN locates Router_P 102 and LAN 104, and connects to private cloud server 108. Third, the smart device client 109 determines that the target is not in the locally accessible local network 105 and decides to connect to the public cloud 100 in the wide area network through the local network 105 and Router_S 103 .

智能裝置客戶109定位Router_P 102及區域網路104,以及連接到私有雲伺服器108。第一情境及第二情境是第三情境的兩種特殊情況及衍生情況。因此,關注範圍及復雜性更廣的第三種情況是有益的。Smart device client 109 locates Router_P 102 and local area network 104, and connects to private cloud server 108. The first situation and the second situation are two special situations and derivative situations of the third situation. Therefore, it is useful to focus on the third case, which is broader in scope and complexity.

如第2圖所示,雲端網路基礎設施包含有公共雲200、公共雲伺服器213、公共路由伺服器212、公共虛擬私有網路路由伺服器214、廣域網路中的私有雲回撥伺服器(Private Cloud Call-Back Server,PCCBS)智能裝置客戶201、Router_P 202及Router_S 203。Router_S 203連接區域網路205及公共雲200中的網際網路。Router_S 203連接在區域網路205及在公共雲200中的網際網路間。路由伺服器訊息框(未標示出)或客戶訊息框message_box_S 215可被主持在電子郵件伺服器、文本訊息伺服器、網路伺服器、或任一類型的伺服器內。任一類型的伺服器可主持用於在私有雲路由伺服器(Private Cloud Routing Server,PCRS)208、私有雲回撥伺服器216、私有雲路由伺服器智能裝置客戶206、207及私有雲回撥伺服器智能裝置客戶209、210、211、201、221間交換訊息的安全訊息,其中私有雲路由伺服器208及私有雲回撥伺服器216作為伺服器,以及私有雲路由伺服器智能裝置客戶206、207及私有雲回撥伺服器智能裝置客戶209、210、211、201、221作為客戶。回撥伺服器訊息框(未標示出)或客戶訊息框message_box_S 215是可存取的,以及在作為伺服器的私有雲路由伺服器208及私有雲回撥伺服器216或作為客戶的私有雲路由伺服器智能裝置客戶206、207及私有雲回撥伺服器智能裝置客戶209、210、211、201、221的安全及私有的控制下。訊息框的安全性及商業模式在業界是用戶很好理解及期待的。任一訊息框無論出於何種原因關閉,可以立即被更換或被重新部署,不會危及私有雲基礎架構中伺服器及客戶間的通訊。As shown in Figure 2, the cloud network infrastructure includes a public cloud 200, a public cloud server 213, a public routing server 212, a public virtual private network routing server 214, and a private cloud callback server in the wide area network (Private Cloud Call-Back Server, PCCBS) smart device client 201, Router_P 202 and Router_S 203. Router_S 203 connects the local network 205 and the Internet in the public cloud 200 . Router_S 203 is connected between the local network 205 and the Internet in the public cloud 200 . Route server message box (not shown) or client message box message_box_S 215 may be hosted within an email server, text message server, web server, or any type of server. Either type of server can host the services used in the Private Cloud Routing Server (PCRS) 208, Private Cloud Callback Server 216, Private Cloud Routing Server Smart Device Clients 206, 207, and Private Cloud Callback Security messages for exchanging messages between server smart device clients 209, 210, 211, 201, and 221, in which the private cloud routing server 208 and the private cloud callback server 216 serve as servers, and the private cloud routing server smart device client 206 , 207 and private cloud callback server smart device customers 209, 210, 211, 201, 221 as customers. The callback server message box (not shown) or the client message box message_box_S 215 is accessible as well as the private cloud routing server 208 acting as the server and the private cloud callback server 216 or the private cloud routing acting as the client The server smart device clients 206, 207 and the private cloud callback server smart device clients 209, 210, 211, 201, 221 are under the secure and private control. The security and business model of message boxes are well understood and expected by users in the industry. Any message box that is closed for any reason can be immediately replaced or redeployed without compromising communication between servers and customers in the private cloud infrastructure.

第3圖為本發明第一實施例基於在元宇宙應用程序閘道器、元宇宙虛擬私有網路伺服器、元宇宙應用程序閘道器智能裝置客戶及元宇宙虛擬私有網路伺服器智能裝置客戶間用於探索及存取公共於端的元宇宙網路服務的安全連結機制的一個雲端網路基礎建設的示意圖。在雲端中的元宇宙虛擬私有網路伺服器裝置客戶及私有區域網路上的元宇宙應用程序閘道器裝置客戶間的連結機制有五個階段:Figure 3 shows the first embodiment of the present invention based on the Metaverse application gateway, Metaverse virtual private network server, Metaverse application gateway smart device client and Metaverse virtual private network server smart device Schematic diagram of a cloud network infrastructure for secure connection mechanisms between clients to explore and access public metaverse network services. The connection mechanism between Metaverse VPN Server device clients in the cloud and Metaverse Application Gateway device clients on the private local area network has five stages:

第一階段:從公共雲入口網站管理裝置,獲得複數個連結認證;The first stage: Manage the device from the public cloud portal and obtain multiple link certifications;

第二階段:從元宇宙應用程序閘道器,與元宇宙虛擬私有網路伺服器進行配對及註冊;Phase 2: Pair and register with the Metaverse Virtual Private Network Server from the Metaverse Application Gateway;

第三階段:在元宇宙虛擬私有網路伺服器及元宇宙應用程序閘道器間,建立複數個初始虛擬私有網路通道;The third stage: Establish a plurality of initial virtual private network channels between the Metaverse virtual private network server and the Metaverse application gateway;

第四階段:透過元宇宙虛擬私有網路伺服器,在元宇宙虛擬私有網路伺服器智能裝置客戶及元宇宙應用程序閘道器間,按照需求連接到元宇宙應用程序閘道器;以及Phase 4: Through the Metaverse Virtual Private Server, between the Metaverse Virtual Private Server smart device client and the Metaverse Application Gateway, connect to the Metaverse Application Gateway as required; and

第五階段:在至少一個元宇宙虛擬私有網路伺服器智能裝置客戶及至少一個元宇宙應用程序閘道器智能裝置客戶、至少一個元宇宙應用程序閘道器網路服務或另一個元宇宙虛擬私有網路伺服器智能裝置客戶間,運作(run)複數個垂直節點對節點(peer-to-peer,P2P)私有及安全的元宇宙虛擬私有網路伺服器智能裝置客戶應用程序。Phase 5: At least one Metaverse Virtual Private Network Server Smart Device Client and at least one Metaverse Application Gateway Smart Device Client, at least one Metaverse Application Gateway Network Service or another Metaverse Virtual Between private network server smart device clients, run multiple vertical peer-to-peer (P2P) private and secure Metaverse virtual private network server smart device client applications.

在第一階段:從公共雲入口網站管理裝置,獲得複數個連結認證:首先,本身是元宇宙虛擬私有網路伺服器裝置客戶301的公共雲入口網站管理裝置377登入到公共雲入口網站330的公共雲入口網站裝置實用程序(未標示出)以獲得元宇宙虛擬私有網路伺服器裝置客戶認證379及元宇宙虛擬私有網路伺服器認證380。元宇宙虛擬私有網路伺服器裝置客戶認證379包含有元宇宙虛擬私有網路伺服器客戶配置383及元宇宙虛擬私有網路伺服器客戶登入382。元宇宙虛擬私有網路伺服器認證380包含有Domain_MVVS 375及Passcode_MVVS 376。元宇宙虛擬私有網路伺服器裝置客戶認證379及元宇宙虛擬私有網路伺服器認證380皆被儲存在公共雲入口網站裝置客戶378中。元宇宙虛擬私有網路伺服器認證380稍後透過電子郵件被傳送到元宇宙應用程序閘道器管理裝置373,以連接到元宇宙應用程序閘道器308。元宇宙虛擬私有網路伺服器裝置客戶認證379稍後透過電子郵件被傳送到元宇宙虛擬私有網路伺服器裝置客戶321,以連接到元宇宙虛擬私有網路伺服器316。In the first stage: multiple link authentications are obtained from the public cloud portal management device: first, the public cloud portal management device 377 itself, which is the Metaverse VPS device client 301, logs in to the public cloud portal 330 The Public Cloud Portal Installation Utility (not shown) obtains Metaverse VPN Server Installation Client Certification 379 and Metaverse VPN Server Certification 380. Metaverse VPS device client authentication 379 includes Metaverse VPS client configuration 383 and Metaverse VPS client login 382. Metaverse virtual private network server certification 380 includes Domain_MVVS 375 and Passcode_MVVS 376. Metaverse VPN Server Device Client Authentication 379 and Metaverse VPS Server Authentication 380 are both stored in Public Cloud Portal Device Client 378. The Metaverse VPN Server Authentication 380 is later sent via email to the Metaverse Application Gateway Management Device 373 to connect to the Metaverse Application Gateway 308. The Metaverse VPN Server Device Client Authentication 379 is later sent via email to the Metaverse VPN Server Device Client 321 to connect to the Metaverse VPN Server 316.

在第二階段:從元宇宙應用程序閘道器,與元宇宙虛擬私有網路伺服器進行配對及註冊:元宇宙應用程序閘道器管理裝置373使用MVAG_Device實用程序374,以從元宇宙應用程序閘道器管理裝置373初始化及提供元宇宙應用程序閘道器308。如第3圖所示,元宇宙應用程序閘道器308包含有MVAG_Device實用程序371及MVAG_VPN實用程序372。元宇宙應用程序閘道器管理裝置373位於與元宇宙應用程序閘道器308相同的實體區域網路304上,以執行安全目的設定,避免網際網路或廣域網路上的駭客攻擊。元宇宙應用程序閘道器管理裝置373本身是元宇宙應用程序閘道器智能裝置客戶307,包含有應用程序實用程序MVAG_Device實用程序374。MVAG_Device實用程序374包含有Domain_MVVS 375的入口(entry)及Passcode_MVVS 376的入口。Domain_MVVS 375的入口用於設置對應的元宇宙虛擬私有網路伺服器的伺服器區域地址。Passcode_MVVS 376的入口用於設置對應的元宇宙虛擬私有網路伺服器的伺服器密碼。首先,藉由透過Domain_MVVS 375及Passcode_MVVS 376的入口設置其區域名稱,元宇宙應用程序閘道器管理裝置373設定元宇宙虛擬私有網路伺服器認證。元宇宙虛擬私有網路伺服器認證、Domain_MVVS 375及Passcode_MVVS 376用於與元宇宙應用程序閘道器308中的MVAG_Device實用程序371進行通訊。In the second phase: pairing and registering with the Metaverse VPN server from the Metaverse Application Gateway: the Metaverse Application Gateway management device 373 uses the MVAG_Device utility 374 to connect from the Metaverse Application The gateway management device 373 initializes and provides the Metaverse application gateway 308. As shown in Figure 3, the Metaverse application gateway 308 includes the MVAG_Device utility 371 and the MVAG_VPN utility 372. The Metaverse application gateway management device 373 is located on the same physical area network 304 as the Metaverse application gateway 308 to perform security purpose settings to avoid hacker attacks on the Internet or wide area network. The Metaverse application gateway management device 373 itself is the Metaverse application gateway smart device client 307 and includes the application utility MVAG_Device utility 374 . The MVAG_Device utility 374 includes an entry for Domain_MVVS 375 and an entry for Passcode_MVVS 376 . The entry of Domain_MVVS 375 is used to set the server area address of the corresponding Metaverse virtual private network server. The entry of Passcode_MVVS 376 is used to set the server password of the corresponding Metaverse Virtual Private Network server. First, the Metaverse Application Gateway Management Device 373 sets up the Metaverse Virtual Private Network Server authentication by setting its domain name through the entries of Domain_MVVS 375 and Passcode_MVVS 376. Metaverse Virtual Private Server Authentication, Domain_MVVS 375 and Passcode_MVVS 376 are used to communicate with the MVAG_Device utility 371 in the Metaverse Application Gateway 308.

在第三階段:在元宇宙虛擬私有網路伺服器及元宇宙應用程序閘道器間,建立複數個初始虛擬私有網路通道:在元宇宙虛擬私有網路伺服器316與來自元宇宙應用程序閘道器308的元宇宙虛擬私有網路伺服器316進行配對及註冊後,MVAG_VPN實用程序372連接到MVVS_VPN實用程序3720,以及啟用MVAG_VPN實用程序372及MVVS_VPN實用程序3720間的第三虛擬私有網路通道。接著,MVVS_VPN實用程序3720回撥元宇宙應用程序(Metaverse application,MA)370,以啟用MVVS_VPN實用程序3720及MVAG_VPN實用程序372間的第一虛擬私有網路通道。元宇宙應用程序370包含有至少一個元宇宙應用程序閘道器(例如元宇宙應用程序閘道器308)。至少一個元宇宙應用程序閘道器(例如元宇宙應用程序閘道器308)包含有MVAG_VPN實用程序372。在MVVS_VPN實用程序3720及MVAG_VPN實用程序372間,MVVS_VPN實用程序3720可按照需求建立第三虛擬私有網路通道。也可在MVVS_VPN實用程序3720及MVAG_VPN實用程序372間,MVVS_VPN實用程序3720按照需求建立的第三虛擬私有網路通道,等待按照需求建立元宇宙虛擬私有網路伺服器智能裝置客戶309、310、311或321及元宇宙虛擬私有網路伺服器316間的第二虛擬私有網路通道的完成。之後,從網際網路的雲端,在MVAG_VPN實用程序372及MVVS_VPN實用程序3720間,MVAG_VPN實用程序372可建立第一虛擬私有網路通道。MVVS_VPN實用程序3720也可啟用MVVS_VPN實用程序3720及任一元宇宙虛擬私有網路伺服器裝置客戶301、309、310、311或321間的第二虛擬私有網路通道。接著,按照任一元宇宙虛擬私有網路伺服器智能裝置客戶301、309、310、311或321的需求,元宇宙虛擬私有網路伺服器316準備好採取進一步行動。在元宇宙虛擬私有網路伺服器316內部,MVVS_VPN實用程序3720與MVVS_Device實用程序3710進行通訊。MVVS_Device實用程序3710停留在循環中,等待未來元宇宙虛擬私有網路伺服器智能裝置客戶請求的需求。In the third phase: Establish a plurality of initial virtual private network channels between the Metaverse VPN server and the Metaverse application gateway: between the Metaverse VPN server 316 and the Metaverse application gateway After the Metaverse Virtual Private Network Server 316 of the gateway 308 is paired and registered, the MVAG_VPN utility 372 is connected to the MVVS_VPN utility 3720, and the third virtual private network between the MVAG_VPN utility 372 and the MVVS_VPN utility 3720 is enabled. aisle. Next, the MVVS_VPN utility 3720 calls back the Metaverse application (MA) 370 to enable the first virtual private network channel between the MVVS_VPN utility 3720 and the MVAG_VPN utility 372 . Metaverse application 370 includes at least one Metaverse application gateway (eg, Metaverse application gateway 308). At least one Metaverse application gateway (eg, Metaverse application gateway 308) includes the MVAG_VPN utility 372. Between the MVVS_VPN utility 3720 and the MVAG_VPN utility 372, the MVVS_VPN utility 3720 can establish a third virtual private network channel as required. Alternatively, between the MVVS_VPN utility 3720 and the MVAG_VPN utility 372, the MVVS_VPN utility 3720 can establish a third virtual private network channel according to the demand, and wait for the Metaverse virtual private network server smart device clients 309, 310, 311 to be established according to the demand. Or the completion of the second virtual private network channel between 321 and the Metaverse virtual private network server 316. Thereafter, from the Internet cloud, between the MVAG_VPN utility 372 and the MVVS_VPN utility 3720, the MVAG_VPN utility 372 can establish a first virtual private network channel. The MVVS_VPN utility 3720 may also enable a second VPN channel between the MVVS_VPN utility 3720 and any Metaverse VPN server device client 301, 309, 310, 311 or 321. Then, based on the needs of any Metaverse VPN Server smart device client 301, 309, 310, 311 or 321, the Metaverse VPN Server 316 is ready to take further action. Within the Metaverse Virtual Private Network Server 316, the MVVS_VPN utility 3720 communicates with the MVVS_Device utility 3710. The MVVS_Device utility 3710 remains in a loop, waiting for future Metaverse Virtual Private Network Server smart device client requests.

在第四階段:透過元宇宙虛擬私有網路伺服器,在元宇宙虛擬私有網路伺服器智能裝置客戶及元宇宙應用程序閘道器間,按照需求連接到元宇宙應用程序閘道器:在元宇宙虛擬私有網路伺服器316內部,MVVS_VPN實用程序3720與MVVS_Device實用程序3710進行通訊。MVVS_VPN實用程序3720停留在循環中,等待元宇宙虛擬私有網路伺服器智能裝置客戶請求的需求。首先,元宇宙虛擬私有網路伺服器裝置客戶321向MVVS_Device實用程序3710註冊元宇宙虛擬私有網路伺服器客戶認證,包含有元宇宙虛擬私有網路伺服器客戶端配置文件及元宇宙虛擬私有網路伺服器客戶端登入。MVVS_Device實用程序3710傳送元宇宙虛擬私有網路伺服器客戶認證及元宇宙虛擬私有網路伺服器316內部的連結請求到MVVS_VPN實用程序3720。在註冊後,元宇宙虛擬私有網路伺服器裝置客戶321連接到MVVS_VPN實用程序3720,以及在元宇宙虛擬私有網路伺服器裝置客戶321及MVVS_VPN實用程序3720間,按照需求建立第二虛擬私有網路通道。接著,在 MVVS_VPN實用程序3720及元宇宙應用程序370間,MVVS_VPN實用程序3720按照需求建立第三虛擬私有網路通道。元宇宙應用程序370包含有至少一個元宇宙應用程序閘道器(例如元宇宙應用程序閘道器308)。至少一個元宇宙應用程序閘道器(例如元宇宙應用程序閘道器308)包含有MVAG_VPN實用程序372。按照需求建立的第二虛擬私有網路通道及按照需求建立的第三虛擬私有網路通道被合併為元宇宙虛擬私有網路伺服器裝置客戶及MVAG_VPN實用程序372間的單一虛擬私有網路通道。MVAG_VPN實用程序372位在元宇宙應用程序閘道器308中。In the fourth stage: Through the Metaverse Virtual Private Server, between the Metaverse Virtual Private Server smart device client and the Metaverse Application Gateway, connect to the Metaverse Application Gateway as required: Within the Metaverse virtual private network server 316, the MVVS_VPN utility 3720 communicates with the MVVS_Device utility 3710. The MVVS_VPN utility 3720 remains in a loop, waiting for a request from the Metaverse Virtual Private Network Server smart device client. First, the Metaverse VPS device client 321 registers the Metaverse VPS client authentication with the MVVS_Device utility 3710, including the Metaverse VPS client configuration file and the Metaverse VPN Log in to the server client. The MVVS_Device utility 3710 transmits Metaverse VPN server client authentication and connection requests within the Metaverse VPN server 316 to the MVVS_VPN utility 3720. After registration, the Metaverse Virtual Private Network Server Device Client 321 connects to the MVVS_VPN utility 3720, and between the Metaverse Virtual Private Network Server Device Client 321 and the MVVS_VPN Utility 3720, a second virtual private network is established as required. road passage. Next, between the MVVS_VPN utility 3720 and the Metaverse application 370, the MVVS_VPN utility 3720 establishes a third virtual private network channel as required. Metaverse application 370 includes at least one Metaverse application gateway (eg, Metaverse application gateway 308). At least one Metaverse application gateway (eg, Metaverse application gateway 308) includes the MVAG_VPN utility 372. The second on-demand virtual private network channel and the third on-demand virtual private network channel are merged into a single virtual private network channel between the Metaverse VPN server device client and the MVAG_VPN utility 372 . The MVAG_VPN utility 372 is in the Metaverse application gateway 308.

在第五階段:在至少一個元宇宙虛擬私有網路伺服器智能裝置客戶及至少一個元宇宙應用程序閘道器智能裝置客戶、至少一個元宇宙應用程序閘道器網路服務或另一個元宇宙虛擬私有網路伺服器智能裝置客戶間,運作複數個垂直節點對節點私有及安全的元宇宙虛擬私有網路伺服器智能裝置客戶應用程序。分別通過通訊路徑322、324及323,元宇宙虛擬私有網路伺服器智能裝置客戶301、311及321能根據第8-13圖揭露的機制定位元宇宙應用程序閘道器308。元宇宙應用程序閘道器308及元宇宙虛擬私有網路伺服器316構建虛擬區域網路(virtual LAN,VLAN)340及虛擬區域網路3400,允許授權的元宇宙虛擬私有網路伺服器智能裝置客戶301、311及321作為虛擬區域網路340及虛擬區域網路3400的成員加入,以及連接到元宇宙應用程序閘道器裝置客戶306,或元宇宙網路服務328(例如元宇宙應用程序閘道器網路服務),或另一個元宇宙虛擬私有網路伺服器裝置客戶(未標示出),假設另一個元宇宙虛擬私有網路伺服器裝置客戶(未標示出)也已成功連接到MVVS_VPN實用程序3720。虛擬私有網路通道及連接流程請參考第8圖。元宇宙虛擬私有網路伺服器智能裝置客戶301透過安裝的程式可作為主機發起私有及安全的通訊。透過由公共雲入口網站330提供的垂直節點對節點私有及安全的元宇宙虛擬私有網路伺服器智能裝置客戶應用程序(未標示出),元宇宙虛擬私有網路伺服器智能裝置客戶311或321透過安裝的程式可作為訪客接收通訊邀請,以及與元宇宙虛擬私有網路伺服器智能裝置客戶301加入私有及安全的通訊會話。In Phase 5: At least one Metaverse Virtual Private Network Server Smart Device Client and at least one Metaverse Application Gateway Smart Device Client, at least one Metaverse Application Gateway Network Service or another Metaverse The virtual private network server smart device client operates multiple vertical node-to-node private and secure Metaverse virtual private network server smart device client applications. Through communication paths 322, 324 and 323 respectively, Metaverse VPN server smart device clients 301, 311 and 321 can locate the Metaverse application gateway 308 according to the mechanism disclosed in Figure 8-13. The Metaverse Application Gateway 308 and the Metaverse Virtual Private Network Server 316 build a virtual LAN (VLAN) 340 and a virtual local network 3400, allowing authorized Metaverse Virtual Private Network Server smart devices Clients 301, 311, and 321 join as members of VLAN 340 and VLAN 3400, and connect to Metaverse Application Gateway device client 306, or Metaverse Network Service 328 (e.g., Metaverse Application Gateway Router Network Service), or another Metaverse Virtual Private Server Device Client (not shown), assuming that another Metaverse Virtual Private Server Device Client (not shown) has also successfully connected to MVVS_VPN Utilities 3720. Please refer to Figure 8 for the virtual private network channel and connection process. The Metaverse Virtual Private Network Server smart device client 301 can act as a host to initiate private and secure communications through installed programs. Through the vertical node-to-node private and secure Metaverse VPS smart device client application (not shown) provided by the public cloud portal 330, the Metaverse VPS smart device client 311 or 321 Through the installed program, you can receive communication invitations as a guest and join a private and secure communication session with the Metaverse Virtual Private Network Server smart device client 301.

在第五階段中,至少一個元宇宙應用程序閘道器智能裝置客戶及元宇宙虛擬私有網路伺服器智能裝置客戶應用程序形成一個主從式關係。元宇宙虛擬私有網路伺服器智能裝置客戶應用程序包含有在公共雲網路上的應用實用程序。至少一個元宇宙應用程序閘道器智能裝置客戶的功能被傳送到元宇宙虛擬私有網路伺服器智能裝置客戶應用程序的類別代碼(class code)定義。供應商特定的軟體模組或應用程序被元宇宙虛擬私有網路伺服器智能裝置客戶應用程序加載,以支持來自不同製造商對應的元宇宙應用程序閘道器智能裝置。裝置類別包含有語音、影像、人道介面裝置、網際網路協定攝影機、智能鎖、智能燈泡(Smart Lightbulb)、遠端遙控器、恆溫器、印表機、大容量儲存裝置、藍牙、特定應用程序及特定供應商等。In the fifth phase, at least one Metaverse application gateway smart device client and the Metaverse virtual private network server smart device client application form a master-slave relationship. The Metaverse VPN Server smart device client application includes application utilities on public cloud networks. Functionality of at least one Metaverse application gateway smart device client is passed to a class code definition of the Metaverse VPN server smart device client application. Vendor-specific software modules or applications are loaded by the Metaverse VPN Server Smart Device Client Application to support corresponding Metaverse Application Gateway smart devices from different manufacturers. Device categories include voice, imaging, human interface devices, Internet protocol cameras, smart locks, smart lightbulbs, remote controls, thermostats, printers, mass storage devices, Bluetooth, and specific applications and specific suppliers, etc.

如第3圖所示,當元宇宙虛擬私有網路伺服器智能裝置客戶301作為主機想啟動通訊會話時,安裝在主機元宇宙虛擬私有網路伺服器智能裝置客戶上的程式首先定位,以及透過通訊路徑322登入到公共雲入口網站330。在元宇宙虛擬私有網路伺服器316定位元宇宙應用程序閘道器308後,它加入虛擬區域網路340。元宇宙虛擬私有網路伺服器智能裝置客戶承諾作為主機301加入聊天通訊。程式允許元宇宙虛擬私有網路伺服器智能裝置客戶301創造及主持通訊會話。程式廣播主機會話,以邀請通訊訪客321。之後,程式啟動掃描可識別的訪客元宇宙虛擬私有網路伺服器智能裝置客戶321。一旦訪客被授權,元宇宙虛擬私有網路伺服器智能裝置客戶301可作為主機與授權的訪客元宇宙虛擬私有網路伺服器智能裝置客戶321啟動私有及安全的通訊。私有及安全的通訊包含有影像、語音、文本或應用程序。應用程序可為主機及訪客可識別的程式、實用程序、運作(operation)或交易(transaction)。As shown in Figure 3, when the Metaverse Virtual Private Network Server smart device client 301, as the host, wants to start a communication session, the program installed on the host Metaverse Virtual Private Network Server smart device client first locates, and through Communication path 322 logs into public cloud portal 330. After the Metaverse virtual private network server 316 locates the Metaverse application gateway 308, it joins the virtual local network 340. Metaverse virtual private network server smart device customers commit to join the chat communication as host 301. The program allows the Metaverse Virtual Private Network Server smart device client 301 to create and host communication sessions. The program broadcasts the host session to invite communication guests 321. Afterwards, the program starts scanning the identifiable guest Metaverse VPN Server smart device client 321. Once the guest is authorized, the Metaverse VPN Server Smart Device Client 301 can act as a host to initiate private and secure communications with the authorized guest Metaverse VPN Server Smart Device Client 321. Private and secure communications include video, voice, text or applications. An application can be a program, utility, operation, or transaction that is identifiable to the host and guests.

若元宇宙虛擬私有網路伺服器智能裝置客戶311或321想作為訪客加入通訊會話,安裝在訪客元宇宙虛擬私有網路伺服器智能裝置客戶上的程式首先定位,以及分別透過通訊路徑324或323登入到公共雲入口網站330。在元宇宙虛擬私有網路伺服器316定位元宇宙應用程序閘道器308後,它加入伺服器下的虛擬區域網路340。元宇宙虛擬私有網路伺服器智能裝置客戶311或321承諾作為訪客加入通訊。程式等待通訊邀請。一旦接收通訊邀請,元宇宙虛擬私有網路伺服器智能裝置客戶311或321可作為訪客加入通訊會話。接著,程式啟動掃描可識別的主機。在識別出主機後,程式通過主機提示的通訊登入認證。一旦通過認證,元宇宙虛擬私有網路伺服器智能裝置客戶311或321可加入通訊會話。元宇宙虛擬私有網路伺服器智能裝置客戶311或321作為訪客與元宇宙虛擬私有網路伺服器智能裝置客戶301啟動私有及安全的通訊。私有及安全的通訊包含有影像、語音、文本或應用程序。應用程序可為主機及訪客可識別的程式、實用程序、運作或交易。If Metaverse VPN Server Smart Device Client 311 or 321 wishes to join the communication session as a guest, the program installed on the guest Metaverse VPN Server Smart Device Client first locates and communicates via communication path 324 or 323 respectively. Log in to the public cloud portal 330. After the Metaverse virtual private network server 316 locates the Metaverse application gateway 308, it joins the virtual local area network 340 under the server. The Metaverse Virtual Private Network Server smart device client 311 or 321 commits to join the communication as a guest. The program waits for a communication invitation. Once the communication invitation is received, the Metaverse VPN server smart device client 311 or 321 can join the communication session as a guest. Next, the program starts scanning for recognized hosts. After identifying the host, the program logs in and authenticates through the communication prompted by the host. Once authenticated, the Metaverse VPN server smart device client 311 or 321 can join the communication session. The Metaverse Virtual Private Network Server Smart Device Client 311 or 321 initiates private and secure communication with the Metaverse Virtual Private Network Server Smart Device Client 301 as a guest. Private and secure communications include video, voice, text or applications. An application can be a program, utility, operation, or transaction that is identifiable to both the host and the guest.

在本發明的另一個實施例中,在元宇宙應用程序閘道器及元宇宙虛擬私有網路伺服器下,元宇宙虛擬私有網路伺服器智能裝置客戶可與在實體區域網路LAN1 350或虛擬區域網路340及3400上可到達的任一服務建立私有及安全的通訊。如第3圖所示,一旦元宇宙虛擬私有網路伺服器智能裝置客戶301、311或321定位以及登入到公共雲入口網站330,透過安全通訊路徑325,在元宇宙應用程序閘道器及元宇宙虛擬私有網路伺服器下,它可存取在實體區域網路LAN1 350及LAN2 360及虛擬區域網路340及3400上可到達的任一元宇宙網路服務328。元宇宙網路服務包含有語音、影像、直播或存檔資訊及應用程序、社交媒體、訊息傳遞、電子郵件、存儲、備份、日曆、聯繫人、同步、共享、遠端桌面、物聯網等的執行。In another embodiment of the present invention, under the Metaverse Application Gateway and the Metaverse VPS, the Metaverse VPS smart device client can communicate with the physical area network LAN1 350 or Establish private and secure communications with any service reachable on VLANs 340 and 3400. As shown in Figure 3, once the Metaverse virtual private network server smart device client 301, 311 or 321 locates and logs into the public cloud portal 330, through the secure communication path 325, the Metaverse application gateway and Metaverse Under the universe virtual private network server, it can access any metaverse network service 328 reachable on the physical local area network LAN1 350 and LAN2 360 and the virtual local area network 340 and 3400. Yuanverse network services include the execution of voice, video, live or archived information and applications, social media, messaging, email, storage, backup, calendar, contacts, synchronization, sharing, remote desktop, Internet of Things, etc. .

多個實體(entity)被引入以允許安全通訊路徑325,以及包含有但不限於:管理員、管理裝置、元宇宙應用程序閘道器實用程序、元宇宙虛擬私有網路伺服器實用程序、元宇宙應用程序閘道器智能裝置客戶、元宇宙虛擬私有網路伺服器智能裝置客戶。上述實體的定義如下。實用程序是在元宇宙應用程序閘道器中運作的實用程序。管理裝置是管理員用來設定元宇宙應用程序閘道器的裝置。元宇宙應用程序閘道器智能裝置客戶是受邀者用來與元宇宙應用程序閘道器進行通訊的裝置。受邀者是被管理員邀請存取元宇宙應用程序閘道器服務及資源的實體方。受邀者裝置是受邀者用來與元宇宙應用程序閘道器進行通訊的元宇宙應用程序閘道器智能裝置客戶。Multiple entities are introduced to allow secure communication paths 325, and include, but are not limited to: administrators, management devices, Metaverse application gateway utilities, Metaverse Virtual Private Network Server utilities, Metaverse Universe application gateway smart device customers, Metaverse virtual private network server smart device customers. The above entities are defined as follows. Utilities are utilities that operate within the Metaverse Application Gateway. The management device is the device used by administrators to configure the Metaverse Application Gateway. The Metaverse Application Gateway Smart Device Client is the device used by invitees to communicate with the Metaverse Application Gateway. Invitees are entities invited by the administrator to access Metaverse Application Gateway services and resources. An invitee device is a Metaverse Application Gateway smart device client used by the invitee to communicate with the Metaverse Application Gateway.

多個術語被引入,其包含有Passcode_MVVS、Domain_MVVS_Client、MVVS_Client_Profile及MVVS_Client_Login。上述術語的定義如下。Passcode_MVVS是被公共雲入口網站產生用於對應的元宇宙虛擬私有網路伺服器316的密碼。Domain_MVVS_Client是被公共雲入口網站Passcode_MVVS及Domain_MVVS共同形成的元宇宙虛擬私有網路伺服器認證產生的區域地址。MVVS_Client_Profile是元宇宙虛擬私有網路伺服器智能裝置客戶連接到對應的元宇宙虛擬私有網路伺服器316的虛擬私有網路配置文件。MVVS_Client_Login是元宇宙虛擬私有網路伺服器智能裝置客戶連接到對應的元宇宙虛擬私有網路伺服器316的虛擬私有網路登入密碼。MVVS_Client_Profile及MVVS_Client_Login共同形成元宇宙虛擬私有網路伺服器認證。Multiple terms are introduced, including Passcode_MVVS, Domain_MVVS_Client, MVVS_Client_Profile and MVVS_Client_Login. The above terms are defined below. Passcode_MVVS is the password generated by the public cloud portal for the corresponding Metaverse Virtual Private Network Server 316. Domain_MVVS_Client is a regional address authenticated by the Metaverse Virtual Private Network Server formed by the public cloud portal Passcode_MVVS and Domain_MVVS. MVVS_Client_Profile is the virtual private network profile of the Metaverse Virtual Private Network Server smart device client connected to the corresponding Metaverse Virtual Private Network Server 316. MVVS_Client_Login is the virtual private network login password for the Metaverse virtual private network server smart device client to connect to the corresponding metaverse virtual private network server 316. MVVS_Client_Profile and MVVS_Client_Login together form the Metaverse Virtual Private Network Server Authentication.

與元宇宙應用程序閘道器無關的其他術語是:元宇宙應用程序及虛擬區域網路子網路,定義如下。元宇宙應用程序是私有網路子系統,包含有網路路由器、私有區域網路、元宇宙應用程序閘道器、至少一個元宇宙網路服務及至少一個元宇宙應用程序閘道器智能裝置客戶。虛擬區域網路子網路是元宇宙應用程序閘道器虛擬私有網路的子網路設定。出於安全目的,指定私有子網路是可配置及可變的。Other terms not related to Metaverse Application Gateway are: Metaverse Application and Virtual LAN Subnetwork, as defined below. The Metaverse Application is a private network subsystem, including a network router, a private local area network, the Metaverse Application Gateway, at least one Metaverse Network Service and at least one Metaverse Application Gateway smart device client. The VLAN subnet is the subnet configuration of the Metaverse Application Gateway Virtual Private Network. For security purposes, designated private subnets are configurable and changeable.

裝置客戶301本身是元宇宙虛擬私有網路伺服器智能裝置客戶,其包含有應用程序實用程序、公共雲入口網站裝置客戶實用程序378。公共雲入口網站裝置客戶實用程序378包含有元宇宙虛擬私有網路伺服器裝置客戶認證379及元宇宙虛擬私有網路伺服器認證380。元宇宙虛擬私有網路伺服器裝置客戶認證379包含有元宇宙虛擬私有網路伺服器客戶配置及元宇宙虛擬私有網路伺服器客戶登入。元宇宙虛擬私有網路伺服器認證380包含有Domain_MVVS及Passcode_MVVS。The device client 301 itself is the Metaverse virtual private network server smart device client, which includes an application utility and a public cloud portal device client utility 378. The Public Cloud Portal Installation Client Utility 378 includes Metaverse VPN Server Installation Client Authentication 379 and Metaverse VPN Server Authentication 380. Metaverse VPS device client authentication 379 includes Metaverse VPS client configuration and Metaverse VPS client login. Metaverse virtual private network server certification 380 includes Domain_MVVS and Passcode_MVVS.

典型的元宇宙虛擬私有網路伺服器智能裝置客戶321包含有 MVVS_Device_Client實用程序381。MVVS_Device_Client實用程序381包含有元宇宙虛擬私有網路伺服器客戶端配置383及元宇宙虛擬私有網路伺服器客戶登入382。元宇宙虛擬私有網路伺服器客戶端配置383用於連接到對應的元宇宙虛擬私有網路伺服器316。元宇宙虛擬私有網路伺服器客戶登入382用於登入到元宇宙虛擬私有網路伺服器316。元宇宙虛擬私有網路伺服器316包含有MVVS_Device實用程序3710及MVVS_VPN實用程序3720。MVVS_Device實用程序3710用於與元宇宙應用程序閘道器管理裝置373進行通訊。MVVS_VPN實用程序3720能透過至少一個虛擬私有網路通道與元宇宙應用程序閘道器308進行通訊。元宇宙虛擬私有網路伺服器316作為中間人,以中繼元宇宙虛擬私有網路伺服器智能裝置客戶321、301、311及元宇宙應用程序閘道器308間的通訊,以及根據元宇宙虛擬私有網路伺服器智能裝置客戶請求,按照需求調回元宇宙應用程序閘道器308。A typical Metaverse Virtual Private Network Server smart device client 321 includes the MVVS_Device_Client utility 381. The MVVS_Device_Client utility 381 includes Metaverse Virtual Private Server client configuration 383 and Metaverse Virtual Private Server client login 382. Metaverse virtual private network server client configuration 383 is used to connect to the corresponding metaverse virtual private network server 316. The Metaverse Virtual Private Network Server Client Login 382 is used to log in to the Metaverse Virtual Private Network Server 316. Metaverse virtual private network server 316 includes MVVS_Device utility 3710 and MVVS_VPN utility 3720. The MVVS_Device utility 3710 is used to communicate with the Metaverse Application Gateway Management Device 373. The MVVS_VPN utility 3720 can communicate with the Metaverse application gateway 308 through at least one virtual private network channel. The Metaverse Virtual Private Server 316 acts as an intermediary to relay communications between the Metaverse Virtual Private Server smart device clients 321, 301, 311 and the Metaverse Application Gateway 308, and according to the Metaverse Virtual The private network server smart device client requests and calls back to the Metaverse application gateway 308 as needed.

第4圖為本發明第二實施例的示意圖。元宇宙應用程序閘道器408連接到Router_P 402的區域網路404,其連接方式相似於第2圖中私有雲路由伺服器208連接到Router_P 202的區域網路204。元宇宙應用程序閘道器408也連接到下游的實體區域網路LAN2 460。元宇宙網路服務436及元宇宙應用程序閘道器智能裝置客戶435被連接到下游。透過通訊路徑426存取,元宇宙網路服務436可透過區域網路434連接到元宇宙應用程序閘道器408。只要虛擬區域網路440及實體區域網路LAN1 450及LAN2 460可被元宇宙應用程序閘道器408及透過元宇宙虛擬私有網路伺服器416跨雲端的元宇宙虛擬私有網路伺服器智能裝置客戶411、410、409、401及421探索及存取,所有元宇宙網路服務428及436及元宇宙應用程序閘道器智能裝置客戶406、407及435變得可存取。Figure 4 is a schematic diagram of the second embodiment of the present invention. The Metaverse application gateway 408 is connected to the LAN 404 of the Router_P 402 in a manner similar to the way the private cloud routing server 208 is connected to the LAN 204 of the Router_P 202 in Figure 2 . The Metaverse Application Gateway 408 is also connected to the downstream physical area network LAN2 460. Metaverse network services 436 and Metaverse application gateway smart device clients 435 are connected downstream. Accessed via communications path 426, Metaverse network service 436 may connect to Metaverse application gateway 408 via local area network 434. As long as the virtual local area network 440 and the physical local area network LAN1 450 and LAN2 460 can be used by the Metaverse application gateway 408 and the Metaverse virtual private network server smart device across the cloud through the metaverse virtual private network server 416 Clients 411, 410, 409, 401 and 421 explore and access, all Metaverse web services 428 and 436 and Metaverse Application Gateway smart device clients 406, 407 and 435 become accessible.

第5圖為本發明實施例的示意圖。私有物質閘道器508連接到私有區域網路路由器502的區域網路504,其連接方式相似於第2圖中私有雲路由伺服器208連接到Router_P 202的區域網路204。只要私有元宇宙-1 550及實體區域網路504可由私有物質閘道器508及透過虛擬機伺服器-1 531及私有雲虛擬私有網路伺服器516跨雲端的私有雲虛擬私有網路伺服器智能裝置客戶(例如虛擬實境眼鏡551、筆記型電腦552、智能手機553、平板電腦554、虛擬實境眼鏡561、筆記型電腦562、智能手機563及特斯拉儀表板564)探索及存取,所有私有網路服務(未標示出)及私有物質閘道器智能裝置客戶521、522、523、524、525及526變得可存取。Figure 5 is a schematic diagram of an embodiment of the present invention. The private substance gateway 508 is connected to the LAN 504 of the private LAN router 502 in a manner similar to the way the private cloud routing server 208 is connected to the LAN 204 of Router_P 202 in Figure 2 . As long as the private metaverse-1 550 and the physical area network 504 can be connected by the private physical gateway 508 and the private cloud virtual private network server across the cloud through the virtual machine server-1 531 and the private cloud virtual private network server 516 Smart device customers (e.g. VR glasses 551, laptop 552, smartphone 553, tablet 554, VR glasses 561, laptop 562, smartphone 563 and Tesla dashboard 564) explore and access , all private network services (not shown) and private physical gateway smart device clients 521, 522, 523, 524, 525 and 526 become accessible.

第6圖為本發明第三實施例的示意圖。以相似第3圖元宇宙應用程序閘道器308連接到路由器302的私有區域網路304的方式,元宇宙應用程序閘道器680連接到私有區域網路路由器602的私有區域網路604。只要元宇宙應用程序-1 650以及實體區域網路604被透過虛擬機伺服器631及元宇宙虛擬私有網路伺服器616跨雲端的元宇宙虛擬私有網路伺服器智能裝置客戶(例如虛擬實境眼鏡651、筆記型電腦652、智能手機653、平板電腦654、虛擬實境眼鏡661、平板電腦662、智能手機663及特斯拉儀表板664)及元宇宙應用程序閘道器608探索及存取,元宇宙應用程序閘道器608、所有元宇宙網路服務(未標示出)以及元宇宙應用程序閘道器智能裝置客戶6250、6251、6252及622變得可存取。在公共雲600中可有許多元宇宙提供者。每個提供者建立元宇宙雲端提供者-1 641、元宇宙雲端提供者-2 642、元宇宙雲端提供者-3 644及元宇宙雲端提供者-N 643。在元宇宙雲端提供者-1 641中,透過元宇宙提供者入口網站-1 630,可部署多個元宇宙應用程序,例如元宇宙應用程序-1 650、元宇宙應用程序-2 6320、元宇宙應用程序-3 6330及元宇宙應用程序-N 6340。在元宇宙應用程序-1 650中有個對應的虛擬機伺服器-1 630,其包含有元宇宙虛擬私有網路伺服器616。元宇宙虛擬私有網路伺服器616在邏輯上連接到應用程序虛擬網絡-1 640,其容納路由器602、私有區域網路604。在應用程序虛擬網絡-1 640的下方,有多個實體及邏輯裝置、資源及服務,例如元宇宙應用程序閘道器608、實況串流事件6250、6251及6262及存檔內容伺服器622。實況串流事件-A 6250、實況串流事件-B 6251及實況串流事件-C 6252是由元宇宙提供者-1(未標示出)設置的一組網際網路協定攝影機,用於建立特定元宇宙應用程序(例如元宇宙應用程序-1 650),以串流用於元宇宙訂閱者的特定族群的特定實況事件。透過元宇宙虛擬私有網路伺服器裝置客戶、特斯拉儀表板664、智能手機663、平板電腦662及虛擬實境眼鏡661,或者透過在訪客區域網路路由器603底下的其他裝置客戶(包含有筆記型電腦652、智能手機653、平板電腦654及虛擬實境眼鏡651),元宇宙訂閱者可存取元宇宙事件內容。如第6圖所示,元宇宙雲端提供者-1 641可擴展的及可發展的。在公共雲600中,可存在多個元宇宙提供者雲相互共存,例如元宇宙雲端提供者-1 641、元宇宙雲端提供者-2 642、元宇宙雲端提供者-3 644及元宇宙雲端提供者-N 643。在相同的元宇宙雲端提供者-1 641中,可存在多個由相同的元宇宙提供者入口網站部署的元宇宙應用程序,例如元宇宙應用程序-1 650、元宇宙應用程序-2 6320、元宇宙應用程序-3 6330及元宇宙應用程序-N 6340。元宇宙提供者可在本發明的幫助下向其訂閱者提供私有及安全的存取到裝置、服務、內容或事件。裝置、服務、內容或事件的類型包含有媒體內容服務、實況事件串流、遊戲、虛擬旅遊、虛擬博物館、文本中的私有對話、語音、影像、加密貨幣交易、虛擬實境(Virtual Reality,VR)∕擴增實境(Augmented Reality,AR)體驗及虛擬化身等。Figure 6 is a schematic diagram of the third embodiment of the present invention. Metaverse application gateway 680 is connected to the private area network 604 of the private area network router 602 in a manner similar to the third metaverse application gateway 308 being connected to the private area network 304 of the router 302 . As long as the Metaverse Application-1 650 and the physical LAN 604 are connected through the virtual machine server 631 and the Metaverse VPS 616 across the cloud Metaverse VPS smart device clients (e.g. virtual reality Glasses 651, laptop 652, smartphone 653, tablet 654, virtual reality glasses 661, tablet 662, smartphone 663 and Tesla dashboard 664) and Metaverse application gateway 608 exploration and access , Metaverse Application Gateway 608, all Metaverse network services (not shown), and Metaverse Application Gateway smart device clients 6250, 6251, 6252, and 622 become accessible. There may be many Metaverse providers in the public cloud 600. Each provider establishes Metaverse Cloud Provider-1 641, Metaverse Cloud Provider-2 642, Metaverse Cloud Provider-3 644, and Metaverse Cloud Provider-N 643. In Metaverse Cloud Provider-1 641, through the Metaverse Provider Portal-1 630, multiple Metaverse applications can be deployed, such as Metaverse Application-1 650, Metaverse Application-2 6320, Metaverse Application App-3 6330 and Metaverse App-N 6340. There is a corresponding virtual machine server-1 630 in the Metaverse application-1 650, which contains the Metaverse virtual private network server 616. Metaverse virtual private network server 616 is logically connected to application virtual network-1 640, which houses router 602, private area network 604. Beneath the application virtual network-1 640, there are multiple physical and logical devices, resources and services, such as the Metaverse application gateway 608, live streaming events 6250, 6251 and 6262, and archived content server 622. Live Streaming Event-A 6250, Live Streaming Event-B 6251, and Live Streaming Event-C 6252 are a set of Internet Protocol cameras set up by Metaverse Provider-1 (not shown) to create a specific Metaverse Applications (e.g., Metaverse Application-1 650) to stream specific live events for specific groups of Metaverse subscribers. Via the Metaverse VPS device client, Tesla dashboard 664, smartphone 663, tablet 662 and virtual reality glasses 661, or via other device clients under the guest area network router 603 (including Laptop 652, smartphone 653, tablet 654 and virtual reality glasses 651), Metaverse subscribers can access Metaverse event content. As shown in Figure 6, Metaverse Cloud Provider-1 641 is scalable and developable. In the public cloud 600, there may be multiple Metaverse Provider Clouds coexisting with each other, such as Metaverse Cloud Provider-1 641, Metaverse Cloud Provider-2 642, Metaverse Cloud Provider-3 644, and Metaverse Cloud Provider-3 644. ER-N 643. In the same Metaverse Cloud Provider-1 641, there can be multiple Metaverse Applications deployed by the same Metaverse Provider Portal, such as Metaverse Application-1 650, Metaverse Application-2 6320, Metaverse App-3 6330 and Metaverse App-N 6340. Metaverse providers can provide their subscribers with private and secure access to devices, services, content or events with the help of this invention. Types of devices, services, content or events include media content services, live event streaming, games, virtual tours, virtual museums, private conversations in text, voice, images, cryptocurrency transactions, virtual reality (VR) )/Augmented Reality (AR) experience and virtual avatar, etc.

第7圖為本發明實施例透過雲端網路在私有雲中繼伺服器及私有雲回撥伺服器智能裝置客戶間的節點對節點連結機制的一個通訊流程的流程圖。根據本發明顯示,私有雲回撥伺服器智能裝置客戶不需要公共虛擬私有網路路由伺服器,以連接及存取到私有雲路由伺服器728,或另一個私有雲回撥伺服器智能裝置客戶,或另一個私有雲路由伺服器智能裝置客戶,或通過雲端網路伺服器下的網路服務。如第7圖所示,無需通過第1圖的公共路由伺服器112或公共虛擬私有網路路由伺服器114,雲端網路上的私有雲回撥伺服器智能裝置客戶1 725及私有雲路由伺服器728可互相進行通訊。首先,私有雲回撥伺服器智能裝置客戶1 725用其在傳輸控制協定∕用戶資料訊息協定中的網際網路協定地址及端口能力,請求連接到私有雲回撥伺服器裝置實用程序(伺服器部分)724。私有雲回撥伺服器智能裝置客戶1 725的網際網路協定地址及端口與PCCBS_Device實用程序724保持活動狀態。透過回撥伺服器訊息框(未標示出),私有雲回撥伺服器裝置實用程序(伺服器部分)724接收註冊。接著,也透過第2圖的客戶訊息框message_box_S 215,私有雲回撥伺服器智能裝置客戶1 725向私有雲回撥伺服器裝置實用程序(伺服器部分)724請求與PCCBS_VPN實用程序(客戶部分)723的連結。PCCBS_VPN實用程序(伺服器部分)724透過回撥伺服器訊息框(未標示出)接收請求,以及通知私有雲回撥伺服器智能裝置客戶1 725在傳輸控制協定∕用戶資料訊息協定中的網際網路協定地址及端口能力及其連接意圖到PCCBS_VPN實用程序(客戶部分)723(步驟703)。接著,PCCBS_VPN實用程序(客戶部分)723回覆自己的註冊到PCCBS_VPN實用程序(伺服器部分)724。註冊包含有PCCBS_VPN實用程序(客戶部分)723在傳輸控制協定∕用戶資料訊息協定中的網際網路協定地址及端口能力。私有雲路由伺服器裝置客戶2 726的網際網路協定地址及端口能力與PCCBS_VPN實用程序(伺服器部分)724的連結保持活動狀態。接著,藉由通訊路徑705,透過回撥伺服器訊息框(未標示出),PCCBS_VPN實用程序(伺服器部分)724用PCRS_VPN實用程序722的傳輸控制協定∕用戶資料訊息協定中的網際網路協定地址及端口能力回應私有雲回撥伺服器智能裝置客戶1 725。PCRS_VPN實用程序722啟動節點對節點通訊,以連接到PCCBS_VPN實用程序723。之後,PCCBS_Device實用程序724開始在循環702中偵聽,以等待來自私有雲回撥伺服器智能裝置客戶1 725的裝置客戶請求。一旦私有雲回撥伺服器智能裝置客戶1 725向 PCCBS_Device實用程序724發起通訊請求,它與PCCBS_Device實用程序724建立節點對節點通訊通道706。它進而觸發PCCBS_VPN實用程序723及PCRS_VPN實用程序722間的另一個節點對節點通訊。從此時起,私有雲回撥伺服器智能裝置客戶1 725連接到PCRS_VPN實用程序722,以及進而能存取任一私有雲路由伺服器裝置客戶720或網路服務(未標示出)。在私有雲回撥伺服器智能裝置客戶1 725及PCRS_VPN實用程序722間,節點對節點通訊被啟動。私有雲回撥伺服器智能裝置客戶1 725能安全地連接到私有雲路由伺服器私有區域網路上的虛擬私有區域網路。私有雲回撥伺服器智能裝置客戶1 725能存取在私有雲路由伺服器私有區域網路下可存取的任一私有雲路由伺服器智能裝置客戶(例如私有雲路由伺服器裝置客戶2 726)或私有網路服務(未標示出)。透過與第7圖所示相同的連結機制,第2圖的其他私有雲回撥伺服器智能裝置客戶 201、221、209、210、211 可連接到私有物質閘道器。一旦任一對私有雲路由伺服器智能裝置客戶及私有雲虛擬私有網路伺服器智能裝置客戶連接到私有雲路由伺服器728及私有雲回撥伺服器727的虛擬區域網路240及虛擬區域網路2400,它們可在它們之間進行用於文本、語音或影像通訊的私有及安全的通訊。Figure 7 is a flow chart of a communication process of a node-to-node connection mechanism between a private cloud relay server and a private cloud callback server smart device client through a cloud network according to an embodiment of the present invention. According to the present invention, a private cloud callback server smart device client does not require a public VPN route server to connect and access the private cloud route server 728, or another private cloud callback server smart device client. , or another private cloud routing server smart device client, or through network services under a cloud network server. As shown in Figure 7, without going through the public routing server 112 or the public virtual private network routing server 114 of Figure 1, the private cloud callback server smart device client 1 725 and the private cloud routing server on the cloud network 728 can communicate with each other. First, Private Cloud Callback Server Smart Device Client 1 725 requests a connection to the Private Cloud Callback Server Device Utility (Server part)724. The Internet Protocol address and port of the private cloud callback server smart device client 1 725 remains active with the PCCBS_Device utility 724. Through a callback server message box (not shown), the private cloud callback server installation utility (server part) 724 receives the registration. Next, also through the client message box message_box_S 215 in Figure 2, the private cloud callback server smart device client 1 725 requests the private cloud callback server device utility (server part) 724 with the PCCBS_VPN utility (client part) 723 link. The PCCBS_VPN utility (server part) 724 receives the request via a callback server message box (not shown) and notifies the private cloud callback server smart device client 1 725 of the Internet in TCP/User Data Message Protocol Route protocol address and port capabilities and its connection intent to the PCCBS_VPN utility (client part) 723 (step 703). Next, the PCCBS_VPN utility (client part) 723 replies with its own registration to the PCCBS_VPN utility (server part) 724. Registration includes the Internet Protocol address and port capabilities of the PCCBS_VPN utility (client part) 723 in TCP/User Data Message Protocol. The Internet Protocol address and port capabilities of the private cloud routing server installation client 2 726 remain active in connection with the PCCBS_VPN utility (server part) 724 . Next, via communication path 705 , via a Callback Server message box (not shown), the PCCBS_VPN utility (server portion) 724 uses the Internet Protocol in TCP/User Data Message Protocol of the PCRS_VPN utility 722 Address and port capabilities respond to private cloud callback server smart device client 1 725. PCRS_VPN utility 722 initiates node-to-node communication to connect to PCCBS_VPN utility 723. Afterwards, PCCBS_Device utility 724 begins listening in loop 702 for device client requests from private cloud callback server smart device client 1 725 . Once the private cloud callback server smart device client 1 725 initiates a communication request to the PCCBS_Device utility 724, it establishes a node-to-node communication channel 706 with the PCCBS_Device utility 724. This in turn triggers another node-to-node communication between PCCBS_VPN utility 723 and PCRS_VPN utility 722. From this point on, the private cloud callback server smart device client 1 725 is connected to the PCRS_VPN utility 722, and in turn can access any private cloud route server device client 720 or network service (not shown). Node-to-node communication is enabled between the private cloud callback server smart device client 1 725 and the PCRS_VPN utility 722. Private Cloud Callback Server Smart Device Client 1 725 can securely connect to the Virtual Private Area Network on the Private Cloud Route Server Private Area Network. Private cloud callback server smart device client 1 725 can access any private cloud routing server smart device client accessible under the private cloud routing server private area network (for example, private cloud route server device client 2 726 ) or private network services (not shown). Through the same connection mechanism as shown in Figure 7, the other private cloud callback server smart device clients 201, 221, 209, 210, 211 of Figure 2 can connect to the private substance gateway. Once any pair of private cloud routing server smart device clients and private cloud virtual private network server smart device clients are connected to the virtual area network 240 and virtual area network of the private cloud routing server 728 and the private cloud callback server 727 2400, which enables private and secure communications between them for text, voice, or video communications.

第8圖為本發明實施例透過雲端網路在元宇宙應用程序閘道器、元宇宙虛擬私有網路伺服器、元宇宙應用程序閘道器智能裝置客戶及元宇宙虛擬私有網路伺服器智能裝置客戶間的節點對節點連結機制的一個通訊流程的示意圖。本發明揭露元宇宙虛擬私有網路伺服器智能裝置客戶不需要公共雲路由伺服器來連接及存取到伺服器元宇宙應用程序閘道器828、元宇宙虛擬私有網路伺服器827,或另一個元宇宙應用程序閘道器智能裝置客戶,或透過雲端網路伺服器下的網路服務。如第8圖所示,無需通過第1圖的公共路由伺服器112或公共虛擬私有網路路由伺服器114,雲端網路上的元宇宙虛擬私有網路伺服器裝置客戶1 825及元宇宙應用程序閘道器828可互相通信。不同於第7圖的先前技術,最初,元宇宙虛擬私有網路伺服器裝置客戶之一者(公共雲入口網站管理裝置850)連接到公共雲入口網站851(圈1及步驟803)。公共雲入口網站851是基於雲端的公共雲入口網站,其包含有PCP_Device實用程序847。公共雲入口網站管理裝置850從PCP_Device實用程序847獲得元宇宙虛擬私有網路伺服器認證及元宇宙虛擬私有網路伺服器客戶認證。元宇宙虛擬私有網路伺服器認證包含有元宇宙虛擬私有網路伺服器區域Domain_MVVS及元宇宙虛擬私有網路伺服器密碼Passcode_MVVS。元宇宙虛擬私有網路伺服器客戶認證包含有客戶登入配置文件MVVS Client Profile及客戶配置的登入密碼MVVS Client Login。透過電子郵件或其他方式,元宇宙虛擬私有網路伺服器認證被傳送到元宇宙應用程序閘道器管理裝置820。元宇宙虛擬私有網路伺服器客戶認證被傳送到授權的元宇宙虛擬私有網路伺服器裝置客戶(例如元宇宙虛擬私有網路伺服器裝置客戶1 825),用於與元宇宙應用程序閘道器裝置客戶之一者(例如元宇宙應用程序閘道器828的私有區域網路上的元宇宙應用程序閘道器裝置客戶2 826)的節點對節點連結。公共雲入口網站851包含有至少一個PCP_Device實用程序(例如PCP_Device 實用程序847)。至少一個PCP_Device實用程序包含有至少一個虛擬機伺服器(例如虛擬機伺服器832)。至少一個虛擬機伺服器包含有至少一個元宇宙虛擬私有網路伺服器(例如元宇宙虛擬私有網路伺服器827)。至少一個元宇宙虛擬私有網路伺服器包含有MVVS_Device實用程序824及MVVS_VPN實用程序823。虛擬機伺服器832連同元宇宙虛擬私有網路伺服器827與部屬在私有區域網路中的元宇宙應用程序閘道器828形成一對一的對應關係。PCP_Device實用程序847是可擴展的公共雲入口網站,以及可對應於至少一個虛擬機伺服器(例如虛擬機伺服器832)及至少一個元宇宙虛擬私有網路伺服器(例如元宇宙虛擬私有網路伺服器827)。Figure 8 shows an embodiment of the present invention through the cloud network on the Metaverse Application Gateway, the Metaverse Virtual Private Network Server, the Metaverse Application Gateway Smart Device Client and the Metaverse Virtual Private Network Server Intelligence Schematic diagram of a communication process of the node-to-node connection mechanism between device clients. The present invention discloses that Metaverse Virtual Private Network Server smart device clients do not need a public cloud routing server to connect and access the server Metaverse Application Gateway 828, Metaverse Virtual Private Network Server 827, or otherwise. A Metaverse application gateway smart device client, or through network services under a cloud network server. As shown in Figure 8, without going through the public routing server 112 or the public VPN routing server 114 of Figure 1, the Metaverse VPN server on the cloud network installs the client 1 825 and the Metaverse application Gateways 828 can communicate with each other. Unlike the prior art of Figure 7, initially, one of the Metaverse VPN server device clients (public cloud portal management device 850) connects to the public cloud portal 851 (circle 1 and step 803). The public cloud portal 851 is a cloud-based public cloud portal that includes the PCP_Device utility 847. The public cloud portal management device 850 obtains Metaverse VPS server authentication and Metaverse VPS client authentication from the PCP_Device utility 847 . The Metaverse Virtual Private Server certification includes the Metaverse Virtual Private Server area Domain_MVVS and the Metaverse Virtual Private Server password Passcode_MVVS. Yuanverse virtual private network server customer authentication includes the customer login profile MVVS Client Profile and the customer-configured login password MVVS Client Login. The Metaverse VPN server certificate is sent to the Metaverse application gateway management device 820 via email or other means. Metaverse VPN Server Client Authentication is sent to authorized Metaverse VPN Server Device Client (e.g. Metaverse VPN Server Device Client 1 825) for use with the Metaverse Application Gateway A node-to-node connection to one of the server device clients, such as Metaverse Application Gateway Device Client 2 826 on the private local area network of Metaverse Application Gateway 828 . The public cloud portal 851 contains at least one PCP_Device utility (eg, PCP_Device utility 847). At least one PCP_Device utility contains at least one virtual machine server (eg virtual machine server 832). At least one virtual machine server includes at least one Metaverse virtual private network server (eg, Metaverse virtual private network server 827). At least one Metaverse virtual private network server includes the MVVS_Device utility 824 and the MVVS_VPN utility 823. The virtual machine server 832 together with the Metaverse virtual private network server 827 form a one-to-one correspondence with the Metaverse application gateway 828 deployed in the private area network. PCP_Device utility 847 is a scalable public cloud portal and may correspond to at least one virtual machine server (eg, virtual machine server 832) and at least one Metaverse virtual private network server (eg, metaverse virtual private network Server 827).

首先,在接收元宇宙虛擬私有網路伺服器認證後,元宇宙應用程序閘道器管理裝置820透過MVAG_Device實用程序821初始化及提供伺服器認證到元宇宙應用程序閘道器828(圈2及步驟800)。接著,MVAG_Device實用程序821傳遞元宇宙應用程序閘道器828內部的資訊到MVAG_VPN實用程序822。透過傳輸控制協定∕用戶資料訊息協定,它註冊包含有Domain_MVVS及Passcode_MVVS的元宇宙虛擬私有網路伺服器認證資訊到MVVS_VPN實用程序823(圈4及步驟801)。MVVS_VPN實用程序823回撥到元宇宙應用程序852(圈3及步驟805)。元宇宙應用程序852包含有至少一個元宇宙應用程序閘道器(例如元宇宙應用程序閘道器828)。至少一個元宇宙應用程序閘道器包含有MVAG_VPN實用程序822,以啟用MVVS_VPN實用程序823及MVAG_VPN實用程序822間的第一虛擬私有網路通道。之後,在 MVAG_VPN實用程序822及MVVS_VPN實用程序823間,MVAG_VPN實用程序822建立第一虛擬私有網路通道(圈5及步驟813)。在註冊後,MVAG_VPN實用程序822連接到MVVS_VPN實用程序823,以及在 MVAG_VPN實用程序822及MVVS_VPN實用程序823間,按照需求啟用第三虛擬私有網路通道。在MVVS_VPN實用程序823及 MVAG_VPN實用程序822間,MVVS_VPN實用程序823可按照需求建立第三虛擬私有網路通道(圈6及步驟807)。也可在MVVS_VPN實用程序823及MVAG_VPN實用程序822間,MVVS_VPN實用程序823按照需求建立第三虛擬私有網路通道,等待按照需求建立的第二虛擬私有網路通道的完成(圈10及步驟806)。MVVS_VPN實用程序823也啟用MVVS_VPN實用程序823及來自網際網路的雲端的任一元宇宙虛擬私有網路伺服器智能裝置客戶(例如元宇宙虛擬私有網路伺服器裝置客戶1 825或元宇宙虛擬私有網路伺服器裝置客戶3 853)間的第二虛擬私有網路通道(圈9及步驟845或846)。接著,按照來自網際網路的雲端的任一元宇宙虛擬私有網路伺服器裝置客戶(例如元宇宙虛擬私有網路伺服器裝置客戶1 825)的需求,元宇宙虛擬私有網路伺服器827準備好採取進一步行動。在元宇宙虛擬私有網路伺服器827內部,MVVS_VPN實用程序823與MVVS_Device實用程序824進行通訊。MVVS_Device實用程序824停留在循環中,等待元宇宙虛擬私有網路伺服器智能裝置客戶請求的請求(圈7及步驟802)。首先,元宇宙虛擬私有網路伺服器裝置客戶1 825註冊元宇宙虛擬私有網路伺服器客戶認證到MVVS_Device實用程序824(圈8及步驟804或814)。元宇宙虛擬私有網路伺服器客戶認證包含有MVVS Client Profile及MVVS Client Login。MVVS_Device實用程序824傳遞元宇宙虛擬私有網路伺服器客戶認證及元宇宙虛擬私有網路伺服器827內部的連結請求到MVVS_VPN實用程序823。在註冊後,元宇宙虛擬私有網路伺服器裝置客戶1 825連接到MVVS_VPN實用程序823,以及在元宇宙虛擬私有網路伺服器裝置客戶1 825及MVVS_VPN實用程序823間,按照需求建立第二虛擬私有網路通道(圈10及步驟806或816)。接著,在MVVS_VPN實用程序823及元宇宙應用程序852間,MVVS_VPN實用程序823按照需求建立第三虛擬私有網路通道(圈6及步驟807)。元宇宙應用程序852包含有至少一個元宇宙應用程序閘道器(例如元宇宙應用程序閘道器828)。至少一個元宇宙應用程序閘道器包含有MVAG_VPN實用程序822。假設另一個元宇宙虛擬私有網路伺服器裝置客戶(例如元宇宙虛擬私有網路伺服器裝置客戶3 853)也已成功連接到MVVS_VPN實用程序823,在圈10及步驟806中按照需求建立的第二虛擬私有網路通道及在圈6及步驟807中按照需求建立的第三虛擬私有網路通道被合併為元宇宙虛擬私有網路伺服器裝置客戶1 825及MVAG_VPN實用程序822間的單一虛擬私有網路通道,以及連接到元宇宙應用程序閘道器裝置客戶2 826(圈11及步驟811),或元宇宙應用程序閘道器網路服務836(圈11及步驟831),或另一個元宇宙虛擬私有網路伺服器裝置客戶(例如元宇宙虛擬私有網路伺服器裝置客戶3 853)(圈10及步驟816)。因此,元宇宙虛擬私有網路伺服器裝置客戶1 825及元宇宙虛擬私有網路伺服器裝置客戶3 853在它們之間形成節點對節點私有及安全的通訊通道。通訊通道是文本、語音及影像中進一步安全聊天應用程序的基礎,包含有加密(crypto)貨幣(currency)交易。First, after receiving the Metaverse Virtual Private Network Server Authentication, the Metaverse Application Gateway Management Device 820 initializes and provides server authentication to the Metaverse Application Gateway 828 through the MVAG_Device utility 821 (circle 2 and step 800). Next, the MVAG_Device utility 821 passes the information within the Metaverse application gateway 828 to the MVAG_VPN utility 822. Through TCP/User Data Message Protocol, it registers the Metaverse Virtual Private Server authentication information containing Domain_MVVS and Passcode_MVVS to the MVVS_VPN utility 823 (circle 4 and step 801). The MVVS_VPN utility 823 calls back to the Metaverse application 852 (circle 3 and step 805). Metaverse application 852 includes at least one Metaverse application gateway (eg, Metaverse application gateway 828). At least one Metaverse application gateway includes the MVAG_VPN utility 822 to enable the first virtual private network channel between the MVVS_VPN utility 823 and the MVAG_VPN utility 822 . Afterwards, between the MVAG_VPN utility 822 and the MVVS_VPN utility 823, the MVAG_VPN utility 822 establishes the first virtual private network channel (circle 5 and step 813). After registration, the MVAG_VPN utility 822 connects to the MVVS_VPN utility 823 and enables a third virtual private network channel between the MVAG_VPN utility 822 and the MVVS_VPN utility 823 as needed. Between the MVVS_VPN utility 823 and the MVAG_VPN utility 822, the MVVS_VPN utility 823 can establish a third virtual private network channel as required (circle 6 and step 807). Alternatively, between the MVVS_VPN utility program 823 and the MVAG_VPN utility program 822, the MVVS_VPN utility program 823 can establish a third virtual private network channel as required, and wait for the completion of the second virtual private network channel established as required (circle 10 and step 806) . The MVVS_VPN utility 823 also enables the MVVS_VPN utility 823 and any Metaverse VPN Server smart device client from the cloud over the Internet (such as Metaverse VPN Server Device Client 1 825 or Metaverse VPN Server The second virtual private network channel (circle 9 and step 845 or 846) between the server and client 3 853). Then, upon request from any Metaverse VPN server device client (for example, Metaverse VPN server device client 1 825) from the cloud on the Internet, the Metaverse VPN server 827 is ready. Take further action. Within the Metaverse Virtual Private Network Server 827, the MVVS_VPN utility 823 communicates with the MVVS_Device utility 824. The MVVS_Device utility 824 remains in a loop, waiting for a request from the Metaverse Virtual Private Network Server smart device client (circle 7 and step 802). First, Metaverse VPS Device Client 1 825 registers Metaverse VPS Client authentication to the MVVS_Device utility 824 (circle 8 and step 804 or 814). Metaverse virtual private network server client authentication includes MVVS Client Profile and MVVS Client Login. The MVVS_Device utility 824 passes Metaverse VPN server client authentication and Metaverse VPN server 827 internal connection requests to the MVVS_VPN utility 823 . After registration, the Metaverse Virtual Private Network Server Installation Client 1 825 connects to the MVVS_VPN utility 823, and between the Metaverse Virtual Private Network Server Installation Client 1 825 and the MVVS_VPN utility 823, a second virtual machine is created as required. Private network channel (circle 10 and step 806 or 816). Next, between the MVVS_VPN utility 823 and the Metaverse application 852, the MVVS_VPN utility 823 establishes a third virtual private network channel as required (circle 6 and step 807). Metaverse application 852 includes at least one Metaverse application gateway (eg, Metaverse application gateway 828). At least one Metaverse application gateway contains the MVAG_VPN utility 822. Assuming that another Metaverse Virtual Private Network Server Device Client (e.g., Metaverse Virtual Private Network Server Device Client 3 853) has also successfully connected to the MVVS_VPN utility 823, the first client created as required in Circle 10 and Step 806 The two virtual private network channels and the third virtual private network channel established on demand in circle 6 and step 807 are merged into a single virtual private network between the Metaverse virtual private network server device client 1 825 and the MVAG_VPN utility 822 network channel, and connect to the Metaverse Application Gateway Device Client 2 826 (circle 11 and step 811), or the Metaverse Application Gateway Network Service 836 (circle 11 and step 831), or another metaverse Universe VPN Server Device Client (eg, Metaverse VPN Server Device Client 3 853) (circle 10 and step 816). Therefore, the Metaverse Virtual Private Network Server Device Client 1 825 and the Metaverse Virtual Private Network Server Device Client 3 853 form a node-to-node private and secure communication channel between them. Communication channels are the basis for further secure chat applications in text, voice and video, including cryptocurrency transactions.

相較於第7圖的先前技術,本發明更具可擴展性及可發展性,因為它引入了一些新實體,包含有公共雲入口網站851、PCP_Device實用程序847、虛擬機伺服器832、元宇宙應用程序852、公共雲入口網站管理裝置850、元宇宙應用程序閘道器管理裝置820、元宇宙虛擬私有網路伺服器認證及元宇宙虛擬私有網路伺服器客戶認證。它首先連接到公共雲入口網站851,接著連接到至少一個MVVS_Device實用程序(例如MVVS_Device實用程序824),接著連接到至少一個虛擬機伺服器(例如虛擬機伺服器832),接著連接到至少一個元宇宙虛擬私有網路伺服器(例如元宇宙虛擬私有網路伺服器827),接著連接到至少一個元宇宙應用程序(例如元宇宙應用程序852),接著連接到至少一個元宇宙應用程序閘道器(例如元宇宙應用程序閘道器828),接著連接到至少一個元宇宙應用程序閘道器裝置客戶(例如元宇宙應用程序閘道器裝置客戶2 826),或者連接到元宇宙應用程序閘道器網路服務(例如元宇宙應用程序閘道器網路服務836),或者連接到另一個元宇宙虛擬私有網路伺服器裝置客戶(例如元宇宙虛擬私有網路伺服器裝置客戶3 853)。公共雲入口網站管理裝置850開始從公共雲入口網站851獲得元宇宙虛擬私有網路伺服器認證及客戶認證。之後,元宇宙虛擬私有網路伺服器認證被傳送到元宇宙應用程序閘道器管理裝置820,以設置元宇宙應用程序閘道器828與位於公共雲入口網站851內部的虛擬機伺服器832內部的對應元宇宙虛擬私有網路伺服器827的連結。更進一步,在最後兩個虛擬私有網路通道形成單一虛擬私有網路通道前,至少三個虛擬私有網路通道綁定在一起,用於在垂直節點對節點私有及安全 的元宇宙虛擬私有網路伺服器智能裝置客戶應用程序中的元宇宙虛擬私有網路伺服器裝置客戶1 825及元宇宙應用程序閘道器裝置客戶2 826、元宇宙應用程序閘道器網路服務836或另一個元宇宙虛擬私有網路伺服器裝置客戶(例如元宇宙虛擬私有網路伺服器裝置客戶3 853)間的節點對節點通訊。Compared with the prior art in Figure 7, the present invention is more scalable and developable because it introduces some new entities, including public cloud portal 851, PCP_Device utility 847, virtual machine server 832, metadata Universe application 852, public cloud portal management device 850, Metaverse application gateway management device 820, Metaverse VPS server authentication and Metaverse VPS client authentication. It first connects to the public cloud portal 851, then connects to at least one MVVS_Device utility (eg, MVVS_Device utility 824), then connects to at least one virtual machine server (eg, virtual machine server 832), then connects to at least one element A universe virtual private network server (e.g., metaverse virtual private network server 827), which in turn is connected to at least one metaverse application (e.g., metaverse application 852), which is in turn connected to at least one metaverse application gateway (e.g., Metaverse Application Gateway 828), and then connects to at least one Metaverse Application Gateway Device Client (e.g., Metaverse Application Gateway Device Client 2 826), or connects to the Metaverse Application Gateway server network service (such as Metaverse Application Gateway Network Service 836), or to another Metaverse VPN Server Device Client (such as Metaverse VPN Server Device Client 3 853). The public cloud portal management device 850 begins to obtain the Metaverse virtual private network server authentication and client authentication from the public cloud portal 851 . The Metaverse VPS credentials are then sent to the Metaverse Application Gateway Manager 820 to set up the Metaverse Application Gateway 828 with the virtual machine server 832 located within the public cloud portal 851 The link corresponding to the Metaverse virtual private network server 827. Furthermore, at least three virtual private network channels are bound together before the last two virtual private network channels form a single virtual private network channel for a vertical node-to-node private and secure metaverse virtual private network. Metaverse Virtual Private Network Server Device Client 1 825 and Metaverse Application Gateway Device Client 2 826 in the Route Server Smart Device Client Application, Metaverse Application Gateway Network Service 836 or another Metaverse Node-to-node communication between Universe VPS device clients (such as Metaverse VPS device client 3 853).

第9圖為本發明實施例基於伺服器農場、計算機資源聚合及虛擬機伺服器透過雲端網路在元宇宙應用程序閘道器、元宇宙虛擬私有網路伺服器、元宇宙應用程序閘道器智能裝置客戶及元宇宙虛擬私有網路伺服器智能裝置客戶間的節點對節點連結機制的一個通訊流程的流程圖。更進一步,藉由新增伺服器農場930及計算機資源聚合931,第9圖擴展第8圖,以舉例說明在超大規模資料中心中元宇宙應用程序閘道器連結點機制的實現。超大規模資料中心具有至少一個伺服器農場(例如伺服器農場930)、至少一個計算機資源聚合(例如計算機資源聚合931)、至少一個私有雲入口網站(例如私有雲入口網站951)及至少一個虛擬機伺服器(例如虛擬機伺服器932)。在數量及尺寸上,虛擬機伺服器932可擴展。在對應的虛擬機伺服器(例如虛擬機伺服器932)中,超大規模資料中心或服務提供者可建造及部屬至少一個私有雲入口網站(例如私有雲入口網站951)及大量獨立的元宇宙虛擬私有網路伺服器(例如元宇宙虛擬私有網路伺服器927),以服務對應的元宇宙應用程序閘道器(例如元宇宙應用程序閘道器928)及對應的元宇宙應用程序閘道器智能裝置客戶(例如元宇宙應用程序閘道器裝置客戶2 926)。本質上,無論是否具有計算機資源聚合931及伺服器農場930的拓撲(topology),元宇宙虛擬私有網路伺服器智能裝置客戶1 925及元宇宙應用程序閘道器智能裝置客戶2 926間的通訊關係的團體配對被負責維持虛擬機伺服器932的元宇宙提供者建造及部署。舉例來說,可能的商業模式是網際網路元宇宙提供者提供到大量用戶,以在虛擬機伺服器932中主持他們的私有及安全的元宇宙虛擬私有網路伺服器927。此外,單獨的私有及安全的元宇宙應用程序閘道器928也被提供,以允許元宇宙提供者安裝元宇宙應用程序閘道器928在他們的私有的區域網路中。透過本發明,元宇宙訂閱者可從任何地方建立元宇宙虛擬私有網路伺服器智能裝置客戶(例如元宇宙虛擬私有網路伺服器智能裝置客戶1 925)(例如智能手機、平板電腦或特斯拉儀表板)及元宇宙應用程序閘道器智能裝置客戶(例如元宇宙應用程序閘道器智能裝置客戶2 926)(例如筆記型電腦、物聯網裝置、網路連接存儲裝置、機上盒、智能設備或媒體伺服器)間的節點對節點通訊,其位在元宇宙提供者的私有及安全的區域網路上。第9圖顯示本發明的元宇宙虛擬私有網路伺服器智能裝置客端(例如元宇宙虛擬私有網路伺服器智能裝置客戶1 925)不需要公共雲路由伺服器來連接及存取到伺服器元宇宙應用程序閘道器928、元宇宙虛擬私有網路伺服器927或另一個元宇宙應用程序閘道器智能裝置客戶(例如元宇宙應用程序閘道器智能裝置客戶2 926),或通過雲端網路在伺服器下的網路服務(未標示出)。如第9圖所示,無需通過第1圖的公共路由伺服器112或公共虛擬私有網路路由伺服器114,在雲端網路中的元宇宙虛擬私有網路伺服器智能裝置客戶1 925及元宇宙應用程序閘道器928可互相進行通訊。首先,元宇宙虛擬私有網路伺服器管理裝置950是元宇宙虛擬私有網路伺服器智能裝置客戶之一,以及連接到私有雲入口網站951(圈1及步驟903)。私有雲入口網站951是基於雲端的公共雲入口網站,其包含有PCP_Device實用程序947。元宇宙虛擬私有網路伺服器管理裝置950從PCP_Device實用程序947獲得元宇宙虛擬私有網路伺服器認證及元宇宙虛擬私有網路伺服器客戶認證。元宇宙虛擬私有網路伺服器認證包含有元宇宙虛擬私有網路伺服器區域Domain_MVVS及元宇宙虛擬私有網路伺服器密碼Passcode_MVVS。元宇宙虛擬私有網路伺服器客戶認證包含有客戶登入配置文件MVVS Client Profile及客戶配置的登入密碼MVVS Client Login。透過電子郵件或其他方式,元宇宙虛擬私有網路伺服器認證被傳送到元宇宙應用程序閘道器管理裝置920。元宇宙虛擬私有網路伺服器客戶認證被傳送到授權的元宇宙虛擬私有網路伺服器裝置客戶(例如元宇宙虛擬私有網路伺服器裝置客戶1 925),用於與元宇宙應用程序閘道器裝置客戶之一者(例如元宇宙應用程序閘道器928的私有區域網路上的元宇宙應用程序閘道器裝置客戶2 926)的節點對節點連結。公共雲入口網站951包含有至少一個PCP_Device實用程序(例如PCP_Device 實用程序947)。至少一個PCP_Device實用程序包含有至少一個虛擬機伺服器(例如虛擬機伺服器932)。至少一個虛擬機伺服器包含有至少一個元宇宙虛擬私有網路伺服器(例如元宇宙虛擬私有網路伺服器927)。至少一個元宇宙虛擬私有網路伺服器包含有MVVS_Device實用程序924及MVVS_VPN實用程序923。虛擬機伺服器932連同元宇宙虛擬私有網路伺服器927與部屬在私有區域網路中的元宇宙應用程序閘道器928形成一對一的對應關係。PCP_Device實用程序947是可擴展的公共雲入口網站,以及可對應於至少一個虛擬機伺服器(例如虛擬機伺服器932)及至少一個元宇宙虛擬私有網路伺服器(例如元宇宙虛擬私有網路伺服器927)。Figure 9 shows an embodiment of the present invention based on the server farm, computer resource aggregation and virtual machine server through the cloud network in the Metaverse Application Gateway, Metaverse Virtual Private Network Server, Metaverse Application Gateway A flow chart of a communication process of the node-to-node connection mechanism between smart device clients and Metaverse virtual private network server smart device clients. Further, by adding a server farm 930 and a computer resource aggregation 931, Figure 9 extends Figure 8 to illustrate the implementation of the Metaverse application gateway connection point mechanism in a hyperscale data center. The hyperscale data center has at least one server farm (eg, server farm 930), at least one computer resource aggregation (eg, computer resource aggregation 931), at least one private cloud portal (eg, private cloud portal 951), and at least one virtual machine Server (e.g. virtual machine server 932). The virtual machine servers 932 are scalable in number and size. In the corresponding virtual machine server (such as virtual machine server 932), a hyperscale data center or service provider can build and deploy at least one private cloud portal (such as private cloud portal 951) and a large number of independent Metaverse virtual machines. A private network server (e.g., Metaverse Virtual Private Network Server 927) to serve the corresponding Metaverse Application Gateway (e.g., Metaverse Application Gateway 928) and the corresponding Metaverse Application Gateway Smart device clients (e.g. Metaverse Application Gateway Device Client 2 926). Essentially, regardless of whether there is a topology of computer resource aggregation 931 and server farm 930 , the communication between the Metaverse virtual private network server smart device client 1 925 and the Metaverse application gateway smart device client 2 926 The group pairing of the relationship is built and deployed by the Metaverse provider responsible for maintaining the virtual machine server 932. For example, a possible business model is for an Internet Metaverse provider to offer a large number of users to host their private and secure Metaverse virtual private network servers 927 in a virtual machine server 932 . In addition, a separate private and secure Metaverse Application Gateway 928 is also provided to allow Metaverse providers to install the Metaverse Application Gateway 928 in their private local networks. Through the present invention, Metaverse subscribers can create Metaverse Virtual Private Network Server smart device clients (such as Metaverse Virtual Private Network Server smart device clients 1 925) from anywhere (such as smartphones, tablets or Tesla Dashboard) and Metaverse Application Gateway Smart Device Customers (e.g. Metaverse Application Gateway Smart Device Customer 2 926) (e.g. laptops, IoT devices, network attached storage devices, set-top boxes, Node-to-node communication between smart devices or media servers) on the Metaverse provider's private and secure local area network. Figure 9 shows that the Metaverse Virtual Private Network Server smart device client of the present invention (such as the Metaverse Virtual Private Network Server smart device client 1 925) does not require a public cloud routing server to connect to and access the server. Metaverse Application Gateway 928, Metaverse Virtual Private Network Server 927, or another Metaverse Application Gateway smart device client (e.g., Metaverse Application Gateway Smart Device Client 2 926), or via the cloud Network services under the server (not shown). As shown in Figure 9, without going through the public routing server 112 or the public VPN routing server 114 in Figure 1, the Metaverse Virtual Private Network Server smart device client 1 925 and Metaverse in the cloud network Universe application gateways 928 can communicate with each other. First, the Metaverse VPN server management device 950 is one of the Metaverse VPN server smart device clients and is connected to the private cloud portal 951 (circle 1 and step 903). The private cloud portal 951 is a cloud-based public cloud portal that includes the PCP_Device utility 947. The Metaverse VPS management device 950 obtains the Metaverse VPS server authentication and the Metaverse VPS client authentication from the PCP_Device utility 947 . The Metaverse Virtual Private Server certification includes the Metaverse Virtual Private Server area Domain_MVVS and the Metaverse Virtual Private Server password Passcode_MVVS. Yuanverse virtual private network server customer authentication includes the customer login profile MVVS Client Profile and the customer-configured login password MVVS Client Login. The Metaverse VPN server certificate is sent to the Metaverse application gateway management device 920 via email or other means. Metaverse VPN Server Client Authentication is sent to authorized Metaverse VPN Server Device Client (e.g. Metaverse VPN Server Device Client 1 925) for use with the Metaverse Application Gateway A node-to-node connection to one of the server device clients, such as Metaverse Application Gateway Device Client 2 926 on the private area network of Metaverse Application Gateway 928 . The public cloud portal 951 contains at least one PCP_Device utility (eg, PCP_Device utility 947). At least one PCP_Device utility includes at least one virtual machine server (eg, virtual machine server 932). At least one virtual machine server includes at least one Metaverse virtual private network server (eg, Metaverse virtual private network server 927). At least one Metaverse virtual private network server includes the MVVS_Device utility 924 and the MVVS_VPN utility 923. The virtual machine server 932 together with the Metaverse virtual private network server 927 form a one-to-one correspondence with the Metaverse application gateway 928 deployed in the private area network. PCP_Device utility 947 is an extensible public cloud portal and may correspond to at least one virtual machine server (eg, virtual machine server 932) and at least one Metaverse virtual private network server (eg, metaverse virtual private network Server 927).

首先,在接收元宇宙虛擬私有網路伺服器認證後,元宇宙應用程序閘道器管理裝置920透過MVAG_Device實用程序921初始化及提供伺服器認證到元宇宙應用程序閘道器928(圈2及步驟900)。接著,MVAG_Device實用程序921傳遞元宇宙應用程序閘道器928內部的資訊到MVAG_VPN實用程序922。透過傳輸控制協定∕用戶資料訊息協定,它註冊包含有Domain_MVVS及Passcode_MVVS的元宇宙虛擬私有網路伺服器認證資訊到MVVS_VPN實用程序923(圈4及步驟901)。在註冊後,MVAG_VPN實用程序922連接到MVVS_VPN實用程序923,以及在 MVAG_VPN實用程序922到MVVS_VPN實用程序923間,啟用第三虛擬私有網路通道。接著,MVVS_VPN實用程序923回撥到元宇宙應用程序952(圈3及步驟905)。元宇宙應用程序952包含有至少一個元宇宙應用程序閘道器(例如元宇宙應用程序閘道器928)。至少一個元宇宙應用程序閘道器包含有MVAG_VPN實用程序922,以啟用MVVS_VPN實用程序923及MVAG_VPN實用程序922間的第一虛擬私有網路通道。在MVVS_VPN實用程序923及MVAG_VPN實用程序922間,MVVS_VPN實用程序923按照需求建立第三虛擬私有網路通道(圈6及步驟907)。也可在MVVS_VPN實用程序923及MVAG_VPN實用程序922間,按照需求建立第三虛擬私有網路通道,等待按照需求建立的第二虛擬私有網路通道的完成(圈10及步驟906)。之後,在MVAG_VPN實用程序922及MVVS_VPN實用程序923間,MVAG_VPN實用程序922建立第一虛擬私有網路通道(圈5及步驟913)。MVVS_VPN實用程序923也啟用MVVS_VPN實用程序923及來自網際網路的雲端的任一元宇宙虛擬私有網路伺服器智能裝置客戶(例如元宇宙虛擬私有網路伺服器裝置客戶1 925)間的第二虛擬私有網路通道(圈9及步驟945)。接著,按照來自網際網路的雲端的任一元宇宙虛擬私有網路伺服器裝置客戶(例如元宇宙虛擬私有網路伺服器裝置客戶1 925)的需求,元宇宙虛擬私有網路伺服器927準備好採取進一步行動。在元宇宙虛擬私有網路伺服器927內部,MVVS_VPN實用程序923與MVVS_Device實用程序924進行通訊。MVVS_Device實用程序924停留在循環中,等待元宇宙虛擬私有網路伺服器智能裝置客戶請求的請求(圈7及步驟902)。首先,元宇宙虛擬私有網路伺服器裝置客戶1 925註冊元宇宙虛擬私有網路伺服器客戶認證到MVVS_Device實用程序924(圈8及步驟904或914)。元宇宙虛擬私有網路伺服器客戶認證包含有MVVS Client Profile及MVVS Client Login。MVVS_Device實用程序924傳遞元宇宙虛擬私有網路伺服器客戶認證及元宇宙虛擬私有網路伺服器927內部的連結請求到MVVS_VPN實用程序923。在註冊後,元宇宙虛擬私有網路伺服器裝置客戶1 925連接到MVVS_VPN實用程序923,以及在元宇宙虛擬私有網路伺服器裝置客戶1 925及MVVS_VPN實用程序923間,按照需求建立第二虛擬私有網路通道(圈10及步驟906或916)。接著,在MVVS_VPN實用程序923及元宇宙應用程序952間,MVVS_VPN實用程序923按照需求建立第三虛擬私有網路通道(圈6及步驟907)。元宇宙應用程序952包含有至少一個元宇宙應用程序閘道器(例如元宇宙應用程序閘道器928)。至少一個元宇宙應用程序閘道器包含有MVAG_VPN實用程序922。在圈10及步驟906中按照需求建立的第二虛擬私有網路通道及在圈6及步驟907中按照需求建立的第三虛擬私有網路通道被合併為元宇宙虛擬私有網路伺服器裝置客戶1 925及MVAG_VPN實用程序922間的單一虛擬私有網路通道,以及連接到元宇宙應用程序閘道器裝置客戶2 926(圈11及步驟911),或元宇宙應用程序閘道器網路服務(未標示出)(圈11及步驟911)。First, after receiving the Metaverse Virtual Private Network Server Authentication, the Metaverse Application Gateway Management Device 920 initializes and provides server authentication to the Metaverse Application Gateway 928 through the MVAG_Device utility 921 (circle 2 and step 900). Next, the MVAG_Device utility 921 passes the information within the Metaverse application gateway 928 to the MVAG_VPN utility 922. Through TCP/User Data Message Protocol, it registers the Metaverse Virtual Private Server authentication information containing Domain_MVVS and Passcode_MVVS to the MVVS_VPN utility 923 (circle 4 and step 901). After registration, the MVAG_VPN utility 922 connects to the MVVS_VPN utility 923, and a third virtual private network channel is enabled between the MVAG_VPN utility 922 and the MVVS_VPN utility 923. Next, the MVVS_VPN utility 923 calls back to the Metaverse application 952 (circle 3 and step 905). Metaverse application 952 includes at least one Metaverse application gateway (eg, Metaverse application gateway 928). At least one Metaverse application gateway includes the MVAG_VPN utility 922 to enable the first virtual private network channel between the MVVS_VPN utility 923 and the MVAG_VPN utility 922 . Between the MVVS_VPN utility 923 and the MVAG_VPN utility 922, the MVVS_VPN utility 923 establishes a third virtual private network channel as required (circle 6 and step 907). It is also possible to establish a third virtual private network channel as required between the MVVS_VPN utility program 923 and the MVAG_VPN utility program 922, and wait for the completion of the second virtual private network channel established as required (circle 10 and step 906). Afterwards, between the MVAG_VPN utility 922 and the MVVS_VPN utility 923, the MVAG_VPN utility 922 establishes the first virtual private network channel (circle 5 and step 913). The MVVS_VPN utility 923 also enables a second virtual connection between the MVVS_VPN utility 923 and any Metaverse Virtual Private Server smart device client (eg, Metaverse Virtual Private Server Device Client 1 925 ) from the cloud over the Internet. Private network channel (circle 9 and step 945). Then, according to the needs of any Metaverse VPN server device client (for example, Metaverse VPN server device client 1 925) from the cloud on the Internet, the Metaverse VPN server 927 is ready Take further action. Within the Metaverse Virtual Private Network Server 927, the MVVS_VPN utility 923 communicates with the MVVS_Device utility 924. The MVVS_Device utility 924 remains in a loop, waiting for a request from the Metaverse Virtual Private Network Server smart device client (circle 7 and step 902). First, Metaverse VPS Device Client 1 925 registers Metaverse VPS Client authentication to the MVVS_Device utility 924 (circle 8 and step 904 or 914). Metaverse virtual private network server client authentication includes MVVS Client Profile and MVVS Client Login. The MVVS_Device utility 924 passes Metaverse VPN server client authentication and Metaverse VPN server 927 internal connection requests to the MVVS_VPN utility 923 . After registration, the Metaverse Virtual Private Network Server Installation Client 1 925 connects to the MVVS_VPN utility 923, and between the Metaverse Virtual Private Network Server Installation Client 1 925 and the MVVS_VPN utility 923, a second virtual machine is created as required. Private network channel (circle 10 and step 906 or 916). Next, between the MVVS_VPN utility 923 and the Metaverse application 952, the MVVS_VPN utility 923 establishes a third virtual private network channel as required (circle 6 and step 907). Metaverse application 952 includes at least one Metaverse application gateway (eg, Metaverse application gateway 928). At least one Metaverse application gateway contains the MVAG_VPN utility 922. The second virtual private network channel established on demand in circle 10 and step 906 and the third virtual private network channel established on demand in circle 6 and step 907 are merged into the Metaverse virtual private network server device client A single virtual private network channel between 1 925 and the MVAG_VPN utility 922, and connecting to the Metaverse Application Gateway device client 2 926 (circle 11 and step 911), or the Metaverse Application Gateway Network Service ( Not labeled) (circle 11 and step 911).

第10圖為本發明實施例公共雲入口網站管理裝置註冊到公共雲入口網站的一個通訊流程的流程圖。首先,從廣域網路,私有雲入口網站管理裝置開啟私有雲入口網站裝置實用程序(步驟1000)。接著,私有雲入口網站裝置實用程序上的“註冊公共雲入口網站”命令被選擇(步驟1001)。元宇宙虛擬私有網路伺服器認證及元宇宙虛擬私有網路伺服器客戶認證被需要(步驟1002)。元宇宙虛擬私有網路伺服器認證包含有元宇宙虛擬私有網路伺服器區域Domain_MVVS及元宇宙虛擬私有網路伺服器密碼Passcode_MVVS。元宇宙虛擬私有網路伺服器客戶認證包含有客戶登入配置文件MVVS Client Profile及客戶配置的登入密碼MVVS Client Login。包含有Domain_MVVS及Passcode_MVVS的元宇宙虛擬私有網路伺服器認證被傳送到元宇宙應用程序閘道器管理裝置(步驟1003)。包含有MVVS Client Profile及MVVS Client Login的元宇宙虛擬私有網路伺服器客戶認證被傳送到MVVS_Device客戶(步驟1004),用於目標元宇宙應用程序閘道器裝置客戶、元宇宙應用程序閘道器網路服務或另一個元宇宙虛擬私有網路伺服器裝置客戶。Figure 10 is a flow chart of a communication process for the public cloud portal management device to register to the public cloud portal according to the embodiment of the present invention. First, from the wide area network, the private cloud portal management device starts the private cloud portal device utility (step 1000). Next, the "Register Public Cloud Portal" command on the private cloud portal device utility is selected (step 1001). Metaverse VPS server authentication and Metaverse VPS client authentication are required (step 1002). The Metaverse Virtual Private Server certification includes the Metaverse Virtual Private Server area Domain_MVVS and the Metaverse Virtual Private Server password Passcode_MVVS. Yuanverse virtual private network server customer authentication includes the customer login profile MVVS Client Profile and the customer-configured login password MVVS Client Login. The Metaverse VPS certificate containing Domain_MVVS and Passcode_MVVS is sent to the Metaverse Application Gateway Management Device (step 1003). Metaverse Virtual Private Server Client Authentication including MVVS Client Profile and MVVS Client Login is sent to the MVVS_Device client (step 1004) for the target Metaverse Application Gateway device client, Metaverse Application Gateway Network service or another Metaverse Virtual Private Server installation client.

同時,PCP_Device實用程序開始接受來自私有雲入口網站管理裝置的命令,以註冊到私有雲入口網站(步驟1010)。元宇宙虛擬私有網路伺服器認證及元宇宙虛擬私有網路伺服器客戶認證被PCP_Device實用程序產生或檢索(步驟1011)。接著,兩個認證被傳送回私有雲入口網站管理裝置(步驟1040)。At the same time, the PCP_Device utility starts accepting commands from the private cloud portal management device to register with the private cloud portal (step 1010). The Metaverse VPN Server Authentication and the Metaverse VPN Server Client Authentication are generated or retrieved by the PCP_Device utility (step 1011). Next, both certificates are sent back to the private cloud portal management device (step 1040).

第11圖為本發明實施例元宇宙應用程序閘道器管理裝置初始化及配置元宇宙應用程序閘道器的一個通訊流程的流程圖。如第11圖所示,首先,從元宇宙應用程序閘道器區域網路,元宇宙應用程序閘道器管理裝置開啟MVAG_Device實用程序(步驟1101)。因此,在區域網路上發現及選擇元宇宙應用程序閘道器(步驟1102)。接著,MVAG_Device實用程序上的“初始化及配置”命令被選擇(步驟1103)。因此,藉由設定包含有元宇宙虛擬私有網路伺服器區域Domain_MVVS及元宇宙虛擬私有網路伺服器密碼Passcode_MVVS的元宇宙虛擬私有網路伺服器認證作為唯一元宇宙應用程序閘道器身分,元宇宙應用程序閘道器被設定(步驟1104)。元宇宙虛擬私有網路伺服器認證被傳送到MVAG_Device實用程序(步驟1140)。Figure 11 is a flow chart of a communication process of initializing and configuring the Metaverse application gateway management device according to an embodiment of the present invention. As shown in Figure 11, first, from the Metaverse Application Gateway LAN, the Metaverse Application Gateway management device opens the MVAG_Device utility (step 1101). Therefore, the Metaverse application gateway is discovered and selected on the local network (step 1102). Next, the "Initialization and Configuration" command on the MVAG_Device utility is selected (step 1103). Therefore, by setting the Metaverse VPN Server Authentication containing the Metaverse VPN Server Domain Domain_MVVS and the Metaverse VPN Server Passcode Passcode_MVVS as the only Metaverse Application Gateway Identity, the Metaverse VPN Server The universe application gateway is configured (step 1104). The Metaverse VPN server authentication is passed to the MVAG_Device utility (step 1140).

元宇宙虛擬私有網路伺服器認證(Domain_MVVS, Passcode_MVVS)被接受(步驟1110),以及被存儲為元宇宙應用程序閘道器的身份(步驟1111)。接著,元宇宙應用程序閘道器作為對應的客戶被註冊到元宇宙虛擬私有網路伺服器(步驟1112)。The Metaverse Virtual Private Server authentication (Domain_MVVS, Passcode_MVVS) is accepted (step 1110), and the identity of the Metaverse Application Gateway is stored (step 1111). Next, the Metaverse application gateway is registered to the Metaverse virtual private network server as the corresponding client (step 1112).

第12圖為本發明實施例從MVVS_VPN實用程序到MVAG_VPN實用程序的連結及在私有區域網路中元宇宙虛擬私有網路伺服器裝置客戶及元宇宙應用程序閘道器裝置客戶間的連結及從MVVS_VPN實用程序到MVAG_VPN實用程序的連結的一個通訊流程的流程圖。首先,MVAG_VPN實用程序使用元宇宙虛擬私有網路伺服器認證,通過廣域網路連接到MVVS_VPN實用程序(步驟1200)。通過廣域網路,MVVS_VPN實用程序接受來自MVAG_VPN實用程序的元宇宙虛擬私有網路伺服器認證(步驟1210)。接著,如果需要,MVVS_VPN實用程序傳送進一步的連結或更新資訊到MVAG_VPN實用程序(步驟1211及1241)。如果需要,MVAG_VPN實用程序從MVVS_VPN實用程序接收進一步的連結或更新資訊(步驟1201)。接著,MVVS_VPN實用程序回撥MVAG_VPN實用程序,以啟用第一虛擬私有網路通道(步驟1212及1242)。MVAG_VPN實用程序連接到 MVVS_VPN實用程序,以啟用第三虛擬私有網路通道(步驟1202)。MVAG_VPN實用程序連接到MVVS_VPN實用程序,以建立從 MVAG_VPN實用程序到MVVS_VPN實用程序的第一虛擬私有網路通道(步驟1203及1243)。MVVS_VPN實用程序建立從MVVS_VPN實用程序到MVAG_VPN實用程序的第三虛擬私有網路通道(步驟1213)。接著,MVVS_VPN實用程序等待按照需求建立的從元宇宙虛擬私有網路伺服器裝置客戶到MVVS_VPN實用程序的第二虛擬私有網路通道(步驟1215)。MVVS_VPN實用程序按照需求建立從元宇宙虛擬私有網路伺服器裝置客戶到MVVS_VPN實用程序的第二虛擬私有網路通道(步驟1216及1246)。MVAG_VPN實用程序等待按照需求建立從元宇宙虛擬私有網路伺服器裝置客戶到MVVS_VPN實用程序的第二虛擬私有網路通道(步驟1205)。MVAG_VPN實用程序建立從元宇宙虛擬私有網路伺服器裝置客戶到MVAG_VPN實用程序的節點對節點通訊通道(步驟1208及1248)。接著,MVVS_VPN實用程序建立從元宇宙虛擬私有網路伺服器裝置客戶到MVAG_VPN實用程序的節點對節點通訊通道(步驟1218)。此後,按照需求建立的第二虛擬私有網路通道及按照需求建立的第三虛擬私有網路通道被合併為元宇宙虛擬私有網路伺服器裝置客戶及MVAG_VPN實用程序間的單一虛擬私有網路通道。在按照需求建立的第三虛擬私有網路通道及照需求建立的第二虛擬私有網路通道被合併為元宇宙虛擬私有網路伺服器裝置客戶及MVAG_VPN實用程序間的單一虛擬私有網路通道後,元宇宙虛擬私有網路伺服器裝置客戶可啟動私有及安全的連結到至少一個元宇宙應用程序閘道器裝置客戶、在私有元宇宙應用程序閘道器區域網路上的元宇宙應用程序閘道器網路服務(未標示出)或在網際網路的公共雲上的另一個MVVS_Device客戶(未標示出)(步驟1231)。Figure 12 shows the link from the MVVS_VPN utility to the MVAG_VPN utility and the link between the Metaverse virtual private network server device client and the Metaverse application gateway device client in the private area network according to the embodiment of the present invention. Flowchart of a communication process linking the MVVS_VPN utility to the MVAG_VPN utility. First, the MVAG_VPN utility uses Metaverse Virtual Private Network Server authentication to connect to the MVVS_VPN utility over the WAN (step 1200). Over the wide area network, the MVVS_VPN utility accepts the Metaverse VPN server authentication from the MVAG_VPN utility (step 1210). Then, if necessary, the MVVS_VPN utility sends further links or update information to the MVAG_VPN utility (steps 1211 and 1241). If necessary, the MVAG_VPN utility receives further link or update information from the MVVS_VPN utility (step 1201). Next, the MVVS_VPN utility calls back to the MVAG_VPN utility to enable the first virtual private network channel (steps 1212 and 1242). The MVAG_VPN utility connects to the MVVS_VPN utility to enable the third virtual private network channel (step 1202). The MVAG_VPN utility connects to the MVVS_VPN utility to establish a first virtual private network channel from the MVAG_VPN utility to the MVVS_VPN utility (steps 1203 and 1243). The MVVS_VPN utility establishes a third virtual private network channel from the MVVS_VPN utility to the MVAG_VPN utility (step 1213). Next, the MVVS_VPN utility waits for the second virtual private network channel from the Metaverse VPN server device client to the MVVS_VPN utility to be established as required (step 1215). The MVVS_VPN utility creates a second virtual private network channel from the Metaverse VPN server device client to the MVVS_VPN utility as required (steps 1216 and 1246). The MVAG_VPN utility waits to establish a second virtual private network channel from the Metaverse VPN server device client to the MVVS_VPN utility as required (step 1205). The MVAG_VPN utility establishes a node-to-node communication channel from the Metaverse Virtual Private Network Server device client to the MVAG_VPN utility (steps 1208 and 1248). Next, the MVVS_VPN utility establishes a node-to-node communication channel from the Metaverse Virtual Private Network Server device client to the MVAG_VPN utility (step 1218). Thereafter, the second on-demand VPC channel and the third on-demand VPC channel were merged into a single VPC channel between the Metaverse VPN server device client and the MVAG_VPN utility . After the third virtual private network channel created on demand and the second virtual private network channel created on demand are merged into a single virtual private network channel between the Metaverse VPN server device client and the MVAG_VPN utility , a Metaverse Virtual Private Server device client can initiate a private and secure connection to at least one Metaverse Application Gateway device client, the Metaverse Application Gateway on the private Metaverse Application Gateway local network server network service (not shown) or another MVVS_Device client (not shown) on the public cloud on the Internet (step 1231).

相較於第三實施例,第一實施例具有真正的按照需求連結機制的優點,其中連結是透過按照需求建立的第二虛擬私有網路通道在元宇宙虛擬私有網路伺服器裝置客戶及MVVS_VPN實用程序間,在MVVS_VPN實用程序及MVAG_VPN實用程序間,以及最終是透過按照需求建立的第三虛擬私有網路通道到至少一個元宇宙應用程序閘道器裝置客戶。從表面上看,它似乎比第三實施例更安全。但是,由於在第一實施例及第三實施例中都應用按照需求建立的第二虛擬私有網路通道的共通性,兩個實施例中的最終單一虛擬私有網路通道從虛擬私有網路連結機制的性質來看是一樣安全的。因為應用按照需求建立的第三虛擬私有網路通道時的複雜性,第一實施例可提供真正的按照需求的虛擬私有網路連結。第三虛擬私有網路通道與第二虛擬私有網路通道按照需求合併為元宇宙虛擬私有網路伺服器裝置客戶及MVAG_VPN實用程序間的單一虛擬私有網路通道,最終到元宇宙應用程序閘道器裝置客戶。藉由使用三個虛擬私有網路通道而不是第三實施例中的兩個虛擬私有網路通道,其架構更加複雜。第一實施例不需要第三虛擬私有網路通道一直處於開啟狀態,或者必須一直保持其活動。因此,在按照需求的連結機制的性質上,消耗的能量更少。這樣做,從第三虛擬私有網路通道的按照需求的性質來上似乎更加安全。但事實是,來自按照需求建立的第二虛擬私有網路通道的連結機制解決元宇宙虛擬私有網路伺服器裝置客戶及MVAG_VPN實用程序間的最終單一虛擬私有網路通道中的安全問題。因此,在連結簡單性、效率及安全性方面,第三實施例是較佳的實施例。Compared with the third embodiment, the first embodiment has the advantage of a true on-demand connection mechanism, in which the connection is through a second virtual private network channel established on demand in the Metaverse virtual private network server installation client and MVVS_VPN between the utilities, between the MVVS_VPN utility and the MVAG_VPN utility, and ultimately through a third virtual private network channel established on demand to at least one Metaverse Application Gateway device client. On the surface, it appears to be more secure than the third embodiment. However, due to the commonality of the second virtual private network channel established on demand in both the first and third embodiments, the final single virtual private network channel in the two embodiments is connected from the virtual private network Judging from the nature of the mechanism, it is equally safe. Because of the complexity of applying the third virtual private network channel established on demand, the first embodiment can provide a true on-demand virtual private network connection. The third virtual private network channel and the second virtual private network channel are combined as needed into a single virtual private network channel between the Metaverse VPN server device client and the MVAG_VPN utility, and finally to the Metaverse application gateway Device installation customer. By using three virtual private network channels instead of two virtual private network channels in the third embodiment, the architecture is more complex. The first embodiment does not require that the third virtual private network channel is always open or must be kept active. Therefore, less energy is consumed in accordance with the nature of the connection mechanism on demand. Doing so seems to be more secure based on the nature of the demand for the third virtual private network channel. But the fact is that the connection mechanism from the second on-demand VPN channel solves the security issue in the final single VPN channel between the Metaverse VPN server device client and the MVAG_VPN utility. Therefore, the third embodiment is the preferred embodiment in terms of connection simplicity, efficiency and security.

第13圖為本發明實施例元宇宙虛擬私有網路伺服器裝置客戶的元宇宙虛擬私有網路伺服器的一個通訊流程的流程圖。從元宇宙虛擬私有網路伺服器裝置客戶的角度來看,MVVS_Device實用程序從廣域網路被開啟(步驟1300)。接著,元宇宙虛擬私有網路伺服器裝置客戶註冊包含有MVVS Client Profile及MVVS Client Login的元宇宙虛擬私有網路伺服器客戶認證到MVVS_Device實用程序(步驟1301)。它使用元宇宙虛擬私有網路伺服器客戶認證啟動節點對節點協商,以與MVVS_VPN實用程序進行通訊(步驟1302及1341)。對應的 MVVS_Device實用程序也使用元宇宙虛擬私有網路伺服器客戶認證啟動節點對節點協商,以與元宇宙虛擬私有網路伺服器裝置客戶進行通訊(步驟1311)。接著,元宇宙虛擬私有網路伺服器裝置客戶及MVVS_VPN實用程序間的虛擬私有網路通道被建立(步驟1303、1312及1342)。元宇宙虛擬私有網路伺服器裝置客戶與MVVS_VPN實用程序啟動安全的節點對節點通訊(步驟1304及1343)。在MVVS_Device實用程序方面,它傳遞控制權到MVVS_VPN實用程序(步驟1313)。Figure 13 is a flow chart of a communication process of the Metaverse Virtual Private Network Server of the Metaverse Virtual Private Network Server device client according to an embodiment of the present invention. From the perspective of the Metaverse Virtual Private Network Server device client, the MVVS_Device utility is launched from the WAN (step 1300). Next, the Metaverse Virtual Private Server device client registers the Metaverse Virtual Private Server client including MVVS Client Profile and MVVS Client Login and authenticates to the MVVS_Device utility (step 1301). It initiates node-to-node negotiation using the Metaverse Virtual Private Server client authentication to communicate with the MVVS_VPN utility (steps 1302 and 1341). The corresponding MVVS_Device utility also initiates node-to-node negotiation using Metaverse VPS client authentication to communicate with the Metaverse VPS device client (step 1311). Next, a virtual private network channel between the Metaverse virtual private network server device client and the MVVS_VPN utility is established (steps 1303, 1312 and 1342). The Metaverse Virtual Private Network Server device client initiates secure node-to-node communication with the MVVS_VPN utility (steps 1304 and 1343). On the MVVS_Device utility side, it passes control to the MVVS_VPN utility (step 1313).

第14圖為本發明第三實施例透過雲端網路在元宇宙應用程序閘道器、元宇宙虛擬私有網路伺服器、元宇宙應用程序閘道器智能裝置客戶及元宇宙虛擬私有網路伺服器智能裝置客戶間的節點對節點連結機制的一個通訊流程的流程圖。本發明揭露元宇宙虛擬私有網路伺服器智能裝置客戶不需要公共雲路由伺服器來連接及存取到伺服器元宇宙應用程序閘道器1428、元宇宙虛擬私有網路伺服器1427,或另一個元宇宙應用程序閘道器智能裝置客戶,或透過雲端網路伺服器下的網路服務。如第14圖所示,無需通過第1圖的公共路由伺服器112或公共虛擬私有網路路由伺服器114,雲端網路上的元宇宙虛擬私有網路伺服器裝置客戶1 1425及元宇宙應用程序閘道器1428可互相通信。不同於第7圖的先前技術,最初,元宇宙虛擬私有網路伺服器裝置客戶之一者(公共雲入口網站管理裝置1450)連接到公共雲入口網站1451(圈1及步驟1403)。公共雲入口網站1451是基於雲端的公共雲入口網站,其包含有PCP_Device實用程序1447。公共雲入口網站管理裝置1450從PCP_Device實用程序1447獲得元宇宙虛擬私有網路伺服器認證及元宇宙虛擬私有網路伺服器客戶認證。元宇宙虛擬私有網路伺服器認證包含有元宇宙虛擬私有網路伺服器區域Domain_MVVS及元宇宙虛擬私有網路伺服器密碼Passcode_MVVS。元宇宙虛擬私有網路伺服器客戶認證包含有客戶登入配置文件MVVS Client Profile及客戶配置的登入密碼MVVS Client Login。透過電子郵件或其他方式,元宇宙虛擬私有網路伺服器認證被傳送到元宇宙應用程序閘道器管理裝置1420。元宇宙虛擬私有網路伺服器客戶認證被傳送到授權的元宇宙虛擬私有網路伺服器裝置客戶(例如元宇宙虛擬私有網路伺服器裝置客戶1 1425),用於與元宇宙應用程序閘道器裝置客戶之一者(例如元宇宙應用程序閘道器1428的私有區域網路上的元宇宙應用程序閘道器裝置客戶2 1426)的節點對節點連結。公共雲入口網站1451包含有至少一個PCP_Device實用程序(例如PCP_Device 實用程序1447)。至少一個PCP_Device實用程序包含有至少一個虛擬機伺服器(例如虛擬機伺服器1432)。至少一個虛擬機伺服器包含有至少一個元宇宙虛擬私有網路伺服器(例如元宇宙虛擬私有網路伺服器1427)。至少一個元宇宙虛擬私有網路伺服器包含有MVVS_Device實用程序1424及MVVS_VPN實用程序1423。虛擬機伺服器1432連同元宇宙虛擬私有網路伺服器1427與部屬在私有區域網路中的元宇宙應用程序閘道器1428形成一對一的對應關係。PCP_Device實用程序1447是可擴展的公共雲入口網站,以及可對應於至少一個虛擬機伺服器(例如虛擬機伺服器1432)及至少一個元宇宙虛擬私有網路伺服器(例如元宇宙虛擬私有網路伺服器1427)。Figure 14 shows the third embodiment of the present invention in the Metaverse Application Gateway, the Metaverse Virtual Private Network Server, the Metaverse Application Gateway smart device client and the Metaverse Virtual Private Network Server through the cloud network. A flow chart of a communication process of a node-to-node connection mechanism between intelligent device clients. The present invention discloses that Metaverse Virtual Private Network Server smart device clients do not need a public cloud routing server to connect and access the server Metaverse Application Gateway 1428, Metaverse Virtual Private Network Server 1427, or otherwise. A Metaverse application gateway smart device client, or through network services under a cloud network server. As shown in Figure 14, without going through the public routing server 112 or the public VPN routing server 114 of Figure 1, the Metaverse VPN server on the cloud network installs the client 1 1425 and the Metaverse application Gateways 1428 can communicate with each other. Unlike the prior art of Figure 7, initially, one of the Metaverse VPN server device clients (public cloud portal management device 1450) connects to public cloud portal 1451 (circle 1 and step 1403). The public cloud portal 1451 is a cloud-based public cloud portal that includes the PCP_Device utility 1447. The public cloud portal management device 1450 obtains the Metaverse VPS server authentication and the Metaverse VPS client authentication from the PCP_Device utility 1447 . The Metaverse Virtual Private Server certification includes the Metaverse Virtual Private Server area Domain_MVVS and the Metaverse Virtual Private Server password Passcode_MVVS. Yuanverse virtual private network server customer authentication includes the customer login profile MVVS Client Profile and the customer-configured login password MVVS Client Login. The Metaverse VPN server certificate is sent to the Metaverse application gateway management device 1420 via email or other means. Metaverse VPN Server Client Authentication is sent to authorized Metaverse VPN Server Device Client (e.g. Metaverse VPN Server Device Client 1 1425) for use with the Metaverse Application Gateway A node-to-node connection to one of the server device clients, such as Metaverse Application Gateway Device Client 2 1426 on the private area network of Metaverse Application Gateway 1428. The public cloud portal 1451 contains at least one PCP_Device utility (eg, PCP_Device utility 1447). At least one PCP_Device utility includes at least one virtual machine server (eg, virtual machine server 1432). At least one virtual machine server includes at least one Metaverse virtual private network server (eg, Metaverse virtual private network server 1427). At least one Metaverse virtual private network server includes the MVVS_Device utility 1424 and the MVVS_VPN utility 1423. The virtual machine server 1432 together with the Metaverse virtual private network server 1427 form a one-to-one correspondence with the Metaverse application gateway 1428 deployed in the private area network. PCP_Device utility 1447 is an extensible public cloud portal and may correspond to at least one virtual machine server (eg, virtual machine server 1432) and at least one Metaverse virtual private network server (eg, Metaverse virtual private network Server 1427).

首先,在接收元宇宙虛擬私有網路伺服器認證後,元宇宙應用程序閘道器管理裝置1420透過MVAG_Device實用程序1421初始化及提供伺服器認證到元宇宙應用程序閘道器1428(圈2及步驟1400)。接著,MVAG_Device實用程序1421傳遞元宇宙應用程序閘道器1428內部的資訊到MVAG_VPN實用程序1422。透過傳輸控制協定∕用戶資料訊息協定,它註冊包含有Domain_MVVS及Passcode_MVVS的元宇宙虛擬私有網路伺服器認證資訊到MVVS_VPN實用程序1423(圈4及步驟1401)。MVVS_VPN實用程序1423回撥到元宇宙應用程序1452(圈3及步驟1405)。元宇宙應用程序1452包含有至少一個元宇宙應用程序閘道器(例如元宇宙應用程序閘道器1428)。至少一個元宇宙應用程序閘道器包含有MVAG_VPN實用程序1422,以啟用MVVS_VPN實用程序1423及MVAG_VPN實用程序1422間的第一虛擬私有網路通道。之後,在 MVAG_VPN實用程序1422及MVVS_VPN實用程序1423間,MVAG_VPN實用程序822建立第一虛擬私有網路通道(圈5及步驟1413)。MVVS_VPN實用程序1423也啟用MVVS_VPN實用程序1423及來自網際網路的雲端的任一元宇宙虛擬私有網路伺服器智能裝置客戶(例如元宇宙虛擬私有網路伺服器裝置客戶1 1425或元宇宙虛擬私有網路伺服器裝置客戶3 1453)間的第二虛擬私有網路通道(圈9及步驟1445或1446)。接著,按照來自網際網路的雲端的任一元宇宙虛擬私有網路伺服器裝置客戶(例如元宇宙虛擬私有網路伺服器裝置客戶1 1425)的需求,元宇宙虛擬私有網路伺服器1427準備好採取進一步行動。在元宇宙虛擬私有網路伺服器1427內部,MVVS_VPN實用程序1423與MVVS_Device實用程序1424進行通訊。MVVS_Device實用程序1424停留在循環中,等待元宇宙虛擬私有網路伺服器智能裝置客戶請求的請求(圈7及步驟1402)。首先,元宇宙虛擬私有網路伺服器裝置客戶1 1425註冊元宇宙虛擬私有網路伺服器客戶認證到MVVS_Device實用程序1424(圈8及步驟1404或1414)。元宇宙虛擬私有網路伺服器客戶認證包含有MVVS Client Profile及MVVS Client Login。MVVS_Device實用程序1424傳遞元宇宙虛擬私有網路伺服器客戶認證及元宇宙虛擬私有網路伺服器1427內部的連結請求到MVVS_VPN實用程序1423。在註冊後,元宇宙虛擬私有網路伺服器裝置客戶1 1425連接到MVVS_VPN實用程序1423,以及在元宇宙虛擬私有網路伺服器裝置客戶1 1425及MVVS_VPN實用程序1423間,按照需求建立第二虛擬私有網路通道(圈10及步驟1406或1416)。假設另一個元宇宙虛擬私有網路伺服器裝置客戶(例如元宇宙虛擬私有網路伺服器裝置客戶3 1453)也已成功連接到MVVS_VPN實用程序1423,在圈10及步驟1406中按照需求建立的第二虛擬私有網路通道及在圈5及步驟1413中按照需求建立的第一虛擬私有網路通道被合併為元宇宙虛擬私有網路伺服器裝置客戶1 1425及MVAG_VPN實用程序1422間的單一虛擬私有網路通道,以及連接到元宇宙應用程序閘道器裝置客戶2 1426(圈11及步驟1411),或元宇宙應用程序閘道器網路服務1436(圈11及步驟831),或另一個元宇宙虛擬私有網路伺服器裝置客戶(例如元宇宙虛擬私有網路伺服器裝置客戶3 1453)(圈10及步驟1416)。因此,元宇宙虛擬私有網路伺服器裝置客戶1 1425及元宇宙虛擬私有網路伺服器裝置客戶3 1453在它們之間形成節點對節點私有及安全的通訊通道。通訊通道是文本、語音及影像中進一步安全聊天應用程序的基礎,包含有加密(crypto)貨幣(currency)交易。First, after receiving the Metaverse Virtual Private Network Server Authentication, the Metaverse Application Gateway Management Device 1420 initializes and provides server authentication to the Metaverse Application Gateway 1428 through the MVAG_Device utility 1421 (circle 2 and step 1400). Next, the MVAG_Device utility 1421 passes the information within the Metaverse application gateway 1428 to the MVAG_VPN utility 1422. Through TCP/User Data Message Protocol, it registers the Metaverse Virtual Private Server authentication information containing Domain_MVVS and Passcode_MVVS to the MVVS_VPN utility 1423 (circle 4 and step 1401). The MVVS_VPN utility 1423 calls back to the Metaverse application 1452 (circle 3 and step 1405). Metaverse Application 1452 includes at least one Metaverse Application Gateway (eg, Metaverse Application Gateway 1428). At least one Metaverse application gateway includes the MVAG_VPN utility 1422 to enable the first virtual private network channel between the MVVS_VPN utility 1423 and the MVAG_VPN utility 1422 . Afterwards, between the MVAG_VPN utility 1422 and the MVVS_VPN utility 1423, the MVAG_VPN utility 822 establishes the first virtual private network channel (circle 5 and step 1413). The MVVS_VPN utility 1423 also enables the MVVS_VPN utility 1423 and any Metaverse VPN Server smart device client from the cloud on the Internet (e.g. Metaverse VPN Server Device Client 1 1425 or Metaverse VPN A second virtual private network channel (circle 9 and step 1445 or 1446) between client 3 (circle 9 and step 1446) of the path server device 1453). Then, upon demand from any Metaverse VPN server device client (for example, Metaverse VPN server device client 1 1425) from the cloud on the Internet, the Metaverse VPN server 1427 is ready Take further action. Within the Metaverse Virtual Private Network Server 1427, the MVVS_VPN utility 1423 communicates with the MVVS_Device utility 1424. The MVVS_Device utility 1424 remains in a loop, waiting for a request from the Metaverse Virtual Private Network Server smart device client (circle 7 and step 1402). First, Metaverse VPS Device Client 1 1425 registers Metaverse VPS Client authentication to the MVVS_Device utility 1424 (circle 8 and step 1404 or 1414). Metaverse virtual private network server client authentication includes MVVS Client Profile and MVVS Client Login. The MVVS_Device utility 1424 passes Metaverse VPN server client authentication and Metaverse VPN server 1427 internal connection requests to the MVVS_VPN utility 1423 . After registration, the Metaverse Virtual Private Network Server Installation Client 1 1425 connects to the MVVS_VPN utility 1423, and between the Metaverse Virtual Private Network Server Installation Client 1 1425 and the MVVS_VPN utility 1423, a second virtual machine is created as required. Private network channel (circle 10 and step 1406 or 1416). Assuming that another Metaverse Virtual Private Network Server Device Client (e.g., Metaverse Virtual Private Network Server Device Client 3 1453) has also successfully connected to the MVVS_VPN utility 1423, the third client created as required in Circle 10 and Step 1406 The two virtual private network channels and the first virtual private network channel established on demand in circle 5 and step 1413 are merged into a single virtual private network between the Metaverse virtual private network server device client 1 1425 and the MVAG_VPN utility 1422 network channel, and connects to the Metaverse Application Gateway Device Client 2 1426 (circle 11 and step 1411), or the Metaverse Application Gateway Network Service 1436 (circle 11 and step 831), or another metaverse Universe VPN Server Device Client (eg, Metaverse VPN Server Device Client 3 1453) (circle 10 and step 1416). Therefore, Metaverse VPS device client 1 1425 and Metaverse VPS device client 3 1453 form a node-to-node private and secure communication channel between them. Communication channels are the basis for further secure chat applications in text, voice and video, including cryptocurrency transactions.

相較於第7圖的先前技術,本發明更具可擴展性及可發展性,因為它引入了一些新實體,包含有公共雲入口網站1451、PCP_Device實用程序1447、虛擬機伺服器1432、元宇宙應用程序1452、公共雲入口網站管理裝置1450、元宇宙應用程序閘道器管理裝置1420、元宇宙虛擬私有網路伺服器認證及元宇宙虛擬私有網路伺服器客戶認證。它首先連接到公共雲入口網站1451,接著連接到至少一個MVVS_Device實用程序(例如MVVS_Device實用程序1447),接著連接到至少一個虛擬機伺服器(例如虛擬機伺服器1432),接著連接到至少一個元宇宙虛擬私有網路伺服器(例如元宇宙虛擬私有網路伺服器1427),接著連接到至少一個元宇宙應用程序(例如元宇宙應用程序1452),接著連接到至少一個元宇宙應用程序閘道器(例如元宇宙應用程序閘道器1428),接著連接到至少一個元宇宙應用程序閘道器裝置客戶(例如元宇宙應用程序閘道器裝置客戶2 1426),或者連接到元宇宙應用程序閘道器網路服務(例如元宇宙應用程序閘道器網路服務1436),或者連接到另一個元宇宙虛擬私有網路伺服器裝置客戶(例如元宇宙虛擬私有網路伺服器裝置客戶3 1453)。公共雲入口網站管理裝置1450開始從公共雲入口網站1451獲得元宇宙虛擬私有網路伺服器認證及客戶認證。之後,元宇宙虛擬私有網路伺服器認證被傳送到元宇宙應用程序閘道器管理裝置1420,以設置元宇宙應用程序閘道器1428與位於公共雲入口網站1451內部的虛擬機伺服器1432內部的對應元宇宙虛擬私有網路伺服器1427的連結。更進一步,在最後兩個虛擬私有網路通道形成單一虛擬私有網路通道前,至少三個虛擬私有網路通道綁定在一起,用於在垂直節點對節點私有及安全的元宇宙虛擬私有網路伺服器智能裝置客戶應用程序中的元宇宙虛擬私有網路伺服器裝置客戶1 1425及元宇宙應用程序閘道器裝置客戶2 1426、元宇宙應用程序閘道器網路服務1436或另一個元宇宙虛擬私有網路伺服器裝置客戶(例如元宇宙虛擬私有網路伺服器裝置客戶3 1453)間的節點對節點通訊。Compared with the prior art in Figure 7, the present invention is more scalable and developable because it introduces some new entities, including public cloud portal 1451, PCP_Device utility 1447, virtual machine server 1432, metadata Universe application 1452, public cloud portal management device 1450, Metaverse application gateway management device 1420, Metaverse VPS server authentication and Metaverse VPS client authentication. It first connects to the public cloud portal 1451, then connects to at least one MVVS_Device utility (eg, MVVS_Device utility 1447), then connects to at least one virtual machine server (eg, virtual machine server 1432), then connects to at least one element A universe virtual private network server (e.g., Metaverse virtual private network server 1427), which in turn connects to at least one Metaverse application (e.g., Metaverse application 1452), which in turn connects to at least one Metaverse application gateway (e.g., Metaverse Application Gateway 1428), and then connects to at least one Metaverse Application Gateway Device Client (e.g., Metaverse Application Gateway Device Client 2 1426), or connects to the Metaverse Application Gateway server network service (such as Metaverse Application Gateway Network Service 1436), or to another Metaverse VPN Server Device Client (such as Metaverse VPN Server Device Client 3 1453). The public cloud portal management device 1450 begins to obtain the Metaverse virtual private network server authentication and client authentication from the public cloud portal 1451. The Metaverse VPS credentials are then sent to the Metaverse Application Gateway Manager 1420 to set up the Metaverse Application Gateway 1428 with the virtual machine server 1432 located within the public cloud portal 1451 The link corresponding to the Metaverse virtual private network server 1427. Furthermore, at least three virtual private network channels are bound together before the last two virtual private network channels form a single virtual private network channel for a vertical node-to-node private and secure metaverse virtual private network. Metaverse Virtual Private Network Server Device Client 1 1425 and Metaverse Application Gateway Device Client 2 1426 in the Route Server Smart Device Client Application, Metaverse Application Gateway Network Service 1436 or another Metaverse Node-to-node communication between Universe VPS device clients (such as Metaverse VPS device client 3 1453).

第15圖為本發明第三實施例基於伺服器農場、計算機資源聚合及虛擬機伺服器透過雲端網路在元宇宙應用程序閘道器、元宇宙虛擬私有網路伺服器、元宇宙應用程序閘道器智能裝置客戶及元宇宙虛擬私有網路伺服器智能裝置客戶間的節點對節點連結機制的一個通訊流程的流程圖。更進一步,藉由新增伺服器農場1530及計算機資源聚合1531,第15圖擴展第14圖,以舉例說明在超大規模資料中心中元宇宙應用程序閘道器連結點機制的實現。超大規模資料中心具有至少一個伺服器農場(例如伺服器農場1530)、至少一個計算機資源聚合(例如計算機資源聚合1531)、至少一個私有雲入口網站(例如私有雲入口網站1551)及至少一個虛擬機伺服器(例如虛擬機伺服器1532)。在數量及尺寸上,虛擬機伺服器1532可擴展。在對應的虛擬機伺服器(例如虛擬機伺服器1532)中,超大規模資料中心或服務提供者可建造及部屬至少一個私有雲入口網站(例如私有雲入口網站1551)及大量獨立的元宇宙虛擬私有網路伺服器(例如元宇宙虛擬私有網路伺服器1527),以服務對應的元宇宙應用程序閘道器(例如元宇宙應用程序閘道器1528)及對應的元宇宙應用程序閘道器智能裝置客戶(例如元宇宙應用程序閘道器裝置客戶2 1526)。本質上,無論是否具有計算機資源聚合1531及伺服器農場1530的拓撲,元宇宙虛擬私有網路伺服器智能裝置客戶(例如元宇宙虛擬私有網路伺服器智能裝置客戶1 1525)及元宇宙應用程序閘道器智能裝置客戶(例如元宇宙應用程序閘道器智能裝置客戶2 1526)間的節點對節點通訊關係的團體配對被負責維持虛擬機伺服器1532的元宇宙提供者建造及部署。舉例來說,可能的商業模式是網際網路元宇宙提供者提供到大量用戶,以在虛擬機伺服器1532中主持他們的私有及安全的元宇宙虛擬私有網路伺服器1527。此外,單獨的私有及安全的元宇宙應用程序閘道器1528也被提供,以允許元宇宙訂閱者安裝元宇宙應用程序閘道器1528在他們的私有的區域網路中。透過本發明,平台訂閱者可從任何地方建立元宇宙虛擬私有網路伺服器智能裝置客戶(例如元宇宙虛擬私有網路伺服器智能裝置客戶1 1525)(例如智能手機、平板電腦或特斯拉儀表板)及元宇宙應用程序閘道器智能裝置客戶(例如元宇宙應用程序閘道器智能裝置客戶2 1526)(例如筆記型電腦、物聯網裝置、網路連接存儲裝置、機上盒、智能設備或媒體伺服器)間的節點對節點通訊,其位在元宇宙提供者的私有及安全的區域網路上。第15圖顯示本發明的元宇宙虛擬私有網路伺服器智能裝置客端(例如元宇宙虛擬私有網路伺服器智能裝置客戶1 1525)不需要公共雲路由伺服器來連接及存取到伺服器元宇宙應用程序閘道器1528、元宇宙虛擬私有網路伺服器1527或另一個元宇宙應用程序閘道器智能裝置客戶(例如元宇宙應用程序閘道器智能裝置客戶2 1526),或通過雲端網路在伺服器下的網路服務(未標示出)。如第15圖所示,無需通過第1圖的公共路由伺服器112或公共虛擬私有網路路由伺服器114,在雲端網路中的元宇宙虛擬私有網路伺服器智能裝置客戶1 1525及元宇宙應用程序閘道器1528可互相進行通訊。首先,元宇宙虛擬私有網路伺服器管理裝置1550是元宇宙虛擬私有網路伺服器智能裝置客戶之一,以及連接到私有雲入口網站1551(圈1及步驟1503)。私有雲入口網站1551是基於雲端的公共雲入口網站,其包含有PCP_Device實用程序1547。元宇宙虛擬私有網路伺服器管理裝置1550從PCP_Device實用程序1547獲得元宇宙虛擬私有網路伺服器認證及元宇宙虛擬私有網路伺服器客戶認證。元宇宙虛擬私有網路伺服器認證包含有元宇宙虛擬私有網路伺服器區域Domain_MVVS及元宇宙虛擬私有網路伺服器密碼Passcode_MVVS。元宇宙虛擬私有網路伺服器客戶認證包含有客戶登入配置文件MVVS Client Profile及客戶配置的登入密碼MVVS Client Login。透過電子郵件或其他方式,元宇宙虛擬私有網路伺服器認證被傳送到元宇宙應用程序閘道器管理裝置1520。元宇宙虛擬私有網路伺服器客戶認證被傳送到授權的元宇宙虛擬私有網路伺服器裝置客戶(例如元宇宙虛擬私有網路伺服器裝置客戶1 1525),用於與元宇宙應用程序閘道器裝置客戶之一者(例如元宇宙應用程序閘道器1528的私有區域網路上的元宇宙應用程序閘道器裝置客戶2 1526)的節點對節點連結。公共雲入口網站1551包含有至少一個PCP_Device實用程序(例如PCP_Device 實用程序1547)。至少一個PCP_Device實用程序包含有至少一個虛擬機伺服器(例如虛擬機伺服器1532)。至少一個虛擬機伺服器包含有至少一個元宇宙虛擬私有網路伺服器(例如元宇宙虛擬私有網路伺服器1527)。至少一個元宇宙虛擬私有網路伺服器包含有MVVS_Device實用程序1524及MVVS_VPN實用程序1523。虛擬機伺服器1532連同元宇宙虛擬私有網路伺服器1527與部屬在私有區域網路中的元宇宙應用程序閘道器1528形成一對一的對應關係。PCP_Device實用程序1547是可擴展的公共雲入口網站,以及可對應於至少一個虛擬機伺服器(例如虛擬機伺服器1532)及至少一個元宇宙虛擬私有網路伺服器(例如元宇宙虛擬私有網路伺服器1527)。Figure 15 shows the third embodiment of the present invention based on the server farm, computer resource aggregation and virtual machine server through the cloud network in the Metaverse application gateway, Metaverse virtual private network server, Metaverse application gateway A flow chart of a communication process of the node-to-node connection mechanism between the Daoqi smart device client and the Metaverse virtual private network server smart device client. Furthermore, by adding a server farm 1530 and a computer resource aggregation 1531, Figure 15 extends Figure 14 to illustrate the implementation of the Metaverse application gateway connection point mechanism in a hyperscale data center. The hyperscale data center has at least one server farm (eg, server farm 1530), at least one computer resource aggregation (eg, computer resource aggregation 1531), at least one private cloud portal (eg, private cloud portal 1551), and at least one virtual machine Server (e.g. virtual machine server 1532). The virtual machine servers 1532 are scalable in number and size. In the corresponding virtual machine server (such as virtual machine server 1532), a hyperscale data center or service provider can build and deploy at least one private cloud portal (such as private cloud portal 1551) and a large number of independent Metaverse virtual machines. A private network server (such as Metaverse Virtual Private Network Server 1527) to serve the corresponding Metaverse Application Gateway (such as Metaverse Application Gateway 1528) and the corresponding Metaverse Application Gateway Smart device client (e.g. Metaverse Application Gateway Device Client 2 1526). Essentially, regardless of whether there is a topology of computer resource aggregation 1531 and server farm 1530 , Metaverse VPN server smart device clients (such as Metaverse VPN server smart device clients 1 1525 ) and Metaverse applications A collective pairing of node-to-node communication relationships between gateway smart device clients (eg, Metaverse application gateway smart device client 2 1526 ) is built and deployed by the Metaverse provider responsible for maintaining the virtual machine server 1532 . For example, a possible business model is for an Internet Metaverse provider to offer a large number of users to host their private and secure Metaverse virtual private network servers 1527 in a virtual machine server 1532 . In addition, a separate private and secure Metaverse Application Gateway 1528 is also provided to allow Metaverse subscribers to install the Metaverse Application Gateway 1528 in their private local network. Through the present invention, platform subscribers can create Metaverse Virtual Private Network Server smart device clients (such as Metaverse Virtual Private Network Server smart device clients 1 1525) from anywhere (such as smartphones, tablets or Tesla Dashboard) and Metaverse Application Gateway Smart Device Customers (e.g. Metaverse Application Gateway Smart Device Customer 2 1526) (e.g. laptops, IoT devices, network attached storage devices, set-top boxes, smart devices Node-to-node communication between devices or media servers) on the Metaverse provider's private and secure LAN. Figure 15 shows that the Metaverse Virtual Private Network Server smart device client of the present invention (such as Metaverse Virtual Private Network Server Smart Device Client 1 1525) does not require a public cloud routing server to connect to and access the server. Metaverse Application Gateway 1528, Metaverse Virtual Private Network Server 1527, or another Metaverse Application Gateway Smart Device Client (e.g., Metaverse Application Gateway Smart Device Client 2 1526), or via the cloud Network services under the server (not shown). As shown in Figure 15, without going through the public routing server 112 or the public VPN routing server 114 in Figure 1, the Metaverse Virtual Private Network Server smart device client 1 1525 and Metaverse in the cloud network Universe application gateways 1528 can communicate with each other. First, the Metaverse VPS management device 1550 is one of the Metaverse VPS smart device clients and is connected to the private cloud portal 1551 (circle 1 and step 1503). The private cloud portal 1551 is a cloud-based public cloud portal that contains the PCP_Device utility 1547. The Metaverse VPS management device 1550 obtains the Metaverse VPS server authentication and the Metaverse VPS client authentication from the PCP_Device utility 1547. The Metaverse Virtual Private Server certification includes the Metaverse Virtual Private Server area Domain_MVVS and the Metaverse Virtual Private Server password Passcode_MVVS. Yuanverse virtual private network server customer authentication includes the customer login profile MVVS Client Profile and the customer-configured login password MVVS Client Login. The Metaverse VPN server certificate is sent to the Metaverse application gateway management device 1520 via email or other means. Metaverse VPN Server Client Authentication is sent to authorized Metaverse VPN Server Device Client (e.g. Metaverse VPN Server Device Client 1 1525) for use with the Metaverse Application Gateway A node-to-node connection to one of the device device clients, such as Metaverse Application Gateway Device Client 2 1526 on the private area network of Metaverse Application Gateway 1528. The public cloud portal 1551 contains at least one PCP_Device utility (eg, PCP_Device utility 1547). At least one PCP_Device utility includes at least one virtual machine server (eg, virtual machine server 1532). At least one virtual machine server includes at least one Metaverse virtual private network server (eg, Metaverse virtual private network server 1527). At least one Metaverse virtual private network server includes the MVVS_Device utility 1524 and the MVVS_VPN utility 1523. The virtual machine server 1532 together with the Metaverse virtual private network server 1527 form a one-to-one correspondence with the Metaverse application gateway 1528 deployed in the private area network. PCP_Device utility 1547 is an extensible public cloud portal and may correspond to at least one virtual machine server (eg, virtual machine server 1532) and at least one Metaverse virtual private network server (eg, Metaverse virtual private network Server 1527).

首先,在接收元宇宙虛擬私有網路伺服器認證後,元宇宙應用程序閘道器管理裝置1520透過MVAG_Device實用程序1521初始化及提供伺服器認證到元宇宙應用程序閘道器1528(圈2及步驟1500)。接著,MVAG_Device實用程序1521傳遞元宇宙應用程序閘道器1528內部的資訊到MVAG_VPN實用程序1522。透過傳輸控制協定∕用戶資料訊息協定,它註冊包含有Domain_MVVS及Passcode_MVVS的元宇宙虛擬私有網路伺服器認證資訊到MVVS_VPN實用程序1523(圈4及步驟1501)。在註冊後,MVVS_VPN實用程序1523回撥元宇宙應用程序1552(圈3及步驟1505)。元宇宙應用程序1552包含有至少一個元宇宙應用程序閘道器(例如元宇宙應用程序閘道器1528)。至少一個元宇宙應用程序閘道器包含有MVAG_VPN實用程序1522,以啟用MVVS_VPN實用程序1523及MVAG_VPN實用程序1522間的第一虛擬私有網路通道。在MVVS_VPN實用程序1523及MVAG_VPN實用程序1522間,MVVS_VPN實用程序1523也按照需求建立第二虛擬私有網路通道,等待按照需求建立的第二虛擬私有網路通道的完成(圈10及步驟1506)。之後,在MVAG_VPN實用程序1522及MVVS_VPN實用程序1523間,MVAG_VPN實用程序1522建立第一虛擬私有網路通道(圈5及步驟1513)。MVVS_VPN實用程序1523也啟用MVVS_VPN實用程序1523及來自網際網路的雲端的任一元宇宙虛擬私有網路伺服器智能裝置客戶(例如元宇宙虛擬私有網路伺服器裝置客戶1 1525)間的第二虛擬私有網路通道(圈9及步驟1545)。接著,按照來自網際網路的雲端的任一元宇宙虛擬私有網路伺服器裝置客戶(例如元宇宙虛擬私有網路伺服器裝置客戶1 1525)的需求,元宇宙虛擬私有網路伺服器1527準備好採取進一步行動。在元宇宙虛擬私有網路伺服器1527內部,MVVS_VPN實用程序1523與MVVS_Device實用程序1524進行通訊。MVVS_Device實用程序1524停留在循環中,等待元宇宙虛擬私有網路伺服器智能裝置客戶請求的請求(圈7及步驟1502)。首先,元宇宙虛擬私有網路伺服器裝置客戶1 1525註冊元宇宙虛擬私有網路伺服器客戶認證到MVVS_Device實用程序1524(圈8及步驟1504)。元宇宙虛擬私有網路伺服器客戶認證包含有MVVS Client Profile及MVVS Client Login。MVVS_Device實用程序1524傳遞元宇宙虛擬私有網路伺服器客戶認證及元宇宙虛擬私有網路伺服器1527內部的連結請求到MVVS_VPN實用程序1523。在註冊後,元宇宙虛擬私有網路伺服器裝置客戶1 1525連接到MVVS_VPN實用程序1523,以及在元宇宙虛擬私有網路伺服器裝置客戶1 1525及MVVS_VPN實用程序1523間,按照需求建立第二虛擬私有網路通道(圈10及步驟1506)。在圈10及步驟906中按照需求建立的第二虛擬私有網路通道及在圈5及步驟1513中按照需求建立的第一虛擬私有網路通道被合併為元宇宙虛擬私有網路伺服器裝置客戶1 1525及MVAG_VPN實用程序1522間的單一虛擬私有網路通道,以及連接到元宇宙應用程序閘道器裝置客戶2 1526(圈11及步驟1511),或元宇宙應用程序閘道器網路服務(未標示出)(圈11及步驟1511)。First, after receiving the Metaverse VPN server authentication, the Metaverse Application Gateway Management Device 1520 initializes and provides server authentication to the Metaverse Application Gateway 1528 through the MVAG_Device utility 1521 (circle 2 and step 1500). Next, the MVAG_Device utility 1521 passes the information within the Metaverse application gateway 1528 to the MVAG_VPN utility 1522. Through TCP/User Data Message Protocol, it registers the Metaverse Virtual Private Server authentication information containing Domain_MVVS and Passcode_MVVS to the MVVS_VPN utility 1523 (circle 4 and step 1501). After registration, the MVVS_VPN utility 1523 calls back to the Metaverse application 1552 (circle 3 and step 1505). Metaverse application 1552 includes at least one Metaverse application gateway (eg, Metaverse application gateway 1528). At least one Metaverse application gateway includes the MVAG_VPN utility 1522 to enable the first virtual private network channel between the MVVS_VPN utility 1523 and the MVAG_VPN utility 1522 . Between the MVVS_VPN utility program 1523 and the MVAG_VPN utility program 1522, the MVVS_VPN utility program 1523 also establishes a second virtual private network channel as required, and waits for completion of the second virtual private network channel established as required (circle 10 and step 1506). Afterwards, between the MVAG_VPN utility 1522 and the MVVS_VPN utility 1523, the MVAG_VPN utility 1522 establishes the first virtual private network channel (circle 5 and step 1513). The MVVS_VPN utility 1523 also enables a second virtual connection between the MVVS_VPN utility 1523 and any Metaverse VPN Server smart device client (eg, Metaverse VPN Server Device Client 1 1525 ) from the cloud over the Internet. Private network channel (circle 9 and step 1545). Then, upon demand from any Metaverse VPN server device client (for example, Metaverse VPN server device client 1 1525) from the cloud on the Internet, the Metaverse VPN server 1527 is ready Take further action. Within the Metaverse Virtual Private Network Server 1527, the MVVS_VPN utility 1523 communicates with the MVVS_Device utility 1524. The MVVS_Device utility 1524 remains in a loop, waiting for a request from the Metaverse Virtual Private Network Server smart device client (circle 7 and step 1502). First, Metaverse VPS Device Client 1 1525 registers Metaverse VPS Client authentication to the MVVS_Device utility 1524 (circle 8 and step 1504). Metaverse virtual private network server client authentication includes MVVS Client Profile and MVVS Client Login. The MVVS_Device utility 1524 passes Metaverse VPN server client authentication and Metaverse VPN server 1527 internal connection requests to the MVVS_VPN utility 1523 . After registration, the Metaverse Virtual Private Network Server Installation Client 1 1525 connects to the MVVS_VPN utility 1523, and between the Metaverse Virtual Private Network Server Installation Client 1 1525 and the MVVS_VPN utility 1523, a second virtual machine is created as required. Private network channel (circle 10 and step 1506). The second virtual private network channel established on demand in circle 10 and step 906 and the first virtual private network channel established on demand in circle 5 and step 1513 are merged into the Metaverse virtual private network server device client A single virtual private network channel between 1 1525 and the MVAG_VPN utility 1522, and connected to the Metaverse Application Gateway device Client 2 1526 (circle 11 and step 1511), or the Metaverse Application Gateway Network Service ( Not labeled) (circle 11 and step 1511).

第16圖為本發明第三實施例從MVVS_VPN實用程序到MVAG_VPN實用程序的連結及在私有區域網路中元宇宙虛擬私有網路伺服器裝置客戶及元宇宙應用程序閘道器裝置客戶間的連結的一個通訊流程的流程圖。首先,透過廣域網路,MVAG_VPN實用程序使用元宇宙虛擬私有網路伺服器認證連接到MVVS_VPN實用程序(步驟1600)。透過廣域網路,MVVS_VPN實用程序從MVAG_VPN實用程序接受元宇宙虛擬私有網路伺服器認證(步驟1610)。接著,如果需要,MVVS_VPN實用程序傳送進一步的連結或更新資訊到MVAG_VPN實用程序(步驟1611及1641)。如果需要,MVAG_VPN實用程序從MVVS_VPN實用程序接收進一步的連結或更新資訊(步驟1601)。MVVS_VPN實用程序回撥MVAG_VPN實用程序,以啟用第一虛擬私有網路通道(步驟1612及1642)。MVAG_VPN實用程序連接到 MVVS_VPN實用程序,以建立從MVAG_VPN實用程序到MVVS_VPN實用程序的第一虛擬私有網路通道(步驟1603及1642)。MVVS_VPN實用程序等待從元宇宙虛擬私有網路伺服器裝置客戶到MVVS_VPN實用程序的第二虛擬私有網路通道被建立(步驟1615)。接著,MVVS_VPN實用程序按照需求建立從元宇宙虛擬私有網路伺服器裝置客戶到MVVS_VPN實用程序的第二虛擬私有網路通道(步驟1616及1646)。MVAG_VPN實用程序等待從元宇宙虛擬私有網路伺服器裝置客戶到MVVS_VPN實用程序的第二虛擬私有網路通道被建立(步驟1605)。MVAG_VPN實用程序建立從元宇宙虛擬私有網路伺服器裝置客戶到MVAG_VPN實用程序的節點對節點通訊通道(步驟1608、1618及1648)。此後,第二虛擬私有網路通道及第一虛擬私有網路通道被合併為元宇宙虛擬私有網路伺服器裝置客戶及MVAG_VPN實用程序間的一個單一虛擬私有網路通道。在照需求建立的第二虛擬私有網路通道及第一虛擬私有網路通道被合併為元宇宙虛擬私有網路伺服器裝置客戶及MVAG_VPN實用程序間的單一虛擬私有網路通道後,元宇宙虛擬私有網路伺服器裝置客戶可啟動私有及安全的連結到至少一個元宇宙應用程序閘道器裝置客戶、在私有元宇宙應用程序閘道器區域網路上的元宇宙應用程序閘道器網路服務(未標示出)或在網際網路的公共雲上的另一個MVVS_Device客戶(未標示出)(步驟1631)。Figure 16 shows the link from the MVVS_VPN utility to the MVAG_VPN utility and the link between the Metaverse virtual private network server device client and the Metaverse application gateway device client in the private area network according to the third embodiment of the present invention. A flow chart of a communication process. First, over the WAN, the MVAG_VPN utility uses Metaverse VPN server authentication to connect to the MVVS_VPN utility (step 1600). Over the WAN, the MVVS_VPN utility accepts the Metaverse VPN server authentication from the MVAG_VPN utility (step 1610). Then, if necessary, the MVVS_VPN utility sends further links or update information to the MVAG_VPN utility (steps 1611 and 1641). If necessary, the MVAG_VPN utility receives further link or update information from the MVVS_VPN utility (step 1601). The MVVS_VPN utility calls back the MVAG_VPN utility to enable the first virtual private network channel (steps 1612 and 1642). The MVAG_VPN utility connects to the MVVS_VPN utility to establish a first virtual private network channel from the MVAG_VPN utility to the MVVS_VPN utility (steps 1603 and 1642). The MVVS_VPN utility waits for the second virtual private network channel from the Metaverse VPN server device client to the MVVS_VPN utility to be established (step 1615). Next, the MVVS_VPN utility establishes a second virtual private network channel from the Metaverse VPN server device client to the MVVS_VPN utility as required (steps 1616 and 1646). The MVAG_VPN utility waits for the second virtual private network channel from the Metaverse VPN server device client to the MVVS_VPN utility to be established (step 1605). The MVAG_VPN utility establishes a node-to-node communication channel from the Metaverse Virtual Private Network Server device client to the MVAG_VPN utility (steps 1608, 1618, and 1648). Thereafter, the second VPN channel and the first VPN channel are merged into a single VPN channel between the Metaverse VPN server device client and the MVAG_VPN utility. After the second virtual private network channel and the first virtual private network channel established on demand are merged into a single virtual private network channel between the Metaverse virtual private network server device client and the MVAG_VPN utility, the Metaverse Virtual Private Network A private network server device client can initiate a private and secure connection to at least one Metaverse Application Gateway device client, the Metaverse Application Gateway network service on the private Metaverse Application Gateway local network (not shown) or another MVVS_Device client (not shown) on a public cloud on the Internet (step 1631).

相較於第一實施例,藉由僅使用兩個虛擬私有網路通道而不是第一實施例的三個虛擬私有網路通道,第三實施例具有較簡單架構的優點。但是,第三實施例要求第一虛擬私有網路通道一直處於開啟狀態,或者至少必須一直保持活動狀態。這樣做似乎不太安全,因為第一虛擬私有網路通道始終在線。但事實是,來自按照需求建立的第二虛擬私有網路通道的連結機制解決元宇宙虛擬私有網路伺服器裝置客戶及MVAG_VPN實用程序間的最終單一虛擬私有網路通道中的安全問題。因此,在連結簡單性、效率及安全性方面,第三實施例是較佳的實施例。Compared to the first embodiment, the third embodiment has the advantage of a simpler architecture by using only two virtual private network channels instead of the three virtual private network channels of the first embodiment. However, the third embodiment requires that the first virtual private network channel is always open, or at least must remain active. This seems less secure because the first virtual private network channel is always online. But the fact is that the connection mechanism from the second on-demand VPN channel solves the security issue in the final single VPN channel between the Metaverse VPN server device client and the MVAG_VPN utility. Therefore, the third embodiment is the preferred embodiment in terms of connection simplicity, efficiency and security.

大多數文本提供者,例如Netflix、HBO、亞馬遜、Pandora等,執行稱為地理封鎖(geo-blocking)的機制,以執行其專有的數位領土權利(digital territorial right)。反之,地理住家(geo-home)是一種允許在家中存取線上內容的機制,以及地理入口網站(geo-portal)是一種允許在入口網站上存取線上內容的機制。雖然執行地理封鎖的合法性是有爭議的,以及因地區而異,一些國際旅行者使用虛擬私有網路中繼服務來規避基於網際網路協定的地理封鎖,以存取在他們所在的國家以外無法獲得的基於本國或外國的線上內容。除了合法性,這種做法的缺點在於它涉及對虛擬私有網路服務的額外訂閱及藉由選擇地理住家或地理入口網站進行的有限選擇。除了允許從雲端中的任一位置透過網際網路對私有區域網路中的元宇宙應用程序閘道器裝置客戶及網路服務進行私有及安全的存取的原始功能,本發明為元宇宙提供者提供一種機制,可按照需求動態設定元宇宙虛擬私有網路伺服器,以靈活地提供用戶在存取線上內容時在地理封鎖、地理入口網站或地理住家中的選擇。Most text providers, such as Netflix, HBO, Amazon, Pandora, etc., implement a mechanism called geo-blocking to enforce their exclusive digital territorial rights. In contrast, a geo-home is a mechanism that allows access to online content at home, and a geo-portal is a mechanism that allows access to online content on a portal. While the legality of enforcing geo-blocking is controversial and varies by region, some international travelers use VPN relay services to circumvent Internet Protocol-based geo-blocking to access access outside the country in which they are located. Unavailable domestic or foreign-based online content. Legality aside, the disadvantages of this approach are that it involves an additional subscription to a virtual private network service and limited options by choosing a geo-home or geo-portal. In addition to the original functionality of allowing private and secure access to Metaverse Application Gateway device clients and network services in a private local area network from anywhere in the cloud over the Internet, the present invention provides Metaverse It provides a mechanism that can dynamically configure Metaverse virtual private network servers according to needs to flexibly provide users with the choice of geo-blocking, geo-portal or geo-residential when accessing online content.

雖然已經根據所示實施例描述本發明,本領域具通常知識者將容易地理解,可對實施例進行變化,以及這些變化也在本發明的精神及範圍內。因此,本領域具通常知識者可在不背離所附請求項的精神及範圍的情況下進行修改。 以上所述僅為本發明之較佳實施例,凡依本發明申請專利範圍所做之均等變化與修飾,皆應屬本發明之涵蓋範圍。 Although the present invention has been described in terms of illustrated embodiments, those of ordinary skill in the art will readily appreciate that variations may be made in the embodiments that are within the spirit and scope of the invention. Accordingly, one of ordinary skill in the art may make modifications without departing from the spirit and scope of the appended claims. The above are only preferred embodiments of the present invention, and all equivalent changes and modifications made in accordance with the patentable scope of the present invention shall fall within the scope of the present invention.

100, 200, 300, 400, 500, 600:公共雲 101, 106, 107, 109, 110, 111:智能裝置客戶 102, 103, 202, 203, 302, 303, 402, 403:路由器 104, 105, 204, 205, 304, 305, 404, 405, 434, 504, 505:區域網路 108:私有雲伺服器 112, 212, 312, 412:公共路由伺服器 113, 213, 313, 413:公共雲伺服器 114, 214:公共虛擬私有網路路由伺服器 117, 119, 217, 219, 317, 319, 417, 419:公共網路協定地址 118, 120, 218, 220, 318, 320, 418, 420:私有網路協定地址 201, 209, 210, 211, 221, 701, 725, 726: 私有雲回撥伺服器(PCCBS)裝置客戶 206, 207:私有雲路由伺服器(PCRS)裝置客戶 208, 728:私有雲路由伺服器 215:客戶訊息框 216, 727:私有雲回撥伺服器 222, 223, 224, 225, 322, 323, 324, 325, 422, 423, 424, 425, 426, 540: 通訊路徑 228, 328, 428, 436:元宇宙網路服務 240, 2400, 340, 3400, 440:虛擬區域網路 250, 350, 360, 450, 460:實體區域網路 270:私有雲路由伺服器實用程序 271:私有雲路由伺服器客戶資料庫 272:路由伺服器訊息框實用程序 273, 720:私有雲路由伺服器(PCRS)管理裝置 274:私有雲路由伺服器裝置應用程序(PCRS_Device_App) 275:私有雲路由伺服器(PCRS)伺服器資料庫 276, 280, 282:客戶訊息框實用程序 277:私有雲回撥伺服器(PCCBS)管理裝置 278:私有雲回撥伺服器裝置應用程序(PCCBS_Device_App) 279:私有雲回撥伺服器(PCCBS)伺服器資料庫 281:受邀者裝置 2700:私有雲回撥伺服器(PCCBS)實用程序 2710:私有雲回撥伺服器(PCCBS)客戶資料庫 2720:回撥伺服器訊息框實用程序 301, 309, 310, 311, 321, 401, 409, 410, 411, 421, 825, 853, 925, 1425, 1453, 1525: 元宇宙虛擬私有網路伺服器(MVVS)裝置客戶 306, 307, 406, 407, 435, 826, 926, 1426, 1526: 元宇宙應用程序閘道器(MVAG)裝置客戶 308, 408, 828, 928, 1428, 1528: 元宇宙應用程序閘道器 316, 416, 827, 927, 1427, 1527: 元宇宙虛擬私有網路伺服器 330, 430, 530, 851, 951, 1451, 1551:公共雲入口網站(PCP) 331, 431, 531, 532, 533, 534, 832, 932, 1432, 1532:虛擬機伺服器 370, 470, 852, 952, 1452, 1552:元宇宙應用程序 371, 374, 821, 921, 1421, 1521: MVAG_Device實用程序 372, 822, 922, 1422, 1522: MVAG_VPN實用程序 373, 820, 920, 1420, 1520:元宇宙應用程序閘道器(MVAG)管理裝置 375:元宇宙虛擬私有網路伺服器區域(Domain_MVVS) 376:元宇宙虛擬私有網路伺服器密碼(Passcode_MVVS) 377, 850, 950, 1450, 1550:公共雲入口網站(PCP)管理裝置 378:公共雲入口網站裝置客戶實用程序 379:元宇宙虛擬私有網路伺服器(MVVS)裝置客戶認證 380:元宇宙虛擬私有網路伺服器(MVVS)伺服器認證 381: MVVS_Device_Client實用程序 382:元宇宙虛擬私有網路伺服器(MVVS)客戶登入 383:元宇宙虛擬私有網路伺服器(MVVS)客戶配置 3710, 824, 924, 1424, 1524: MVVS_Device實用程序 3720, 823, 923, 1423, 1523: MVVS_VPN實用程序 502,602:私有區域網路路由器 503:訪客區域網路路由器 508:私有物質閘道器 516:私有雲虛擬私有網路伺服器 541, 542, 543, 544:網際網路平台擁有者雲端 550:私有元宇宙 551, 552, 553, 554, 561, 562, 563, 564:私有雲虛擬私有網路伺服器(PCVS)智能裝置客戶 521, 522, 523, 524, 525, 526:私有物質閘道器(PMG)智能裝置客戶 603:訪客區域網路路由器 604:私有區域網路 608:元宇宙應用程序閘道器 616:元宇宙虛擬私有網路伺服器 622:存檔內容伺服器 630:元宇宙提供者入口網站 631, 632, 633, 634:虛擬機伺服器 640:應用程序虛擬網絡 641, 642,643,644:元宇宙雲端提供者 650, 6320, 6330, 6340:元宇宙應用程序 651,652,653,654,661,662,663,664:元宇宙虛擬私有網路伺服器(MVVS)智能裝置客戶 6250,6251,6262:實況串流事件 700, 701, 702, 703, 704, 705, 706, 707, 711, 713, 714, 716, 800, 801, 802, 803, 804, 805, 806, 807, 811, 813, 814, 816, 831, 845, 846, 900, 901, 902, 903, 904, 905, 906, 907, 911, 913, 945, 1000, 1001, 1002, 1003, 1004, 1010, 1011, 1040, 1101, 1102, 1103, 1104, 1110, 1111, 1112, 1140, 1200, 1201, 1202, 1203, 1205, 1208, 1210, 1211, 1212, 1213, 1215, 1216, 1218, 1231, 1240, 1241, 1242, 1243, 1246, 1248, 1300, 1301, 1302, 1303, 1304, 1311, 1312, 1313, 1341, 1342, 1343, 1400, 1401, 1402, 1403, 1404, 1405, 1406, 1411, 1413, 1414, 1416, 1431, 1445, 1446, 1500, 1501, 1502, 1503, 1504, 1505, 1506, 1511, 1513, 1545, 1600, 1601, 1603, 1605, 1608, 1610 ,1611, 1612, 1615, 1616, 1618, 1630, 1640, 1641, 1642, 1646, 1648:步驟 721:PCRS_Device實用程序 722:PCRS_VPN實用程序 723:PCCBS_VPN實用程序 724:PCCBS_Device實用程序 847, 947, 1447, 1557:PCP_Device 實用程序 836, 1436: 元宇宙應用程序閘道器(MVAG)網路服務 930, 1530:伺服器農場 931, 1531:計算機資源聚合 100, 200, 300, 400, 500, 600: Public cloud 101, 106, 107, 109, 110, 111: Smart device customers 102, 103, 202, 203, 302, 303, 402, 403: Router 104, 105, 204, 205, 304, 305, 404, 405, 434, 504, 505: LAN 108:Private cloud server 112, 212, 312, 412:Public routing server 113, 213, 313, 413:Public cloud server 114, 214:Public VPN Route Server 117, 119, 217, 219, 317, 319, 417, 419: Public IP address 118, 120, 218, 220, 318, 320, 418, 420: Private IP address 201, 209, 210, 211, 221, 701, 725, 726: Private Cloud Callback Server (PCCBS) installation customers 206, 207: Private Cloud Routing Server (PCRS) installation customer 208, 728:Private cloud routing server 215:Customer message box 216, 727: Private Cloud Callback Server 222, 223, 224, 225, 322, 323, 324, 325, 422, 423, 424, 425, 426, 540: Communication path 228, 328, 428, 436: Metaverse network service 240, 2400, 340, 3400, 440: Virtual LAN 250, 350, 360, 450, 460: physical area network 270:Private Cloud Route Server Utility 271:Private cloud routing server customer database 272:Route Server Message Box Utility 273, 720: Private Cloud Routing Server (PCRS) Management Device 274: Private Cloud Routing Server Device Application (PCRS_Device_App) 275:Private Cloud Routing Server (PCRS) Server Database 276, 280, 282: Customer Message Box Utility 277:Private Cloud Callback Server (PCCBS) Management Device 278: Private Cloud Callback Server Device Application (PCCBS_Device_App) 279:Private Cloud Callback Server (PCCBS) Server Database 281:Invitee device 2700: Private Cloud Callback Server (PCCBS) Utility 2710: Private Cloud Callback Server (PCCBS) Customer Database 2720: Callback server message box utility 301, 309, 310, 311, 321, 401, 409, 410, 411, 421, 825, 853, 925, 1425, 1453, 1525: Metaverse Virtual Private Server (MVVS) installation client 306, 307, 406, 407, 435, 826, 926, 1426, 1526: Metaverse Application Gateway (MVAG) Device Client 308, 408, 828, 928, 1428, 1528: Metaverse Application Gateway 316, 416, 827, 927, 1427, 1527: Metaverse Virtual Private Network Server 330, 430, 530, 851, 951, 1451, 1551: Public Cloud Portal (PCP) 331, 431, 531, 532, 533, 534, 832, 932, 1432, 1532: Virtual machine server 370, 470, 852, 952, 1452, 1552: Metaverse Application 371, 374, 821, 921, 1421, 1521: MVAG_Device utility 372, 822, 922, 1422, 1522: MVAG_VPN utility 373, 820, 920, 1420, 1520: Metaverse Application Gateway (MVAG) Management Device 375: Metaverse Virtual Private Network Server Area (Domain_MVVS) 376: Metaverse Virtual Private Network Server Password (Passcode_MVVS) 377, 850, 950, 1450, 1550: Public Cloud Portal (PCP) management device 378: Public Cloud Portal Installation Client Utility 379: Metaverse Virtual Private Server (MVVS) Device Client Authentication 380: Metaverse Virtual Private Server (MVVS) Server Certification 381: MVVS_Device_Client utility 382: Metaverse Virtual Private Server (MVVS) customer login 383: Metaverse Virtual Private Server (MVVS) Customer Configuration 3710, 824, 924, 1424, 1524: MVVS_Device utility 3720, 823, 923, 1423, 1523: MVVS_VPN utility 502,602: Private area network router 503:Guest Area Network Router 508:Private material gateway 516:Private Cloud Virtual Private Network Server 541, 542, 543, 544: Internet platform owner cloud 550:Private Metaverse 551, 552, 553, 554, 561, 562, 563, 564: Private Cloud Virtual Private Server (PCVS) smart device customers 521, 522, 523, 524, 525, 526: Private Material Gateway (PMG) smart device customers 603: Guest Area Network Router 604: Private LAN 608:Metaverse Application Gateway 616: Metaverse Virtual Private Network Server 622:Archived content server 630:Metaverse Provider Portal 631, 632, 633, 634: Virtual machine server 640:Application Virtual Network 641, 642,643,644: Metaverse cloud provider 650, 6320, 6330, 6340: Metaverse Application 651,652,653,654,661,662,663,664: Metaverse Virtual Private Server (MVVS) smart device customers 6250,6251,6262: Live streaming events 700, 701, 702, 703, 704, 705, 706, 707, 711, 713, 714, 716, 800, 801, 802, 803, 804, 805, 806, 807, 811, 813, 814, 816, 831 , 845, 846, 900, 901, 902, 903, 904, 905, 906, 907, 911, 913, 945, 1000, 1001, 1002, 1003, 1004, 1010, 1011, 1040, 1101, 1102 , 1103, 1104, 1110, 1111, 1112, 1140, 1200, 1201, 1202, 1203, 1205, 1208, 1210, 1211, 1212, 1213, 1215, 1216, 1218, 1231, 1240, 1241, 124 2, 1243, 1246, 1248, 1300, 1301, 1302, 1303, 1304, 1311, 1312, 1313, 1341, 1342, 1343, 1400, 1401, 1402, 1403, 1404, 1405, 1406, 1411, 1413, 1414, 141 6, 1431, 1445, 1446, 1500, 1501, 1502, 1503, 1504, 1505, 1506, 1511, 1513, 1545, 1600, 1601, 1603, 1605, 1608, 1610,1611, 1612, 1615, 1616, 1618, 163 0, 1640, 1641, 1642, 1646, 1648: steps 721:PCRS_Device utility 722:PCRS_VPN utility 723:PCCBS_VPN utility 724:PCCBS_Device utility 847, 947, 1447, 1557:PCP_Device utility 836, 1436: Metaverse Application Gateway (MVAG) network service 930, 1530:Server farm 931, 1531:Computer resource aggregation

第1圖為本發明實施例一傳統雲端網路基礎建設的示意圖。 第2圖為本發明實施例在私有雲路由伺服器、私有雲回撥伺服器、元宇宙網路服務、私有雲路由伺服器智能裝置客戶及私有雲回撥伺服器智能裝置客戶中基於會話訊息框通訊的連結機制的一個雲端網路基礎建設的示意圖。 第3圖為本發明第一實施例基於在元宇宙應用程序閘道器、元宇宙虛擬私有網路伺服器、元宇宙網路服務、元宇宙應用程序閘道器智能裝置客戶及元宇宙虛擬私有網路伺服器智能裝置客戶間的多條虛擬私有網路通道的連結機制的一個雲端網路基礎建設的示意圖。 第4圖為本發明第二實施例基於在元宇宙應用程序閘道器、元宇宙虛擬私有網路伺服器、元宇宙網路服務、元宇宙應用程序閘道器智能裝置客戶及元宇宙虛擬私有網路伺服器智能裝置客戶間的多條虛擬私有網路通道的連結機制的一個雲端網路基礎建設的示意圖。 第5圖為本發明實施例基於在私有物質閘道器、私有雲虛擬私有網路伺服器、私有網路服務、私有物質閘道器智能裝置客戶及私有雲虛擬私有網路伺服器智能裝置客戶間的多條虛擬私有網路通道的連結機制的一個雲端網路基礎建設的示意圖。 第6圖為本發明第三實施例基於在元宇宙應用程序閘道器、元宇宙虛擬私有網路伺服器、元宇宙網路服務、元宇宙應用程序閘道器智能裝置客戶及元宇宙虛擬私有網路伺服器智能裝置客戶間的多條虛擬私有網路通道的連結機制的一個雲端網路基礎建設的示意圖。 第7圖為本發明實施例透過雲端網路在私有雲路由伺服器、私有雲回撥伺服器、私有雲回撥伺服器智能裝置客戶及私有雲路由伺服器智能裝置客戶間的節點對節點連結機制的一個通訊流程的流程圖。 第8圖為本發明實施例透過雲端網路在元宇宙應用程序閘道器、元宇宙虛擬私有網路伺服器、元宇宙虛擬私有網路伺服器智能裝置客戶及元宇宙應用程序閘道器智能裝置客戶間的節點對節點連結機制的一個通訊流程的示意圖。 第9圖為本發明實施例基於伺服器農場、計算機資源聚合及虛擬機伺服器透過雲端網路在元宇宙應用程序閘道器、元宇宙虛擬私有網路伺服器、元宇宙虛擬私有網路伺服器智能裝置客戶及元宇宙應用程序閘道器智能裝置客戶間的節點對節點連結機制的一個通訊流程的流程圖。 第10圖為本發明實施例公共雲入口網站管理裝置註冊到公共雲入口網站的一個通訊流程的流程圖。 第11圖為本發明實施例元宇宙應用程序閘道器管理裝置初始化及配置元宇宙應用程序閘道器的一個通訊流程的流程圖。 第12圖為本發明實施例從MVVS_VPN實用程序到MVAG_VPN實用程序的連結及在私有區域網路中元宇宙虛擬私有網路伺服器裝置客戶及元宇宙應用程序閘道器裝置客戶間的連結的一個通訊流程的流程圖。 第13圖為本發明實施例元宇宙虛擬私有網路伺服器裝置客戶的元宇宙虛擬私有網路伺服器的一個通訊流程的流程圖。 第14圖為本發明第三實施例透過雲端網路在元宇宙應用程序閘道器、元宇宙虛擬私有網路伺服器、元宇宙虛擬私有網路伺服器智能裝置客戶及元宇宙應用程序閘道器智能裝置客戶間的節點對節點連結機制的一個通訊流程的流程圖。 第15圖為本發明第三實施例基於伺服器農場、計算機資源聚合及虛擬機伺服器透過雲端網路在元宇宙應用程序閘道器、元宇宙虛擬私有網路伺服器、元宇宙虛擬私有網路伺服器智能裝置客戶及元宇宙應用程序閘道器智能裝置客戶間的節點對節點連結機制的一個通訊流程的流程圖。 第16圖為本發明第三實施例從MVVS_VPN實用程序到MVAG_VPN實用程序的連結及在私有區域網路中元宇宙虛擬私有網路伺服器裝置客戶及元宇宙應用程序閘道器裝置客戶間的連結的一個通訊流程的流程圖。 Figure 1 is a schematic diagram of a traditional cloud network infrastructure according to Embodiment 1 of the present invention. Figure 2 shows an embodiment of the present invention based on session messages in a private cloud routing server, a private cloud callback server, a metaverse network service, a private cloud routing server smart device client, and a private cloud callback server smart device client. A schematic diagram of a cloud network infrastructure for box communication connection mechanism. Figure 3 shows the first embodiment of the present invention based on the Metaverse application gateway, Metaverse virtual private network server, Metaverse network service, Metaverse application gateway smart device client and Metaverse virtual private A schematic diagram of a cloud network infrastructure that connects multiple virtual private network channels between network server smart device clients. Figure 4 shows the second embodiment of the present invention based on the Metaverse application gateway, Metaverse virtual private network server, Metaverse network service, Metaverse application gateway smart device client and Metaverse virtual private A schematic diagram of a cloud network infrastructure that connects multiple virtual private network channels between network server smart device clients. Figure 5 shows an embodiment of the present invention based on a private material gateway, a private cloud virtual private network server, a private network service, a private material gateway smart device client, and a private cloud virtual private network server smart device client. A schematic diagram of a cloud network infrastructure connecting multiple virtual private network channels. Figure 6 shows the third embodiment of the present invention based on the Metaverse application gateway, Metaverse virtual private network server, Metaverse network service, Metaverse application gateway smart device client and Metaverse virtual private A schematic diagram of a cloud network infrastructure that connects multiple virtual private network channels between network server smart device clients. Figure 7 shows the node-to-node connection between the private cloud routing server, the private cloud callback server, the private cloud callback server smart device client and the private cloud routing server smart device client through the cloud network according to an embodiment of the present invention. A flowchart of the communication process of the mechanism. Figure 8 shows an embodiment of the present invention through the cloud network on the Metaverse Application Gateway, the Metaverse Virtual Private Server, the Metaverse Virtual Private Server smart device client and the Metaverse Application Gateway Smart Schematic diagram of a communication process of the node-to-node connection mechanism between device clients. Figure 9 shows an embodiment of the present invention based on the server farm, computer resource aggregation and virtual machine server through the cloud network in the Metaverse application gateway, Metaverse virtual private network server, Metaverse virtual private network server A flow chart of a communication process of the node-to-node connection mechanism between the device smart device client and the Metaverse application gateway smart device client. Figure 10 is a flow chart of a communication process for the public cloud portal management device to register to the public cloud portal according to the embodiment of the present invention. Figure 11 is a flow chart of a communication process of initializing and configuring the Metaverse application gateway management device according to an embodiment of the present invention. Figure 12 is an example of a link from the MVVS_VPN utility to the MVAG_VPN utility and a link between the Metaverse Virtual Private Network Server Device Client and the Metaverse Application Gateway Device Client in the private area network according to an embodiment of the present invention. Flowchart of communication process. Figure 13 is a flow chart of a communication process of the Metaverse Virtual Private Network Server of the Metaverse Virtual Private Network Server device client according to an embodiment of the present invention. Figure 14 shows the third embodiment of the present invention through the cloud network on the Metaverse Application Gateway, the Metaverse Virtual Private Network Server, the Metaverse Virtual Private Network Server smart device client and the Metaverse Application Gateway. A flow chart of a communication process of a node-to-node connection mechanism between intelligent device clients. Figure 15 shows the third embodiment of the present invention based on the server farm, computer resource aggregation and virtual machine server through the cloud network in the Metaverse application gateway, Metaverse virtual private network server, Metaverse virtual private network A flow chart of a communication process of the node-to-node connection mechanism between the road server smart device client and the Metaverse application gateway smart device client. Figure 16 shows the link from the MVVS_VPN utility to the MVAG_VPN utility and the link between the Metaverse virtual private network server device client and the Metaverse application gateway device client in the private area network according to the third embodiment of the present invention. A flow chart of a communication process.

300:公共雲 301, 309, 310, 311, 321: 元宇宙虛擬私有網路伺服器(MVVS)裝置客戶 302, 303:路由器 304, 305:區域網路 306, 307: 元宇宙應用程序閘道器(MVAG)裝置客戶 308: 元宇宙應用程序閘道器 312:公共路由伺服器 313:公共雲伺服器 316:元宇宙虛擬私有網路伺服器 317, 319:公共網路協定地址 318, 320:私有網路協定地址 322, 323, 324, 325:通訊路徑 328:元宇宙網路服務 330:公共雲入口網站 331:虛擬機伺服器 340, 3400:虛擬區域網路 350, 360:實體區域網路 370:元宇宙應用程序 371: MVAG_Device實用程序 372: MVAG_VPN實用程序 373:元宇宙應用程序閘道器(MVAG)管理裝置 374: MVAG_Device實用程序 375:元宇宙虛擬私有網路伺服器區域(Domain_MVVS) 376:元宇宙虛擬私有網路伺服器密碼(Passcode_MVVS) 377:公共雲入口網站(PCP)管理裝置 378:公共雲入口網站(PCP)裝置客戶實用程序 379:元宇宙虛擬私有網路伺服器(MVVS)裝置客戶認證 380:元宇宙虛擬私有網路伺服器(MVVS)伺服器認證 381: MVVS_Device_Client實用程序 382:元宇宙虛擬私有網路伺服器(MVVS)客戶登入 383:元宇宙虛擬私有網路伺服器(MVVS)客戶配置 3710: MVVS_Device實用程序 3720: MVVS_VPN實用程序 300:Public cloud 301, 309, 310, 311, 321: Metaverse Virtual Private Server (MVVS) Device Client 302, 303:Router 304, 305:Local area network 306, 307: Metaverse Application Gateway (MVAG) installation client 308: Metaverse Application Gateway 312:Public routing server 313:Public cloud server 316: Metaverse Virtual Private Network Server 317, 319: Public IP address 318, 320: Private IP address 322, 323, 324, 325: Communication path 328: Yuanverse Network Service 330:Public Cloud Portal 331:Virtual machine server 340, 3400: Virtual LAN 350, 360: Physical area network 370:Metaverse Application 371: MVAG_Device utility 372: MVAG_VPN utility 373: Metaverse Application Gateway (MVAG) Management Device 374: MVAG_Device utility 375: Metaverse Virtual Private Network Server Area (Domain_MVVS) 376: Metaverse Virtual Private Network Server Password (Passcode_MVVS) 377: Public Cloud Portal (PCP) Management Appliance 378: Public Cloud Portal (PCP) Installation Client Utility 379: Metaverse Virtual Private Server (MVVS) Device Client Authentication 380: Metaverse Virtual Private Server (MVVS) Server Certification 381: MVVS_Device_Client utility 382: Metaverse Virtual Private Server (MVVS) customer login 383: Metaverse Virtual Private Server (MVVS) Customer Configuration 3710: MVVS_Device utility 3720: MVVS_VPN utility

Claims (28)

一種用於在一公共雲網路中的一個連結機制的方法,包含有:主從式在一個客戶的伺服器關係中,設定至少一個公共雲入口網站(public cloud portal,PCP)、至少一個虛擬機伺服器(virtual machine server,VMS)、至少一個公共雲入口網站管理裝置、至少一個元宇宙虛擬私有網路(virtual private network,VPN)伺服器(metaverse VPN server,MVVS)、至少一個虛擬私有網路隧道(tunnel)、在該至少一個元宇宙虛擬私有網路伺服器一側的至少一個元宇宙虛擬私有網路伺服器智能裝置客戶以提供複數個基於雲端的網路服務、包含有至少一個私有路由器的至少一個元宇宙應用程序(metaverse application,MA)、至少一個私有區域網路(local area network,LAN)、至少一個元宇宙應用程序閘道器(metaverse application gateway,MVAG)、至少一個元宇宙應用程序閘道器管理裝置、至少一個元宇宙應用程序閘道器網路服務及在一個元宇宙應用程序閘道器私有區域網路一側的至少一個元宇宙應用程序閘道器智能裝置客戶;從該至少一個公共雲入口網站管理裝置的一個公共雲入口網站管理裝置,獲得複數個連結認證;從該至少一個元宇宙應用程序閘道器的一個元宇宙應用程序閘道器,與該至少一個元宇宙虛擬私有網路伺服器的一個元宇宙虛擬私有網路伺服器進行配對及註冊;在該元宇宙虛擬私有網路伺服器及該元宇宙應用程序閘道器間,建立複數個初始虛擬私有網路隧道;在該元宇宙虛擬私有網路伺服器及元宇宙虛擬私有網路伺服器智能裝置客戶間,建立複數個初始虛擬私有網路通道; 將以上兩個虛擬私有網路隧道結合成一個虛擬私有網路隧道,介於一個元宇宙虛擬私有網路伺服器智能裝置客戶,及元宇宙應用程序閘道器之間;以及在該至少一個元宇宙虛擬私有網路伺服器智能裝置客戶及該至少一個元宇宙應用程序閘道器智能裝置客戶、該至少一個元宇宙應用程序閘道器網路服務或另一個元宇宙虛擬私有網路伺服器智能裝置客戶中的一者間,運作(run)複數個垂直節點對節點(peer-to-peer,P2P)私有及安全的元宇宙虛擬私有網路伺服器智能裝置客戶應用程序(application);其中該連結機制是在該至少一個元宇宙虛擬私有網路伺服器智能裝置客戶及該元宇宙應用程序閘道器、該至少一個元宇宙應用程序閘道器智能裝置客戶、該至少一個元宇宙應用程序閘道器網路服務或該另一個元宇宙虛擬私有網路伺服器智能裝置客戶中至少一者間的一個節點對節點私有及安全連結機制;其中該至少一個公共雲入口網站及包含有該至少一個元宇宙虛擬私有網路伺服器的該至少一個虛擬機伺服器位在(reside)該公共雲網路上的一個超大規模資料中心;其中該至少一個元宇宙應用程序連同(along with)該至少一個元宇宙應用程序閘道器位在複數個客戶遠端場所(client’s remote premises)。 A method for a connection mechanism in a public cloud network, comprising: setting up at least one public cloud portal (PCP), at least one virtual server in a client-server relationship in a master-slave manner Virtual machine server (VMS), at least one public cloud portal management device, at least one metaverse virtual private network (VPN) server (metaverse VPN server, MVVS), at least one virtual private network tunnel, at least one Metaverse virtual private network server smart device client on one side of the at least one Metaverse virtual private network server to provide a plurality of cloud-based network services, including at least one private At least one metaverse application (MA) of the router, at least one private area network (LAN), at least one metaverse application gateway (MVAG), at least one metaverse The Application Gateway management device, at least one Metaverse Application Gateway network service and at least one Metaverse Application Gateway smart device client on the one side of a Metaverse Application Gateway private area network; Obtain a plurality of connection authentications from a public cloud portal management device of the at least one public cloud portal management device; and obtain a plurality of connection authentications from a Metaverse application gateway of the at least one Metaverse application gateway, and the at least one Metaverse application gateway. Pairing and registration with a Metaverse Virtual Private Network server of the Metaverse Virtual Private Network server; establishing a plurality of initial Virtual Private Networks between the Metaverse Virtual Private Network server and the Metaverse Application Gateway Network tunnels; establishing a plurality of initial virtual private network channels between the Metaverse Virtual Private Network Server and the Metaverse Virtual Private Network Server smart device clients; Combine the above two virtual private network tunnels into one virtual private network tunnel between a Metaverse virtual private network server smart device client and the Metaverse application gateway; and between the at least one metaverse virtual private network tunnel The Universe Virtual Private Network Server Smart Device Client and the at least one Metaverse Application Gateway Smart Device Client, the at least one Metaverse Application Gateway Network Service or another Metaverse Virtual Private Server Intelligence One of the device clients runs a plurality of vertical peer-to-peer (P2P) private and secure Metaverse virtual private network server smart device client applications; wherein the The linking mechanism is between the at least one Metaverse virtual private network server smart device client and the Metaverse application gateway, the at least one Metaverse application gateway smart device client, the at least one Metaverse application gateway A node-to-node private and secure connection mechanism between at least one of the Taoist Network Services or the other Metaverse Virtual Private Network Server smart device client; wherein the at least one public cloud portal and includes the at least one The at least one virtual machine server of the Metaverse virtual private network server is located in a hyperscale data center on the public cloud network; wherein the at least one Metaverse application is along with the at least one Metaverse application. Universal application gateways are located at multiple client's remote premises. 如請求項1所述的方法,其中該複數個連結認證包含有複數個元宇宙虛擬私有網路伺服器認證及複數個元宇宙虛擬私有網路伺服器客戶認證。 The method of claim 1, wherein the plurality of link authentications include a plurality of Metaverse Virtual Private Network server authentications and a plurality of Metaverse Virtual Private Network server client authentications. 如請求項2所述的方法,其中該至少一個公共雲入口網站被該至 少一個公共雲入口網站管理裝置存取,以登入以及獲得該複數個元宇宙虛擬私有網路伺服器認證及該複數個元宇宙虛擬私有網路伺服器客戶認證。 The method of claim 2, wherein the at least one public cloud portal is accessed by the One less public cloud portal management device has access to log in and obtain metaverse virtual private server authentication and metaverse virtual private server client authentication. 如請求項2所述的方法,其中該複數個元宇宙虛擬私有網路伺服器認證被傳送到該至少一個元宇宙應用程序閘道器管理裝置的一個元宇宙應用程序閘道器管理裝置,以及該複數個元宇宙虛擬私有網路伺服器客戶認證被傳送到該元宇宙虛擬私有網路伺服器智能裝置客戶進行一個連結。 The method of claim 2, wherein the plurality of Metaverse virtual private network server certificates are transmitted to a Metaverse application gateway management device of the at least one Metaverse application gateway management device, and The plurality of Metaverse VPS client certificates are sent to the Metaverse VPS smart device client for a connection. 如請求項2所述的方法,其中該複數個元宇宙虛擬私有網路伺服器認證包含有一個元宇宙虛擬私有網路伺服器虛擬機伺服器區域名稱及一個元宇宙虛擬私有網路伺服器虛擬機伺服器登入密碼,以及該複數個元宇宙虛擬私有網路伺服器客戶認證包含有一個元宇宙虛擬私有網路伺服器智能裝置客戶虛擬私有網路配置文件及一個元宇宙虛擬私有網路伺服器智能裝置客戶虛擬私有網路登入密碼。 The method of claim 2, wherein the plurality of Metaverse Virtual Private Server certificates include a Metaverse Virtual Private Server virtual machine server zone name and a Metaverse Virtual Private Server virtual server domain name. The machine server login password, and the plurality of Metaverse VPN server client authentications include a Metaverse VPN server smart device client VPN profile and a Metaverse VPN server Smart device customer VPN login password. 如請求項2所述的方法,其中該複數個元宇宙虛擬私有網路伺服器認證被該至少一個元宇宙應用程序閘道器管理裝置的一個元宇宙應用程序閘道器管理裝置匯入(import),以設定到該元宇宙應用程序閘道器管理裝置,以便該元宇宙應用程序閘道器管理裝置與該元宇宙虛擬私有網路伺服器進行配對及註冊。 The method of claim 2, wherein the plurality of Metaverse virtual private network server certificates are imported by a Metaverse application gateway management device of the at least one Metaverse application gateway management device. ) to be configured to the Metaverse application gateway management device so that the Metaverse application gateway management device can be paired and registered with the Metaverse virtual private network server. 如請求項1所述的方法,其中在該元宇宙虛擬私有網路伺服器及該元宇宙應用程序閘道器間,建立該複數個初始虛擬私有網路隧道的該步驟包含有: 在該公共雲網路中的該至少一個元宇宙虛擬私有網路伺服器回撥(call back)在該至少一個元宇宙應用程序的一個私有區域網路中的該至少一個元宇宙應用程序閘道器,以啟用(enable)一個第一虛擬私有網路隧道(channel);若該第一虛擬私有網路隧道被該至少一個元宇宙虛擬私有網路伺服器啟用,該至少一個元宇宙應用程序閘道器與該至少一個元宇宙虛擬私有網路伺服器建立一個第一虛擬私有網路隧道;若複數個適當認證被建立,該至少一個元宇宙應用程序閘道器與該至少一個元宇宙虛擬私有網路伺服器啟用一個第三虛擬私有網路隧道;該元宇宙虛擬私有網路伺服器按照需求建立該元宇宙虛擬私有網路伺服器及該元宇宙應用程序閘道器間的一個第三虛擬私有網路隧道,等待按照需求建立該元宇宙虛擬私有網路伺服器智能裝置客戶及該元宇宙虛擬私有網路伺服器間的一個第二虛擬私有網路隧道的一個完成;該元宇宙虛擬私有網路伺服器按照需求啟用該元宇宙虛擬私有網路伺服器及來自網際網路中的一個雲端的該至少一個元宇宙虛擬私有網路伺服器智能裝置客戶間的一個第二虛擬私有網路隧道;以及該至少一個元宇宙虛擬私有網路伺服器智能裝置客戶按照需求建立該元宇宙虛擬私有網路伺服器及該至少一個元宇宙虛擬私有網路伺服器智能裝置客戶間的該第二虛擬私有網路隧道;其中按照需求建立的該第二虛擬私有網路隧道及按照需求建立的該第三虛擬私有網路隧道被合併為該元宇宙虛擬私有網路伺服器智能裝置客戶及該元宇宙應用程序閘道器間透過該元宇宙虛擬私有網路伺服器的一個單一虛擬私有網路隧道,以及該單一虛擬私有網路隧道最終到該至少一個元宇宙應用程序閘道器智能裝置客戶,該至少一個元宇宙應用程序閘道 器網路服務及該另一個元宇宙虛擬私有網路伺服器智能裝置客戶。 The method of claim 1, wherein the step of establishing the plurality of initial virtual private network tunnels between the Metaverse virtual private network server and the Metaverse application gateway includes: The at least one Metaverse virtual private network server in the public cloud network calls back the at least one Metaverse application gateway in a private area network of the at least one Metaverse application server to enable a first virtual private network tunnel (channel); if the first virtual private network tunnel is enabled by the at least one Metaverse virtual private network server, the at least one Metaverse application gateway The gateway establishes a first virtual private network tunnel with the at least one Metaverse virtual private network server; if a plurality of appropriate authentications are established, the at least one Metaverse application gateway with the at least one Metaverse virtual private network server The network server activates a third virtual private network tunnel; the Metaverse virtual private network server establishes a third virtual private network tunnel between the Metaverse virtual private network server and the Metaverse application gateway as required The private network tunnel is waiting for the completion of establishing a second virtual private network tunnel between the Metaverse Virtual Private Network Server smart device client and the Metaverse Virtual Private Network Server as required; the Metaverse Virtual Private Network The network server enables on demand a second virtual private network tunnel between the Metaverse VPN server and the at least one Metaverse VPN server smart device client from a cloud in the Internet ; and the at least one Metaverse virtual private network server smart device client establishes the second virtual private network between the Metaverse virtual private network server and the at least one Metaverse virtual private network server smart device client as required Network tunnel; wherein the second virtual private network tunnel established on demand and the third virtual private network tunnel established on demand are merged into the Metaverse virtual private network server smart device client and the Metaverse application A single virtual private network tunnel between the application gateways through the Metaverse virtual private network server, and the single virtual private network tunnel ultimately to the at least one Metaverse application gateway smart device client, the at least A metaverse application gateway server network service and the other Metaverse virtual private network server smart device customer. 如請求項1所述的方法,其中在該元宇宙虛擬私有網路伺服器及該元宇宙應用程序閘道器間,建立該複數個初始虛擬私有網路隧道的該步驟包含有:在該公共雲網路中的該至少一個元宇宙虛擬私有網路伺服器回撥在該至少一個元宇宙應用程序的一個私有區域網路中的該至少一個元宇宙應用程序閘道器,以啟用一個第一虛擬私有網路隧道;若該第一虛擬私有網路隧道被該至少一個元宇宙虛擬私有網路伺服器啟用,該至少一個元宇宙應用程序閘道器與該至少一個元宇宙虛擬私有網路伺服器建立一個第一虛擬私有網路隧道;該元宇宙虛擬私有網路伺服器按照需求啟用該元宇宙虛擬私有網路伺服器及來自網際網路中的一個雲端的該至少一個元宇宙虛擬私有網路伺服器智能裝置客戶間的一個第二虛擬私有網路隧道;以及該至少一個元宇宙虛擬私有網路伺服器智能裝置客戶按照需求建立該元宇宙虛擬私有網路伺服器及該至少一個元宇宙虛擬私有網路伺服器智能裝置客戶間的該第二虛擬私有網路隧道;其中該第一虛擬私有網路隧道及按照需求建立的該第二虛擬私有網路隧道被合併為該元宇宙虛擬私有網路伺服器智能裝置客戶及該元宇宙應用程序閘道器間透過該元宇宙虛擬私有網路伺服器的一個單一虛擬私有網路隧道,以及該單一虛擬私有網路隧道最終到該至少一個元宇宙應用程序閘道器智能裝置客戶,該至少一個元宇宙應用程序閘道器網路服務及該另一個元宇宙虛擬私有網路伺服器智能裝置客戶。 The method of claim 1, wherein the step of establishing the plurality of initial virtual private network tunnels between the Metaverse virtual private network server and the Metaverse application gateway includes: The at least one Metaverse virtual private network server in the cloud network dials back the at least one Metaverse application gateway in a private area network of the at least one Metaverse application to enable a first Virtual private network tunnel; if the first virtual private network tunnel is enabled by the at least one Metaverse virtual private network server, the at least one Metaverse application gateway and the at least one Metaverse virtual private network server The server establishes a first virtual private network tunnel; the metaverse virtual private network server activates the metaverse virtual private network server and the at least one metaverse virtual private network from a cloud in the Internet on demand a second virtual private network tunnel between the server smart device clients; and the at least one Metaverse virtual private network server smart device client establishes the Metaverse virtual private network server and the at least one Metaverse virtual private network server as required The second virtual private network tunnel between virtual private network server smart device clients; wherein the first virtual private network tunnel and the second virtual private network tunnel established on demand are merged into the metaverse virtual private network A single virtual private network tunnel between the network server smart device client and the metaverse application gateway through the metaverse virtual private network server, and the single virtual private network tunnel ultimately to the at least one metaverse The universe application gateway smart device client, the at least one Metaverse application gateway network service and the other Metaverse virtual private network server smart device client. 如請求項1所述的方法,其中透過該元宇宙虛擬私有網路伺服器,在該元宇宙虛擬私有網路伺服器智能裝置客戶及該元宇宙應用程序閘道器間,按照需求連接到該元宇宙應用程序閘道器的該步驟包含有:透過一個元宇宙虛擬私有網路伺服器虛擬私有網路客戶配置,該至少一個元宇宙虛擬私有網路伺服器智能裝置客戶啟動用於連接到該至少一個元宇宙虛擬私有網路伺服器的一個請求,以按照需求建立一個第二虛擬私有網路隧道,以防在該至少一個元宇宙應用程序的一個私有區域網路中,該至少一個元宇宙虛擬私有網路伺服器智能裝置客戶試圖存取該至少一個元宇宙應用程序閘道器智能裝置客戶或一個元宇宙網路服務(metaverse network service,MVNS)。 The method as described in claim 1, wherein through the Metaverse Virtual Private Network Server, between the Metaverse Virtual Private Network Server smart device client and the Metaverse Application Gateway, connect to the Metaverse Virtual Private Network Server as required. This step of the Metaverse Application Gateway includes: configuring through a Metaverse VPN Server VPN client, the at least one Metaverse VPN Server smart device client enabling to connect to the A request from at least one Metaverse virtual private network server to establish a second virtual private network tunnel on demand in case the at least one Metaverse application The virtual private network server smart device client attempts to access the at least one metaverse application gateway smart device client or a metaverse network service (MVNS). 如請求項1所述的方法,其中在該至少一個元宇宙虛擬私有網路伺服器智能裝置客戶及該至少一個元宇宙應用程序閘道器智能裝置客戶、該至少一個元宇宙應用程序閘道器網路服務或該另一個元宇宙虛擬私有網路伺服器智能裝置客戶中的該者間,運作該複數個垂直節點對節點私有及安全的元宇宙虛擬私有網路伺服器智能裝置客戶應用程序的該步驟包含有:在該公共雲網路中的該元宇宙虛擬私有網路伺服器智能裝置客戶作為一個訪客與一個主機元宇宙虛擬私有網路伺服器智能裝置客戶加入一個私有及安全的通訊會話;其中該元宇宙虛擬私有網路伺服器智能裝置客戶可在一個區域網路模式中存取,該存取用於來自該至少一個元宇宙虛擬私有網路伺服器智能裝置客戶的一個虛擬私有網路連結;其中該私有及安全的通訊會話包含有一影像、一語音、一文本或一應用程序中至少一者,以及該應用程序包含有該元宇宙虛擬私有網路伺服器智能 裝置客戶及該主機元宇宙虛擬私有網路伺服器智能裝置客戶可識別的一個程式(program)、一實用程序(utility)、一運作(operation)或一交易(transaction);其中該至少一個元宇宙應用程序閘道器智能裝置客戶連同在該至少一個元宇宙應用程序閘道器的一個私有區域網路上的該至少一個元宇宙應用程序閘道器網路服務可在該區域網路模式中存取,該存取用於來自該至少一個元宇宙虛擬私有網路伺服器智能裝置客戶的該虛擬私有網路連結。 The method of claim 1, wherein in the at least one Metaverse virtual private network server smart device client and the at least one Metaverse application gateway smart device client, the at least one Metaverse application gateway Between the network service or the other one of the Metaverse Virtual Private Network Server Smart Device Clients, operating the plurality of vertical node-to-node private and secure Metaverse Virtual Private Network Server Smart Device Client applications The step includes: joining a private and secure communication session as a guest with a host Metaverse VPN server smart device client in the public cloud network. ; wherein the Metaverse Virtual Private Network Server Smart Device Client is accessible in a local area network mode, the access being for a Virtual Private Network from the at least one Metaverse Virtual Private Network Server Smart Device Client link; wherein the private and secure communication session includes at least one of an image, a voice, a text, or an application, and the application includes the Metaverse Virtual Private Network Server Intelligence A program, a utility, an operation or a transaction identifiable by the device client and the host Metaverse virtual private network server smart device client; wherein the at least one Metaverse Application gateway smart device clients may access the at least one Metaverse application gateway network service in the LAN mode along with the at least one Metaverse application gateway network service on a private local area network of the at least one Metaverse application gateway , the access is for the virtual private network connection from the at least one Metaverse virtual private network server smart device client. 如請求項10所述的方法,其中當該至少一個元宇宙虛擬私有網路伺服器智能裝置客戶及該另一個元宇宙虛擬私有網路伺服器智能裝置客戶間的該複數個垂直節點對節點私有及安全的元宇宙虛擬私有網路伺服器智能裝置客戶應用程序被運作時,該應用程序是包含有該元宇宙虛擬私有網路伺服器智能裝置客戶及該主機元宇宙虛擬私有網路伺服器智能裝置客戶可識別的一個程式、一實用程序、一運作或一交易的一個加密(crypto)貨幣(currency)應用程序。 The method of claim 10, wherein when the plurality of vertical nodes between the at least one Metaverse virtual private network server smart device client and the another Metaverse virtual private network server smart device client are private to the node When the secure Metaverse Virtual Private Network Server Smart Device Client application is run, the application includes the Metaverse Virtual Private Network Server Smart Device Client and the host Metaverse Virtual Private Network Server Smart Device A cryptocurrency application that installs a program, a utility, an operation, or a transaction that is identifiable to the client. 如請求項10所述的方法,其中當該至少一個元宇宙虛擬私有網路伺服器智能裝置客戶及該另一個元宇宙虛擬私有網路伺服器智能裝置客戶間的該複數個垂直節點對節點私有及安全的元宇宙虛擬私有網路伺服器智能裝置客戶應用程序被運作時,該元宇宙虛擬私有網路伺服器按照需求被設定,以在存取一個線上內容(on-line content)時提供一地理封鎖(geo-blocking)、一地理入口網站(geo-portal)或一地理住家(geo-home)間的複數個選擇。 The method of claim 10, wherein when the plurality of vertical nodes between the at least one Metaverse virtual private network server smart device client and the another Metaverse virtual private network server smart device client are private to the node When the secure Metaverse Virtual Private Network Server smart device client application is run, the Metaverse Virtual Private Network Server is configured as required to provide a Multiple choices between geo-blocking, a geo-portal or a geo-home. 如請求項1所述的方法,其中該至少一個公共雲入口網站包含有:一個網際網路服務;以及一個程式,用於執行儲存在記憶體中的指令,以指示該至少一個公共雲入口網站執行以下運作:創造及管理一個授權客戶列表,以容納該至少一個公共雲入口網站管理裝置;創造及管理包含有複數個元宇宙虛擬私有網路伺服器認證及複數個元宇宙虛擬私有網路伺服器客戶認證的該複數個連結認證;以及執行(conduct)從該公共雲入口網站管理裝置,獲得該複數個連結認證的該步驟。 The method of claim 1, wherein the at least one public cloud portal includes: an Internet service; and a program for executing instructions stored in the memory to instruct the at least one public cloud portal Perform the following operations: create and manage a list of authorized customers to accommodate the at least one public cloud portal management device; create and manage a plurality of Metaverse virtual private network server certificates and a plurality of Metaverse virtual private network servers The plurality of connection authentications for server client authentication; and executing (conducting) the step of obtaining the plurality of connection authentications from the public cloud portal management device. 如請求項1所述的方法,其中該至少一個虛擬機伺服器包含有:一個網際網路服務;以及一個程式,用於執行儲存在記憶體中的指令,以指示該至少一個虛擬機伺服器執行以下運作:創造及管理一個授權客戶列表,以容納該至少一個公共雲入口網站管理裝置、該至少一個元宇宙應用程序閘道器及該至少一個元宇宙虛擬私有網路伺服器;以及管理該元宇宙虛擬私有網路伺服器及該元宇宙虛擬私有網路伺服器智能裝置客戶間的一個通訊。 The method of claim 1, wherein the at least one virtual machine server includes: an Internet service; and a program for executing instructions stored in the memory to instruct the at least one virtual machine server Perform the following operations: create and manage a list of authorized customers to accommodate the at least one public cloud portal management device, the at least one Metaverse application gateway, and the at least one Metaverse virtual private network server; and manage the at least one Metaverse virtual private network server A communication between the Metaverse Virtual Private Network Server and the Smart Device Client of the Metaverse Virtual Private Network Server. 如請求項1所述的方法,其中該至少一個公共雲入口網站管理裝置包含有:一個計算裝置; 到一個網路的一個連結;以及一個程式,用於執行儲存在記憶體中的指令,以指示該至少一個公共雲入口網站管理裝置執行以下運作:建立運作在一個區域網路模式中的一個第一網路服務;根據網際網路協定,建立一個第二網路服務;根據一個產業標準網路協定,建立一個第三網路服務;以及執行從該公共雲入口網站管理裝置,獲得該複數個連結認證的該步驟。 The method of claim 1, wherein the at least one public cloud portal management device includes: a computing device; a link to a network; and a program for executing instructions stored in memory to instruct the at least one public cloud portal management device to: create a first network operating in a local area network mode a network service; establishing a second network service in accordance with the Internet protocol; establishing a third network service in accordance with an industry standard network protocol; and executing the public cloud portal management device to obtain the plurality of This step of link authentication. 如請求項1所述的方法,其中該至少一個元宇宙虛擬私有網路伺服器包含有:一個計算裝置;到一個網路的一個連結;以及一個程式,用於執行儲存在記憶體中的指令,以指示該至少一個元宇宙虛擬私有網路伺服器執行以下運作:透過至少一個虛擬私有網路連結,創造及管理一個第一授權客戶列表,以容納該至少一個元宇宙虛擬私有網路伺服器智能裝置客戶;透過該至少一個虛擬私有網路連結,創造及管理一個第二授權客戶列表,以容納該至少一個元宇宙應用程序閘道器;執行從該元宇宙應用程序閘道器,與該元宇宙虛擬私有網路伺服器進行配對及註冊的該步驟;執行在該元宇宙虛擬私有網路伺服器及該元宇宙應用程序閘道器間,建立該複數個初始虛擬私有網路隧道的該步驟;以及執行透過該元宇宙虛擬私有網路伺服器,在該元宇宙虛擬私有網路伺服器智能裝置客戶及該元宇宙應用程序閘道器間,按照需求連接到該 元宇宙應用程序閘道器的該步驟。 The method of claim 1, wherein the at least one Metaverse virtual private network server includes: a computing device; a link to a network; and a program for executing instructions stored in the memory , to instruct the at least one Metaverse virtual private network server to perform the following operations: create and manage a first authorized client list through at least one virtual private network link to accommodate the at least one Metaverse virtual private network server Smart device client; create and manage a second authorized client list to accommodate the at least one Metaverse application gateway through the at least one virtual private network link; execute from the Metaverse application gateway, and the The step of pairing and registering the Metaverse Virtual Private Network Server; executing the step of establishing the plurality of initial Virtual Private Network tunnels between the Metaverse Virtual Private Network Server and the Metaverse Application Gateway Steps; and execute through the Metaverse Virtual Private Network Server, between the Metaverse Virtual Private Network Server smart device client and the Metaverse Application Gateway, connect to the Metaverse Virtual Private Network Server as required. This step for the Metaverse Application Gateway. 如請求項1所述的方法,其中該至少一個元宇宙虛擬私有網路伺服器智能裝置客戶包含有:一個計算裝置;到一個網路的一個連結;以及一個程式,用於執行儲存在記憶體中的指令,以指示該至少一個元宇宙虛擬私有網路伺服器智能裝置客戶執行以下運作:根據網際網路協定,建立一個第一網路服務;根據一個產業標準網路協定,建立一個第二網路服務;透過一個虛擬私有網路連結,與該至少一個虛擬機伺服器及該至少一個元宇宙虛擬私有網路伺服器,創造及管理一個網際網路連結;透過該虛擬私有網路連結,與該至少一個元宇宙應用程序閘道器智能裝置客戶,創造及管理一個連結;執行透過該元宇宙虛擬私有網路伺服器,在該元宇宙虛擬私有網路伺服器智能裝置客戶及該元宇宙應用程序閘道器間,按照需求連接到該元宇宙應用程序閘道器的該步驟;以及執行在該至少一個元宇宙虛擬私有網路伺服器智能裝置客戶及該至少一個元宇宙應用程序閘道器智能裝置客戶、該至少一個元宇宙應用程序閘道器網路服務或該另一個元宇宙虛擬私有網路伺服器智能裝置客戶中的該者間,運作該複數個垂直節點對節點私有及安全的元宇宙虛擬私有網路伺服器智能裝置客戶應用程序的該步驟。 The method of claim 1, wherein the at least one Metaverse virtual private network server smart device client includes: a computing device; a link to a network; and a program for executing stored in the memory instructions in to instruct the at least one Metaverse virtual private network server smart device client to perform the following operations: establish a first network service in accordance with the Internet protocol; establish a second network service in accordance with an industry standard network protocol Network services; creating and managing an Internet connection with the at least one virtual machine server and the at least one Metaverse virtual private network server through a virtual private network link; through the virtual private network link, Create and manage a connection with the at least one Metaverse application gateway smart device client; execute through the Metaverse virtual private network server, between the Metaverse virtual private network server smart device client and the Metaverse Between the application gateway, the step of connecting to the Metaverse application gateway as required; and executing the step between the at least one Metaverse virtual private network server smart device client and the at least one Metaverse application gateway Operate the plurality of vertical nodes privately and securely between the server smart device client, the at least one Metaverse application gateway network service, or the other Metaverse virtual private network server smart device client. This step of the Metaverse VPN Server smart device client application. 如請求項1所述的方法,其中該至少一個元宇宙應用程序包含有: 一個網際網路路由器;至少一個私有區域網路;至少一個元宇宙網路服務;該至少一個元宇宙應用程序閘道器智能裝置客戶;以及該至少一個元宇宙應用程序閘道器。 The method as described in request item 1, wherein the at least one Metaverse application includes: An Internet router; at least one private area network; at least one Metaverse network service; the at least one Metaverse application gateway smart device client; and the at least one Metaverse application gateway. 如請求項1所述的方法,其中該至少一個元宇宙應用程序閘道器包含有:一個計算裝置;到一個網路的一個連結;以及一個程式,用於執行儲存在記憶體中的指令,以指示該至少一個元宇宙應用程序閘道器執行以下運作:透過一個虛擬私有網路連結,創造及管理一個授權客戶列表,以容納該至少一個元宇宙虛擬私有網路伺服器;執行從該元宇宙應用程序閘道器,與該元宇宙虛擬私有網路伺服器進行配對及註冊的該步驟;執行在該元宇宙虛擬私有網路伺服器及該元宇宙應用程序閘道器間,建立該複數個初始虛擬私有網路隧道的該步驟;執行透過該元宇宙虛擬私有網路伺服器,在該元宇宙虛擬私有網路伺服器智能裝置客戶及該元宇宙應用程序閘道器間,按照需求連接到該元宇宙應用程序閘道器的該步驟;以及執行在該至少一個元宇宙虛擬私有網路伺服器智能裝置客戶及該至少一個元宇宙應用程序閘道器智能裝置客戶、該至少一個元宇宙應用程序閘道器網路服務或該另一個元宇宙虛擬私有網路伺服器智能裝置 客戶中的該者間,運作該複數個垂直節點對節點私有及安全的元宇宙虛擬私有網路伺服器智能裝置客戶應用程序的該步驟。 The method of claim 1, wherein the at least one Metaverse application gateway includes: a computing device; a link to a network; and a program for executing instructions stored in the memory, To instruct the at least one Metaverse application gateway to perform the following operations: create and manage a list of authorized clients to accommodate the at least one Metaverse virtual private network server through a virtual private network link; perform the following operations from the metaverse virtual private network server: The step of pairing and registering the Metaverse Application Gateway with the Metaverse Virtual Private Network Server; executing the step of establishing the plurality between the Metaverse Virtual Private Network Server and the Metaverse Application Gateway This step of an initial VPN tunnel; executing through the Metaverse VPN server, connecting on demand between the Metaverse VPN server smart device client and the Metaverse application gateway The step to the Metaverse Application Gateway; and executing on the at least one Metaverse Virtual Private Network Server smart device client and the at least one Metaverse Application Gateway smart device client, the at least one Metaverse Application Gateway Network Service or the other Metaverse Virtual Private Network Server smart device The step of running the plurality of vertical node-to-node private and secure Metaverse virtual private network server smart device client applications among the clients. 如請求項1所述的方法,其中該至少一個元宇宙應用程序閘道器網路服務包含有:第一網路服務,運作在一個區域網路模式中,因為有一個產業認可的(recognized)虛擬私有網路隧道的強度而得以避免外部的監控及記錄;第二網路服務,基於網際網路的一個協定;第三網路服務,基於一個產業標準網路的協定;第四網路服務,該第四網路服務與週邊平台無關,同時與所有現存碎片化的(fragmented)物聯網(Internet of Things,IoT)裝置相容;以及第五網路服務,基於透過該元宇宙虛擬私有網路伺服器,在該元宇宙虛擬私有網路伺服器智能裝置客戶及該元宇宙應用程序閘道器間,按照需求連接到該元宇宙應用程序閘道器。 The method of claim 1, wherein the at least one Metaverse application gateway network service includes: a first network service operating in a local area network mode because there is an industry recognized (recognized) The strength of the virtual private network tunnel prevents external monitoring and recording; the second network service is based on a protocol of the Internet; the third network service is based on an industry standard network protocol; the fourth network service , the fourth network service is independent of peripheral platforms and compatible with all existing fragmented Internet of Things (IoT) devices; and the fifth network service is based on the Metaverse Virtual Private Network A path server, between the Metaverse virtual private network server smart device client and the Metaverse application gateway, connects to the Metaverse application gateway as required. 如請求項1所述的方法,其中該至少一個元宇宙應用程序閘道器智能裝置客戶包含有:一個計算裝置;到一個網路的一個連結;以及一個程式,用於執行儲存在記憶體中的指令,以指示該至少一個元宇宙應用程序閘道器智能裝置客戶執行以下運作:建立運作在一個區域網路模式中的一個第一網路服務;根據網際網路協定,建立一個第二網路服務;根據一個產業標準網路協定,建立一個第三網路服務; 執行透過該元宇宙虛擬私有網路伺服器,在該元宇宙虛擬私有網路伺服器智能裝置客戶及該元宇宙應用程序閘道器間,按照需求連接到該元宇宙應用程序閘道器的該步驟;以及執行在該至少一個元宇宙虛擬私有網路伺服器智能裝置客戶及該至少一個元宇宙應用程序閘道器智能裝置客戶間,運作該複數個垂直節點對節點私有及安全的元宇宙虛擬私有網路伺服器智能裝置客戶應用程序的該步驟。 The method of claim 1, wherein the at least one Metaverse Application Gateway smart device client includes: a computing device; a link to a network; and a program for executing stored in memory instructions to instruct the at least one Metaverse Application Gateway smart device client to perform the following operations: establish a first network service operating in a local area network mode; establish a second network service in accordance with the Internet Protocol network service; establishing a third network service based on an industry standard network protocol; Execute through the Metaverse Virtual Private Network Server, between the Metaverse Virtual Private Network Server smart device client and the Metaverse Application Gateway, connecting to the Metaverse Application Gateway as required Steps; and executing the plurality of vertical node-to-node private and secure Metaverse virtual devices between the at least one Metaverse virtual private network server smart device client and the at least one Metaverse application gateway smart device client. This step of the private web server smart device client application. 如請求項1所述的方法,其中該至少一個元宇宙應用程序閘道器管理裝置包含有:一個計算裝置;到一個網路的一個連結;以及一個程式,用於執行儲存在記憶體中的指令,以指示該至少一個元宇宙應用程序閘道器管理裝置執行以下運作:建立運作在一個區域網路模式中的一個第一網路服務;根據網際網路協定,建立一個第二網路服務;根據一個產業標準網路協定,建立一個第三網路服務;以及執行從該元宇宙應用程序閘道器,與該元宇宙虛擬私有網路伺服器進行配對及註冊的該步驟。 The method of claim 1, wherein the at least one Metaverse application gateway management device includes: a computing device; a link to a network; and a program for executing a program stored in the memory. Instructions to instruct the at least one Metaverse application gateway management device to perform the following operations: establish a first network service operating in a local area network mode; establish a second network service in accordance with the Internet Protocol ; Establishing a third network service based on an industry standard network protocol; and performing the steps of pairing and registering from the Metaverse application gateway with the Metaverse virtual private network server. 如請求項1所述的方法,其中該至少一個虛擬私有網路隧道包含有:基於網際網路協定的至少一個第一網路服務;基於一個產業標準網路協定的至少一個第二網路服務; 在一個通訊中的一個隱私及一個安全性,以及該通訊中一個防過時的交互運作(interoperability)及兼容性(compatibility);通過該至少一個虛擬私有網路隧道的一個區域網路模式存取;在該元宇宙虛擬私有網路伺服器及該元宇宙應用程序閘道器間的該複數個初始虛擬私有網路隧道的至少一個第一虛擬私有網路隧道;以及透過該元宇宙虛擬私有網路伺服器,在該元宇宙虛擬私有網路伺服器智能裝置客戶及該元宇宙應用程序閘道器間的至少一個第二虛擬私有網路隧道。 The method of claim 1, wherein the at least one virtual private network tunnel includes: at least one first network service based on Internet Protocol; at least one second network service based on an industry standard network protocol ; A privacy and a security in a communication, and an anti-obsolescence interoperability and compatibility in the communication; a LAN mode access through the at least one virtual private network tunnel; at least one first virtual private network tunnel of the plurality of initial virtual private network tunnels between the metaverse virtual private network server and the metaverse application gateway; and through the metaverse virtual private network Server, at least one second virtual private network tunnel between the metaverse virtual private network server smart device client and the metaverse application gateway. 一種用於透過一公共雲網路在至少一個元宇宙虛擬私有網路(virtual private network,VPN)伺服器(metaverse VPN server,MVVS)智能裝置客戶及至少一個元宇宙應用程序閘道器(metaverse application gateway,MVAG)智能裝置客戶或至少一個元宇宙應用程序閘道器網路服務中的一者間的一個連結機制的方法,包含有:按照需求,在元宇宙虛擬私有網路伺服器智能裝置客戶及元宇宙虛擬私有網路伺服器之間,建立一個虛擬私有網路隧道;在元宇宙虛擬私有網路伺服器及元宇宙應用程序閘道器之間,建立一個虛擬私有網路隧道;將以上兩個虛擬私有網路隧道結合成一個虛擬私有網路隧道,介於一個元宇宙虛擬私有網路伺服器智能裝置客戶,及元宇宙應用程序閘道器之間;以及在該至少一個元宇宙虛擬私有網路伺服器智能裝置客戶及該至少一個元宇宙應用程序閘道器智能裝置客戶、該至少一個元宇宙應用程序閘道器網路服務或另一個元宇宙虛擬私有網路伺服器智能裝置客戶中的一者間, 運作(run)複數個垂直節點對節點(peer-to-peer,P2P)私有及安全的元宇宙虛擬私有網路伺服器智能裝置客戶應用程序(application);其中透過該公共雲網路,該至少一個元宇宙虛擬私有網路伺服器智能裝置客戶及該至少一個元宇宙應用程序閘道器智能裝置客戶、該至少一個元宇宙應用程序閘道器網路服務或另一個元宇宙虛擬私有網路伺服器智能裝置客戶中的該者進行私密及安全的通訊。 A method for connecting at least one metaverse virtual private network (VPN) server (metaverse VPN server, MVVS) smart device client and at least one metaverse application gateway (metaverse application) through a public cloud network gateway, MVAG) smart device client or at least one of the Metaverse application gateway network services, including: on demand, in the Metaverse virtual private network server smart device client Establish a virtual private network tunnel between the Metaverse Virtual Private Network Server and the Metaverse Virtual Private Network Server; establish a virtual private network tunnel between the Metaverse Virtual Private Network Server and the Metaverse Application Gateway; combine the above Two virtual private network tunnels are combined into one virtual private network tunnel between a Metaverse virtual private network server smart device client and the Metaverse application gateway; and between the at least one Metaverse virtual private network tunnel Private network server smart device client and the at least one Metaverse application gateway smart device client, the at least one Metaverse application gateway network service or another Metaverse virtual private network server smart device client one of the rooms, Run multiple vertical peer-to-peer (P2P) private and secure Metaverse virtual private network server smart device client applications; among which, through the public cloud network, the at least A Metaverse virtual private network server smart device client and the at least one Metaverse application gateway smart device client, the at least one Metaverse application gateway network service or another Metaverse virtual private network server Communicate privately and securely with that person among the client's smart device clients. 一種非暫時性計算機可讀介質,用於存儲可執行的指令,該可執行的指令促使一計算機執行以下運作,以回應執行:主從式在一個客戶的伺服器關係中,設定一個元宇宙虛擬私有網路(virtual private network,VPN)伺服器(metaverse VPN server,MVVS)及一個元宇宙虛擬私有網路伺服器智能裝置客戶;執行(conduct)在該元宇宙虛擬私有網路伺服器及一個元宇宙應用程序閘道器(metaverse app gateway,PMGMVAG)間,建立複數個初始虛擬私有網路隧道;執行在該元宇宙虛擬私有網路伺服器及一個元宇宙虛擬私有網路伺服器智能裝置客戶間,建立複數個初始虛擬私有網路隧道;以及將以上兩個虛擬私有網路隧道結合成一個虛擬私有網路隧道,介於一個元宇宙虛擬私有網路伺服器智能裝置客戶,及元宇宙應用程序閘道器之間;其中在一個公共雲網路中,該元宇宙虛擬私有網路伺服器包含有一個MVVS_Device實用程序(utility)。 A non-transitory computer-readable medium for storing executable instructions that cause a computer to perform the following operations in response to execution: Master-slave setting up a Metaverse virtual world in a client-server relationship Private network (virtual private network, VPN) server (metaverse VPN server, MVVS) and a metaverse virtual private network server smart device client; execution (conduct) on the metaverse virtual private network server and a metaverse virtual private network server Establish a plurality of initial virtual private network tunnels between the metaverse app gateway (PMMGMVAG); execute between the metaverse virtual private network server and a metaverse virtual private network server smart device client , establish a plurality of initial virtual private network tunnels; and combine the above two virtual private network tunnels into one virtual private network tunnel, between a Metaverse virtual private network server smart device client, and the Metaverse application Between gateways; in a public cloud network, the Metaverse Virtual Private Network Server contains an MVVS_Device utility. 一種非暫時性計算機可讀介質,用於存儲可執行的指令,該可執行的指令促使一計算機執行以下運作,以回應執行: 主從式在一個客戶的伺服器關係中,設定一個元宇宙虛擬私有網路(virtual private network,VPN)伺服器(metaverse VPN server,MVVS)及一個元宇宙應用程序閘道器(metaverse application gateway,MVAG);執行(conduct)從該元宇宙應用程序閘道器,與該元宇宙虛擬私有網路伺服器進行配對及註冊;執行在該元宇宙虛擬私有網路伺服器及該元宇宙應用程序閘道器間,建立該複數個初始虛擬私有網路隧道;執行在該元宇宙虛擬私有網路伺服器及元宇宙虛擬私有網路伺服器智能裝置客戶間,建立該複數個初始虛擬私有網路隧道;將以上兩個虛擬私有網路隧道結合成一個虛擬私有網路隧道,介於一個元宇宙虛擬私有網路伺服器智能裝置客戶,及元宇宙應用程序閘道器之間;以及執行在至少一個元宇宙虛擬私有網路伺服器智能裝置客戶及該至少一個元宇宙應用程序閘道器智能裝置客戶、至少一個元宇宙應用程序閘道器網路服務或另一個元宇宙虛擬私有網路伺服器智能裝置客戶中的一者間,運作(run)複數個垂直節點對節點(peer-to-peer,P2P)私有及安全的元宇宙虛擬私有網路伺服器智能裝置客戶應用程序(application)。 A non-transitory computer-readable medium for storing executable instructions that cause a computer to perform the following operations, in response to execution: The master-slave mode sets up a metaverse virtual private network (VPN) server (metaverse VPN server, MVVS) and a metaverse application gateway (metaverse application gateway) in a client's server relationship. MVAG); execute (conduct) from the Metaverse Application Gateway to pair and register with the Metaverse Virtual Private Network Server; execute (conduct) between the Metaverse Virtual Private Network Server and the Metaverse Application Gate Establish the plurality of initial virtual private network tunnels between the containers; execute the establishment of the plurality of initial virtual private network tunnels between the metaverse virtual private network server and the metaverse virtual private network server smart device client ; Combine the above two virtual private network tunnels into one virtual private network tunnel between a Metaverse virtual private network server smart device client and the Metaverse application gateway; and execute on at least one Metaverse Virtual Private Network Server Smart Device Client and the at least one Metaverse Application Gateway Smart Device Client, at least one Metaverse Application Gateway Network Service or another Metaverse Virtual Private Network Server Intelligence One of the device clients runs multiple vertical peer-to-peer (P2P) private and secure Metaverse virtual private network server smart device client applications. 一種用於通訊的方法,包含有:主從式在一個客戶的伺服器關係中,設定至少一個虛擬機伺服器(virtual machine server,VMS)、至少一個元宇宙虛擬私有網路(virtual private network,VPN)伺服器(metaverse VPN server,MVVS)、在該至少一個元宇宙虛擬私有網路伺服器一側的至少一個元宇宙虛擬私有網路伺服器智能裝置客戶以提供複數個基於雲端的網路服務、至少一個元宇宙應 用程序閘道器(metaverse application gateway,MVAG)及在該至少一個元宇宙應用程序閘道器一側的至少一個元宇宙應用程序閘道器智能裝置客戶;其中該至少一個虛擬機伺服器包含有該至少一個元宇宙虛擬私有網路伺服器,以提供該複數個基於雲端的網路服務;其中該至少一個虛擬機伺服器及該至少一個元宇宙虛擬私有網路伺服器位在(reside)一個超大規模資料中心,以及該至少一個元宇宙應用程序閘道器位在複數個元宇宙提供者的應用程序環境(metaverse provider’s application environments);其中在數量及尺寸上,該至少一個虛擬機伺服器可擴展(scalable);其中在複數個對應的虛擬機伺服器中,該超大規模資料中心及一個服務提供者中至少一者建造及配置複數個獨立元宇宙虛擬私有網路伺服器,以服務複數個對應的元宇宙應用程序閘道器及複數個對應的元宇宙應用程序閘道器智能裝置客戶;其中該至少一個元宇宙虛擬私有網路伺服器智能裝置客戶及該至少一個元宇宙應用程序閘道器智能裝置客戶間的一個節點對節點(peer-to-peer,P2P)通訊關係的一個團體配對(community pair)被維持該至少一個虛擬機伺服器的一個網際網路元宇宙提供者建造及部署;其中該網際網路元宇宙提供者提供給元宇宙提供者,主持(host)在該至少一個虛擬機伺服器中的該元宇宙虛擬私有網路伺服器;其中該網際網路元宇宙提供者提供一個單獨私有及安全的元宇宙應用程序閘道器到該元宇宙提供者,以安裝(install)該元宇宙應用程序閘道器在該元宇宙提供者的區域網路中;其中一個元宇宙訂閱者位在(reside)元宇宙提供者私有及安全的區域網路 中,從任何地方建立在該至少一個元宇宙虛擬私有網路伺服器智能裝置客戶及該至少一個元宇宙應用程序閘道器智能裝置客戶間的一個節點對節點通訊。 A method for communication, including: setting up at least one virtual machine server (VMS) and at least one Metaverse virtual private network (virtual private network) in a client-server relationship in a master-slave manner. VPN) server (metaverse VPN server, MVVS), at least one metaverse virtual private network server smart device client on the at least one metaverse virtual private network server side to provide a plurality of cloud-based network services , at least one metaverse should A metaverse application gateway (MVAG) and at least one metaverse application gateway smart device client on one side of the at least one metaverse application gateway; wherein the at least one virtual machine server includes The at least one Metaverse virtual private network server is used to provide the plurality of cloud-based network services; wherein the at least one virtual machine server and the at least one Metaverse virtual private network server are located in (reside) a Hyperscale data center, and the at least one Metaverse application gateway is located in a plurality of Metaverse provider's application environments (metaverse provider's application environments); wherein the at least one virtual machine server can be in number and size Scalable; wherein in a plurality of corresponding virtual machine servers, at least one of the hyperscale data center and a service provider builds and configures a plurality of independent metaverse virtual private network servers to serve a plurality of The corresponding Metaverse Application Gateway and a plurality of corresponding Metaverse Application Gateway smart device clients; wherein the at least one Metaverse Virtual Private Network Server smart device client and the at least one Metaverse Application Gateway A community pair of a peer-to-peer (P2P) communication relationship between intelligent device clients is built and deployed by an Internet Metaverse provider that maintains the at least one virtual machine server ; wherein the Internet Metaverse provider provides to the Metaverse provider, the Metaverse virtual private network server hosted in the at least one virtual machine server; wherein the Internet Metaverse provider Providing a single private and secure Metaverse Application Gateway to the Metaverse Provider to install the Metaverse Application Gateway in the Metaverse Provider's local network; one of the Metaverse Providers Subscribers are located on the Metaverse provider's private and secure LAN Establishing a node-to-node communication between the at least one Metaverse virtual private network server smart device client and the at least one Metaverse application gateway smart device client from anywhere. 一種非暫時性計算機可讀介質,用於存儲可執行的指令,該可執行的指令促使一計算機執行以下運作,以回應執行:主從式在一個客戶的伺服器關係中,設定至少一個元宇宙應用程序閘道器(metaverse application gateway,MVAG)智能裝置客戶及一個元宇宙虛擬私有網路(virtual private network,VPN)伺服器(metaverse VPN server,MVVS)智能裝置客戶應用程序(application);其中該元宇宙虛擬私有網路伺服器智能裝置客戶應用程序包含有在一個公共雲網路中的一個應用實用程序(utility);其中該至少一個元宇宙應用程序閘道器智能裝置客戶的一個功能(functionality)被傳送到該元宇宙虛擬私有網路伺服器智能裝置客戶應用程序的一個類別代碼(class code)定義;其中複數個供應商特定的軟體模組或應用程序被該元宇宙虛擬私有網路伺服器智能裝置客戶應用程序加載,以支持來自不同製造商的該至少一個元宇宙應用程序閘道器智能裝置客戶的一個對應元宇宙應用程序閘道器智能裝置客戶;其中該至少一個元宇宙應用程序閘道器智能裝置客戶的複數個裝置類別包含有一語音、一影像、一人道介面裝置、一網際網路協定(Internet Protocol,IP)攝影機、一智能鎖、一智能燈泡、一遠端遙控器、一恆溫器、一印表機、一大容量儲存裝置、一藍牙、一特定應用程序及一特定供應商。 A non-transitory computer-readable medium for storing executable instructions that cause a computer to perform the following operations in response to execution: master-slave setting at least one metaverse in a client-server relationship An application gateway (metaverse application gateway, MVAG) smart device client and a metaverse virtual private network (virtual private network, VPN) server (metaverse VPN server, MVVS) smart device client application; wherein the The Metaverse Virtual Private Network Server smart device client application includes an application utility in a public cloud network; wherein a functionality of the at least one Metaverse Application Gateway smart device client ) is a class code definition of a smart device client application sent to the Metaverse Virtual Private Network server; wherein a plurality of vendor-specific software modules or applications are served by the Metaverse Virtual Private Network Loading a Metaverse Application Gateway Smart Device Client application to support a corresponding Metaverse Application Gateway Smart Device Client of the at least one Metaverse Application Gateway Smart Device Client from a different manufacturer; wherein the at least one Metaverse Application Gateway Smart Device Client Multiple device categories of gateway smart device customers include a voice, a video, a human interface device, an Internet Protocol (IP) camera, a smart lock, a smart light bulb, a remote remote control, A thermostat, a printer, a large storage device, a Bluetooth, a specific application and a specific vendor.
TW111144098A 2022-05-04 2022-11-18 Metaverse application gateway connection mechanism for use in a private communication architecture TWI829435B (en)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US17/736,103 US20220385638A1 (en) 2011-09-09 2022-05-04 Private Matter Gateway Connection Mechanism for Use in a Private Communication Architecture
US17/736,103 2022-05-04
US17/849,741 2022-06-27
US17/849,741 US20220329569A1 (en) 2011-09-09 2022-06-27 Metaverse Application Gateway Connection Mechanism for Use in a Private Communication Architecture

Publications (2)

Publication Number Publication Date
TW202345550A TW202345550A (en) 2023-11-16
TWI829435B true TWI829435B (en) 2024-01-11

Family

ID=84839946

Family Applications (1)

Application Number Title Priority Date Filing Date
TW111144098A TWI829435B (en) 2022-05-04 2022-11-18 Metaverse application gateway connection mechanism for use in a private communication architecture

Country Status (2)

Country Link
GB (1) GB2618402A (en)
TW (1) TWI829435B (en)

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW201701169A (en) * 2015-06-16 2017-01-01 金士頓數位股份有限公司 Private cloud routing server connection mechanism for use in a private communication architecture

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11863529B2 (en) * 2011-09-09 2024-01-02 Kingston Digital, Inc. Private cloud routing server connection mechanism for use in a private communication architecture
US10601810B2 (en) * 2011-09-09 2020-03-24 Kingston Digital, Inc. Private cloud routing server connection mechanism for use in a private communication architecture

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW201701169A (en) * 2015-06-16 2017-01-01 金士頓數位股份有限公司 Private cloud routing server connection mechanism for use in a private communication architecture

Also Published As

Publication number Publication date
TW202345550A (en) 2023-11-16
GB202217127D0 (en) 2022-12-28
GB2618402A (en) 2023-11-08

Similar Documents

Publication Publication Date Title
US11356417B2 (en) Private cloud routing server connection mechanism for use in a private communication architecture
US10666638B2 (en) Certificate-based dual authentication for openflow enabled switches
US9515875B2 (en) Zero touch deployment of multi-tenant services in a home network environment
US11863529B2 (en) Private cloud routing server connection mechanism for use in a private communication architecture
TWI574164B (en) Private cloud routing server connection mechanism for use in a private communication architecture
TWI632465B (en) Method for use with a public cloud network, private cloud routing server and smart device client
US20230254292A1 (en) Private and Secure Chat Connection Mechanism for Use in a Private Communication Architecture
US20220385638A1 (en) Private Matter Gateway Connection Mechanism for Use in a Private Communication Architecture
US20220329569A1 (en) Metaverse Application Gateway Connection Mechanism for Use in a Private Communication Architecture
US11683292B2 (en) Private cloud routing server connection mechanism for use in a private communication architecture
TWI829435B (en) Metaverse application gateway connection mechanism for use in a private communication architecture
US11888898B2 (en) Network configuration security using encrypted transport
TWI829487B (en) Private matter gateway connection mechanism for use in a private communication architecture
TW202233007A (en) Connection method and computer-readable medium for use in a private communication architecture
TWI836974B (en) Private and secure chat connection mechanism for use in a private communication architecture
US20230083939A1 (en) Private Matter Gateway Connection Mechanism for Use in a Private Communication Architecture
CN117014177A (en) Meta universe application gateway linking mechanism for private communication architecture
TWI769965B (en) Connection method and computer-readable medium for use in a private communication architecture
CN117014251A (en) Private substance gateway linking mechanism for private communication architecture
CN117014435A (en) Private secure chat join mechanism for private communication architecture
GB2544675A (en) Private cloud routing server connection mechanism for use in a private communication architecture