CN115811412B - Communication method and device, SIM card, electronic equipment and terminal equipment - Google Patents
Communication method and device, SIM card, electronic equipment and terminal equipment Download PDFInfo
- Publication number
- CN115811412B CN115811412B CN202210837363.5A CN202210837363A CN115811412B CN 115811412 B CN115811412 B CN 115811412B CN 202210837363 A CN202210837363 A CN 202210837363A CN 115811412 B CN115811412 B CN 115811412B
- Authority
- CN
- China
- Prior art keywords
- user
- identity information
- hash value
- metaverse
- virtual
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 79
- 238000004891 communication Methods 0.000 title claims abstract description 68
- 238000004422 calculation algorithm Methods 0.000 claims description 32
- 238000012545 processing Methods 0.000 claims description 12
- 230000008569 process Effects 0.000 claims description 11
- 238000004590 computer program Methods 0.000 claims description 10
- 238000004364 calculation method Methods 0.000 abstract description 7
- 238000010586 diagram Methods 0.000 description 26
- 230000009286 beneficial effect Effects 0.000 description 9
- 238000012795 verification Methods 0.000 description 9
- 230000003993 interaction Effects 0.000 description 6
- 238000007726 management method Methods 0.000 description 5
- YSCNMFDFYJUPEF-OWOJBTEDSA-N 4,4'-diisothiocyano-trans-stilbene-2,2'-disulfonic acid Chemical compound OS(=O)(=O)C1=CC(N=C=S)=CC=C1\C=C\C1=CC=C(N=C=S)C=C1S(O)(=O)=O YSCNMFDFYJUPEF-OWOJBTEDSA-N 0.000 description 3
- 230000009471 action Effects 0.000 description 3
- 238000010276 construction Methods 0.000 description 3
- 238000011161 development Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 230000006870 function Effects 0.000 description 3
- 230000002093 peripheral effect Effects 0.000 description 2
- 238000011084 recovery Methods 0.000 description 2
- 239000007787 solid Substances 0.000 description 2
- JJWKPURADFRFRB-UHFFFAOYSA-N carbonyl sulfide Chemical compound O=C=S JJWKPURADFRFRB-UHFFFAOYSA-N 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000000802 evaporation-induced self-assembly Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 239000013307 optical fiber Substances 0.000 description 1
- 230000001737 promoting effect Effects 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
The embodiment of the disclosure provides a communication method, a communication device, a SIM card, electronic equipment and terminal equipment, and relates to the technical field of metauniverse. The meta-universe application module is used for sending an identity information request to the SIM card when the meta-universe platform needs to be accessed, and sending an authentication request to the meta-universe platform based on the virtual identity information so that the meta-universe platform authenticates the authentication request based on the virtual identity information. The SIM card is used for acquiring the locally recorded virtual identity information and sending the virtual identity information to the meta-universe application module when receiving the identity information request, wherein the virtual identity information is obtained by generating a first user private key based on the SIM card when a first user logging in the meta-universe application module registers the SIM card, and the first user private key is obtained by carrying out hash calculation on a preset random number. The risk of revealing the virtual identity information can be reduced, and privacy protection of users is facilitated.
Description
Technical Field
The disclosure relates to the technical field of metauniverse, and in particular relates to a communication method, a device, a SIM card, electronic equipment and terminal equipment.
Background
The meta-universe (METAVERSE) is a virtual world that maps and interacts with the real world. Based on the meta universe, the virtual world can be intimately fused with the real world on an economic system, social system, identity system, and allow users to conduct content production and world editing.
In the related art, a user may register through an internet platform, and the internet platform may generate virtual identity information for the user to access the meta-universe, and further, the user may access the meta-universe platform based on the virtual identity information.
However, in the related art, the internet platform records the virtual identity information of the user, and the virtual identity information lacks privacy protection, so that the risk of disclosure of the virtual identity information exists, which is not beneficial to the privacy protection of the user.
Disclosure of Invention
The embodiment of the disclosure aims to provide a communication method, a device, a SIM card, electronic equipment and terminal equipment, which can reduce the risk of revealing virtual identity information and is beneficial to privacy protection of users. The specific technical scheme is as follows:
In a first aspect of the embodiments of the present disclosure, there is provided a terminal device, including a subscriber identity module SIM card, and a meta-universe application module installed, wherein:
the meta-universe application module is used for sending an identity information request to the SIM card when the meta-universe platform needs to be accessed;
The SIM card is used for acquiring locally recorded virtual identity information and sending the virtual identity information to the meta-universe application module when receiving the identity information request, wherein the virtual identity information is obtained by generating a private key of a first user based on the first user when a first user logging in the meta-universe application module registers the SIM (Subscriber Identity Module, user identity module) card;
The metauniverse application module is further used for sending an authentication request to the metauniverse platform based on the virtual identity information so that the metauniverse platform authenticates the authentication request based on the virtual identity information.
In a second aspect of the embodiments of the present disclosure, a communication method is provided, where the method is applied to a meta-universe application module in a terminal device, and the terminal device further includes a SIM card, where the method includes:
When a metauniverse platform needs to be accessed, an identity information request is sent to the SIM card, so that the SIM card obtains locally recorded virtual identity information when receiving the identity information request, and the virtual identity information is sent to the metauniverse application module, wherein the virtual identity information is obtained by generating a private key of a first user based on the SIM card when a first user logging in the metauniverse application module registers the SIM card;
And sending an authentication request to the metauniverse platform based on the virtual identity information so that the metauniverse platform authenticates the authentication request based on the virtual identity information.
In some embodiments, the method further comprises:
acquiring a transaction record of the first user in the metauniverse platform;
The transaction record is sent to the SIM card, so that the SIM card encrypts the transaction record based on the private key of the first user to obtain a corresponding digital signature, and the digital signature is sent to the meta space application module;
And acquiring the digital signature from the SIM card, and sending the transaction record and the digital signature to the metauniverse platform.
In some embodiments, the method further comprises:
When the first user is detected to acquire the virtual asset in the metauniverse platform, the virtual asset is sent to the SIM card, so that the SIM card generates a unique identifier of the virtual asset based on the virtual identity information, and the virtual asset and the unique identifier are recorded in a local corresponding mode.
A third aspect of the embodiments of the present disclosure provides a communication method, where the method is applied to a SIM card in a terminal device, and the terminal device further includes a metauniverse application module, and the method includes:
when an identity information request is received, obtaining locally recorded virtual identity information, wherein the identity information request is sent to the SIM card when the meta-universe application module needs to access the meta-universe platform;
The method comprises the steps of sending virtual identity information to a metauniverse application module, wherein the virtual identity information is obtained by generating a first user private key based on the first user when a first user logged in the metauniverse application module registers the SIM card, the first user private key is obtained by carrying out hash calculation on a preset random number, and the metauniverse application module sends an authentication request to a metauniverse platform based on the virtual identity information, so that the metauniverse platform authenticates the authentication request based on the virtual identity information.
In some embodiments, the method further comprises:
Receiving a transaction record sent by the metauniverse application module, wherein the transaction record is a transaction record of the first user in the metauniverse platform;
encrypting the transaction record based on the private key of the first user to obtain a corresponding digital signature;
And sending the digital signature to the metauniverse application module so that the metauniverse application module sends the transaction record and the digital signature to the metauniverse platform.
In some embodiments, the method further comprises:
receiving a virtual asset sent by the metauniverse application module, wherein the virtual asset is acquired by the first user in the metauniverse platform;
And generating a unique identifier of the virtual asset based on the virtual identity information, and correspondingly recording the virtual asset and the unique identifier locally.
In some embodiments, the generating of the virtual identity information includes:
Generating a random number;
Based on a preset hash algorithm, calculating a hash value of the random number to obtain a private key of the first user;
Based on the private key of the first user, DID (Decentralized Identity, decentralised identity) of the first user is generated as virtual identity information of the first user.
In some embodiments, the method further comprises:
When the user identity of a user to be verified is required to be verified, acquiring a user password and user real identity information provided by the user to be verified;
Determining an encrypted random number corresponding to user real identity information provided by a user to be verified and an operator password based on a pre-recorded corresponding relation between the user real identity information, the encrypted random number and the operator password, wherein the encrypted random number recorded in the corresponding relation is obtained by encrypting based on the user password provided by a registered user and the corresponding operator password;
Judging whether the determined encrypted random number can be successfully decrypted or not based on the determined operator password and the user password provided by the user to be verified;
if yes, determining that the user to be verified passes the identity verification;
If not, determining that the user to be authenticated fails the authentication.
A fourth aspect of the embodiments of the present disclosure provides a communication apparatus, where the apparatus is applied to a meta-universe application module in a terminal device, the terminal device further includes a SIM card, and the apparatus includes:
The system comprises an identity information request sending module, a meta space application module and a user authentication module, wherein the identity information request sending module is used for sending an identity information request to the SIM card when the meta space platform needs to be accessed, so that the SIM card obtains locally recorded virtual identity information when receiving the identity information request and sends the virtual identity information to the meta space application module, wherein the virtual identity information is obtained by carrying out hash calculation on a preset random number on a private key of a first user when the first user logged in the meta space application module registers the SIM card;
And the authentication request sending module is used for sending an authentication request to the metauniverse platform based on the virtual identity information so that the metauniverse platform authenticates the authentication request based on the virtual identity information.
In some embodiments, the apparatus further comprises:
The transaction record acquisition module is used for acquiring a transaction record of the first user in the metauniverse platform;
The transaction record sending module is used for sending the transaction record to the SIM card so that the SIM card encrypts the transaction record based on the private key of the first user to obtain a corresponding digital signature and sending the digital signature to the meta-universe application module;
and the digital signature acquisition module is used for acquiring the digital signature from the SIM card and transmitting the transaction record and the digital signature to the metauniverse platform.
In some embodiments, the apparatus further comprises:
And the virtual asset sending module is used for sending the virtual asset to the SIM card when the first user acquires the virtual asset in the metauniverse platform, so that the SIM card generates the unique identifier of the virtual asset based on the virtual identity information, and correspondingly records the virtual asset and the unique identifier locally.
A fifth aspect of the embodiments of the present disclosure provides a communication apparatus, the apparatus being applied to a SIM card in a terminal device, the terminal device further including a metauniverse application module, the apparatus including:
The system comprises a virtual identity information acquisition module, a SIM card and a meta-universe application module, wherein the virtual identity information acquisition module is used for acquiring locally recorded virtual identity information when an identity information request is received, and the identity information request is sent to the SIM card when the meta-universe application module needs to access the meta-universe platform;
The device comprises a meta-universe application module, a virtual identity information sending module and a meta-universe platform, wherein the meta-universe application module is used for sending virtual identity information to the meta-universe application module, the virtual identity information is obtained by generating a first user's private key based on the first user when the first user logged in the meta-universe application module registers the SIM card, the first user's private key is obtained by carrying out hash calculation on a preset random number, and the meta-universe application module is used for sending an authentication request to the meta-universe platform based on the virtual identity information, so that the meta-universe platform can authenticate the authentication request based on the virtual identity information.
In some embodiments, the apparatus further comprises:
The system comprises a meta-universe application module, a transaction record receiving module, a meta-universe application module and a transaction record processing module, wherein the transaction record receiving module is used for receiving a transaction record sent by the meta-universe application module, and the transaction record is a transaction record of the first user in the meta-universe platform;
The digital signature generation module is used for encrypting the transaction record based on the private key of the first user to obtain a corresponding digital signature;
and the digital signature sending module is used for sending the digital signature to the metauniverse application module so that the metauniverse application module sends the transaction record and the digital signature to the metauniverse platform.
In some embodiments, the apparatus further comprises:
the system comprises a metauniverse application module, a virtual asset receiving module and a metadata processing module, wherein the metauniverse application module is used for receiving a metauniverse application module, and the metauniverse application module is used for receiving a metauniverse application;
and the unique identifier generation module is used for generating the unique identifier of the virtual asset based on the virtual identity information and correspondingly recording the virtual asset and the unique identifier locally.
In some embodiments, the apparatus further comprises:
the random number generation module is used for generating random numbers;
the private key generation module is used for calculating the hash value of the random number based on a preset hash algorithm to obtain the private key of the first user;
And the DID generation module is used for generating the decentralised identity DID of the first user based on the private key of the first user and taking the decentralised identity DID as the virtual identity information of the first user.
In some embodiments, the apparatus further comprises:
the first acquisition module is used for acquiring a user password and user real identity information provided by a user to be verified when the user identity of the user to be verified is required to be verified;
The first determining module is used for determining the encrypted random number corresponding to the user real identity information provided by the user to be verified and the operator password based on the corresponding relation between the pre-recorded user real identity information, the encrypted random number and the operator password, wherein the encrypted random number recorded in the corresponding relation is obtained by encrypting the user password provided by the registered user and the corresponding operator password;
the first judging module is used for judging whether the determined encrypted random number can be successfully decrypted based on the determined operator password and the user password provided by the user to be verified, if so, determining that the user to be verified passes the identity verification, and if not, determining that the user to be verified does not pass the identity verification.
A sixth aspect of the disclosed embodiments provides a SIM card, the SIM card including a computing chip, a communication module, and a SIM card module;
The computing chip is used for carrying out data communication with the meta space application module in the terminal equipment through the communication module so as to realize any communication method step applied to the SIM card.
A seventh aspect of the embodiments of the present disclosure provides an electronic device, which is characterized by comprising a processor, a communication interface, a memory, and a communication bus, wherein the processor, the communication interface, and the memory complete communication with each other through the communication bus;
a memory for storing a computer program;
and the processor is used for realizing any communication method step when executing the program stored in the memory.
The disclosed embodiments also provide a computer program product containing instructions which, when run on a computer, cause the computer to perform any of the communication methods described above.
The beneficial effects of the embodiment of the disclosure are that:
The terminal device comprises a user identity module (SIM) card and a metauniverse application module, wherein the metauniverse application module is used for sending an identity information request to the SIM when the metauniverse application module needs to be accessed, the SIM card is used for obtaining locally recorded virtual identity information when the identity information request is received and sending the virtual identity information to the metauniverse application module, the virtual identity information is obtained by generating a first user logging in the metauniverse application module based on a private key of the first user when the SIM card is registered, the private key of the first user is obtained by carrying out hash calculation on a preset random number, and the metauniverse application module is further used for sending an authentication request to the metauniverse platform based on the virtual identity information, so that the metauniverse platform authenticates the authentication request based on the virtual identity information.
Based on the terminal equipment provided by the embodiment of the disclosure, when the user registers the SIM card, virtual identity information of the user can be generated and stored in the SIM card, and subsequently, based on the virtual identity information recorded in the SIM card, the user can access the meta-universe platform without recording the virtual identity information of the user on each internet platform, so that the risk of revealing the virtual identity information is reduced, and privacy protection of the user is facilitated.
Of course, not all of the above-described advantages need be achieved simultaneously in practicing any one of the products or methods of the present disclosure.
Drawings
In order to more clearly illustrate the embodiments of the present disclosure or the technical solutions in the prior art, the following description will briefly introduce the drawings that are required to be used in the embodiments or the description of the prior art, and it is apparent that the drawings in the following description are only some embodiments of the present disclosure, and other embodiments may be obtained according to these drawings to those of ordinary skill in the art.
Fig. 1 is a schematic diagram of a terminal device according to an embodiment of the present disclosure;
fig. 2 is a block diagram of a SIM card according to an embodiment of the present application;
fig. 3 is a schematic hardware structure of a BSIM card according to an embodiment of the present disclosure;
Fig. 4 is an interaction diagram of a communication method provided in an embodiment of the present disclosure;
FIG. 5 is a schematic diagram of an access metacosmic platform according to an embodiment of the present disclosure;
FIG. 6 is an interaction diagram of another communication method provided by an embodiment of the present disclosure;
FIG. 7 is an interaction diagram of yet another communication method provided by an embodiment of the present disclosure;
FIG. 8 is a flowchart of a process for generating virtual identity information according to an embodiment of the present disclosure;
FIG. 9 is a flowchart of a user authentication process provided by an embodiment of the present disclosure;
Fig. 10 is a schematic diagram of user authentication to be authenticated according to an embodiment of the present disclosure;
fig. 11 is a schematic communication diagram of an operating system of an intelligent terminal and a SIM card according to an embodiment of the present disclosure;
fig. 12 is a schematic diagram of managing virtual assets by a SIM card according to an embodiment of the present disclosure;
FIG. 13 is a diagram illustrating a meta-space asset management process according to an embodiment of the present disclosure;
fig. 14 is a block diagram of a communication device according to an embodiment of the present disclosure;
fig. 15 is a block diagram of yet another communication device provided by an embodiment of the present disclosure;
fig. 16 is a block diagram of an electronic device according to an embodiment of the present application.
Detailed Description
The following description of the technical solutions in the embodiments of the present disclosure will be made clearly and completely with reference to the accompanying drawings in the embodiments of the present disclosure, and it is apparent that the described embodiments are only some embodiments of the present disclosure, not all embodiments. Based on the embodiments in the present disclosure, all other embodiments obtained by one of ordinary skill in the art based on the present disclosure are within the scope of the present disclosure.
In the related art, an internet platform records virtual identity information of a user, so that the risk of revealing the virtual identity information is caused, and privacy protection of the user is not facilitated.
In order to solve the above-mentioned problems, the embodiments of the present disclosure provide a terminal device, referring to fig. 1, fig. 1 is an architecture diagram of a terminal device provided by the embodiments of the present disclosure, where the terminal device includes a SIM (subscriber identity module ) card 101 and a metauniverse application module 102, where:
the metauniverse application module 102 is configured to send an identity information request to the SIM card 101 when the metauniverse platform needs to be accessed.
The SIM card 101 is configured to obtain locally recorded virtual identity information when receiving the identity information request, and send the virtual identity information to the meta-universe application module 102.
The virtual identity information is obtained by generating a first user private key of the first user by the SIM card 101 when the first user logs in the meta-universe application module 102 and registers the SIM card, and the first user private key is obtained by carrying out hash calculation on a preset random number.
The metauniverse application module 102 is further configured to send an authentication request to the metauniverse platform based on the virtual identity information, so that the metauniverse platform authenticates the authentication request based on the virtual identity information.
The terminal equipment provided by the embodiment of the disclosure can generate the virtual identity information of the user when the user registers the SIM card, store the virtual identity information in the SIM card, and realize the user access to the meta-universe platform based on the virtual identity information recorded in the SIM card subsequently without recording the virtual identity information of the user on each internet platform, thereby reducing the risk of revealing the virtual identity information and being beneficial to privacy protection of the user.
The terminal device provided by the embodiment of the disclosure can be applied to different scenes, for example, the terminal device can be a mobile phone, and a user can communicate with the metauniverse platform through the mobile phone. Correspondingly, the SIM card in the terminal device represents the SIM card built in the mobile phone, and the metauniverse application module can comprise an application program installed in the mobile phone and used for accessing the metauniverse platform.
The embodiment of the disclosure also provides a SIM card, as shown in FIG. 2, FIG. 2 is a block diagram of the SIM card provided by the embodiment of the application, comprising a computing chip 201, a SIM card module 202 and a communication module 203;
The computing chip 201 is used for carrying out data communication with a meta space application module in the terminal equipment through the communication module 203.
The SIM card in this disclosure may also be referred to as a BSIM (blockchain subscriber identity module ) card. The metauniverse platform application module may be metauniverse software installed for the terminal device.
In one implementation, as shown in fig. 3, fig. 3 is a schematic hardware structure of a BSIM card provided in an embodiment of the present disclosure. In fig. 3, the BSIM card includes a SIM card module 301, a bluetooth module 302, a computing chip 303, and an interface module 304. The SIM card module 301 includes the hardware structure of the conventional SIM card, and the bluetooth module 302 is the communication module in the above embodiment, and the interface module 304 includes a specific interface hereinafter. The computing chip 303 is used to generate virtual identity information of the user, sign the transaction record, generate a unique identification of the virtual asset, verify the identity of the user, etc., and in particular is received in detail in the following embodiments. The computing chip 303 has a financial security level.
In one implementation, the BSIM card may support blockchain algorithms such as ECC-secp256k1 (elliptic curve Algorithm, elliptic Curve Cryptography), AES (advanced encryption Standard Algorithm, advanced Encryption Standard), ECDSA-secp k1 (elliptic Curve digital signature Algorithm ), HMAC-SHA512 (Hash-based Message Authentication Code based on message authentication code). The storage space in the BSIM card is larger than 1M, the user space is larger than 450K, and the signature speed is smaller than 150ms. The user space is used for storing virtual identity information, virtual assets, mobile phone numbers, encryption seeds and private keys of the user.
In one implementation, BSIM may be implemented by a JAVA application layer, a JAVA platform, a hardware interface layer, and a hardware layer. The JAVA application layer is used for realizing blockchain application logic in the BSIM card, and comprises seed generation, public and private key generation, encryption storage, digital signature generation, private key recovery, backup and the like. The JAVA platform layer can implement JAVACARD virtual machine and card content management functions, and provides JAVA interface for application call. The BSIM card communicates with the metauniverse platform for the module via a JAVA interface. The hardware interface layer may invoke the hardware interface based on the C language to generate virtual identity information of the user, sign the transaction record, generate a unique identification of the virtual asset, and verify the user's identity. The hardware layer can improve the algorithm performance through the hardware algorithm IP coprocessor. The hardware algorithm IP coprocessor is the computing chip in the above embodiment.
Based on the same inventive concept, the embodiment of the disclosure also provides a communication method, which can be applied to a SIM card and a metauniverse application module in terminal equipment. The SIM card and the metauniverse application module may be the SIM card 101 and the metauniverse application module 102 in the terminal device in fig. 1, respectively. Referring to fig. 4, fig. 4 is an interaction diagram of a communication method according to an embodiment of the disclosure, where the method may include the following steps:
S401, when the metauniverse platform needs to be accessed, the metauniverse application module sends an identity information request to the SIM card.
S402, when the SIM card receives the identity information request, the SIM card acquires the locally recorded virtual identity information and sends the virtual identity information to the meta-universe application module.
The virtual identity information is obtained by generating a first user private key of the SIM card when the first user logged in the meta-universe application module registers the SIM card, wherein the first user private key is obtained by carrying out hash calculation on a preset random number.
S403, the metauniverse application module sends an authentication request to the metauniverse platform based on the virtual identity information so that the metauniverse platform authenticates the authentication request based on the virtual identity information.
According to the communication method provided by the embodiment of the disclosure, when the user registers the SIM card, virtual identity information of the user can be generated and stored in the SIM card, and subsequently, based on the virtual identity information recorded in the SIM card, the user can access the meta-universe platform without recording the virtual identity information of the user on each internet platform, so that the risk of revealing the virtual identity information is reduced, and privacy protection of the user is facilitated.
In addition, in the related technology, the virtual asset and the virtual identity are the core of the metauniverse, and carry the asset interests and the social identities of users in the metauniverse. However, the virtual identity interpretation rights of the users are in an Internet platform mechanism, so that ownership properties are not clear, and development of the meta universe is hindered.
According to the method of the embodiment of the disclosure, the virtual identity information of the user is recorded in the SIM card registered by the user, so that the user can have ownership of the virtual identity information, namely, the ownership of the virtual identity information can be clarified, and development of meta universe is promoted.
For step S401, the metacosmic platform corresponds to a metacosmic application module, i.e., the user may access different metacosmic platforms through different metacosmic application modules.
In one implementation, when a user opens a metauniverse application module in an intelligent terminal, the metauniverse application module may send an identity information request to a SIM card. For example, the meta-space application module may call an SDK (software development kit ) through a specific interface, and further, send an identity information request to the SIM card through the SDK to obtain the identity information stored in the SIM card. The specific interface may be an interface provided by an operating system of the intelligent terminal.
For step S402, the first user is a user who needs to access the metauniverse platform through the metauniverse application module currently using the intelligent terminal. In one implementation, the first user may apply for registering the SIM card with the carrier, and when registering the SIM card, the SIM card may generate virtual identity information of the first user.
For step S403, in one implementation, the virtual identity information of the first user may include DID. That is, the carrier may store the DID of the first user in the carrier-built blockchain when the first user registers the SIM card. Accordingly, the meta-universe application module may generate a DID verifiable claim based on the DID of the first user and send an authentication request carrying the DID verifiable claim to the meta-universe platform. Correspondingly, the meta-universe platform can acquire the DID of the first user stored in the blockchain constructed by the operator, and verify the DID verifiable statement based on the DID, so that the authentication request can be authenticated. Wherein the authentication request is authenticated, i.e. the first user is authenticated.
For example, the DID may contain a DID identifier and a DID document that includes the public key of the first user, a set of encryption protocols, a set of service endpoints, a creation timestamp of the DID document, and a JSON-LD (JavaScript Object Notation-LINKED DATA, a method of representing and transmitting interconnection data based on JSON) signature. Wherein the JSON-LD signature is used to verify the legitimacy of the DID document. The public key of the first user corresponds to a private key of the first user mentioned later.
In one implementation, the metauniverse platform may verify the DID verifiable statement carried in the authentication request based on the DID specification of W3C (world wide web consortium ). For example, it may be determined whether the signature in the DID verifiable claim is legal, or whether the DID in the DID verifiable claim is a DID trusted by the metaplatform, i.e., whether the DID identifier and DID document of the DID verifiable claim token are stored in a blockchain built by the operator. That is, when the first user accesses the metauniverse platform through the metauniverse application module, the metauniverse platform can acquire the DID verifiable statement of the first user, if the DID verifiable statement passes verification, the authentication of the first user can be determined to be successful, otherwise, the authentication of the first user is determined to be failed.
In one implementation, referring to fig. 5, fig. 5 is a schematic diagram of an access metauniverse platform provided by an embodiment of the disclosure. Each metauniverse in fig. 5 represents a metauniverse platform, and after a natural person (i.e., a user) performs real-name authentication through an operator, the metauniverse platform can be logged in, and a plurality of different metauniverse platforms can be switched to access. The operator stores the DID key (namely DID) of the user in the BSIM card chip, the meta-universe platform can acquire the DID of the user from the operator, and subsequently, when the user accesses the meta-universe platform, the meta-universe platform can analyze and verify the DID verifiable statement so as to authenticate the user. The DID identification specification definition based on the W3C can realize interconnection and mutual recognition of the DIDs of the unified specification among the metacosmic platforms, and a user can realize seamless switching among a plurality of metacosmic platforms, namely, the user can access different metacosmic platforms based on one DID without registering different DIDs on different metacosmic platforms. The blockchain infrastructure is a network operating based on blockchain technology, and operators can participate in the construction of the blockchain infrastructure, and meanwhile, DIDs can be stored in the blockchain. In addition, transaction records for each DID in the metauniverse platform may also be stored in the blockchain. The BSIM card is used for storing the virtual identity information of the user, so that the digital identities among a plurality of meta-cosmic platforms can be opened, a unified identity authentication protocol of the cross-meta-cosmic platform is realized, and an authoritative, standard and credible user identity system infrastructure is built for the cloud cosmic platform.
In one implementation, referring to fig. 6, fig. 6 is an interaction diagram of another communication method provided by an embodiment of the disclosure, and on the basis of fig. 4, the method may include the following steps:
s404, the metauniverse application module obtains a transaction record of the first user in the metauniverse platform.
And S405, the meta-universe application module sends a transaction record to the SIM card.
S406, the SIM card encrypts the transaction record based on the private key of the first user to obtain a corresponding digital signature, and sends the digital signature to the meta-universe application module.
S407, the metauniverse application module acquires the digital signature from the SIM card and sends the transaction record and the digital signature to the metauniverse platform.
The metauniverse platform may use the blockchain as an infrastructure, e.g., the metauniverse platform may issue virtual assets based on the blockchain.
When a user purchases or sells a virtual asset in the metauniverse platform, the metauniverse platform may generate a transaction record that indicates that the first user transacted with the virtual asset in the metauniverse platform. For example, the transaction record may contain the time of the transaction, virtual identity information of both parties to the transaction, and an identification of the virtual asset that was originally in the transaction. The original identity of the virtual asset represents the identity obtained when the virtual asset was generated.
In one implementation, the SIM card may process the transaction record based on a digital digest algorithm to obtain a string of fixed length, and then encrypt the string based on the private key of the first user to form a digital signature. The SIM card may send the digital signature to the meta-cosmic application module through the blockchain interface. For example, the digital digest algorithm may be a Hash algorithm. The blockchain interface can be a hardware interface provided by the SIM card, and the SIM card can be accessed into the blockchain corresponding to each metacosmic platform through the hardware interface.
The metauniverse application module may obtain a digital signature based on the block link port in the SIM card and send the digital signature and its corresponding transaction record to the metauniverse platform.
According to the communication method provided by the embodiment of the disclosure, when the user performs virtual asset transaction, the private key of the first user stored in the SIM card is used for signing the transaction record, and the obtained digital signature and the transaction record are sent to the meta-universe platform, so that the transaction record of the user can be prevented from being tampered, and the transaction cost is low and is not limited by time and space.
In one implementation, referring to fig. 7, fig. 7 is an interaction diagram of another communication method provided by an embodiment of the disclosure, on the basis of fig. 4, the method may include the following steps:
and S408, when the first user is detected to acquire the virtual asset in the metauniverse platform, the metauniverse application module sends the virtual asset to the SIM card.
S409, the SIM card generates a unique identifier of the virtual asset based on the virtual identity information, and records the virtual asset and the unique identifier in a local corresponding mode.
The first user can purchase and exchange virtual assets in the metauniverse platform through the metauniverse application module, and correspondingly, the metauniverse application module can send the virtual assets obtained by the first user to the SIM card.
In one implementation, the first user may purchase digital artwork, play objects, and the like using points. The point can be a virtual asset obtained by recharging the first user on a service operation platform of the operator, or can be a virtual asset which is presented to the user by the operator according to the historical consumption record of the user.
In one implementation, the SIM card may splice the virtual identity information and the original identifier of the virtual asset, as a unique identifier of the virtual asset.
In the related technology, the virtual asset and the virtual identity are the core of the metauniverse, and bear the asset interests and the social identities of users in the metauniverse. However, the privacy of the virtual identity information and the derived related assets, activities and other data is not good for protecting the privacy of the user. The communication method provided by the embodiment of the disclosure can generate unique identifiers for different assets in different meta-universe based on the virtual identity information stored in the SIM card, is beneficial to the management of the virtual assets by users, and is further beneficial to the construction of meta-universe transaction ecology and the privacy protection of the users.
In an implementation manner, as shown in fig. 8, fig. 8 is a flowchart of a process for generating virtual identity information provided by an embodiment of the present disclosure, and a process for generating virtual identity information by a SIM card includes:
S801, generating random numbers.
S802, calculating a hash value of the random number based on a preset hash algorithm to obtain a private key of the first user.
S803, based on the private key of the first user, DID of the first user is generated and used as virtual identity information of the first user.
In one implementation, when a first user registers a SIM card, the SIM card may generate a random number of a specified byte via a hardware random number generator (TRNG, true Random Number Generator). And processing the random number based on a preset hash algorithm to obtain a private key of the first user.
And processing the private key of the first user based on a hash algorithm to obtain a character string with a fixed length as a first hash value. And acquiring a byte with a first numerical length of the first hash value, and taking the byte with the first numerical length as a second hash value. And adding the DID role type byte before the second hash value, and taking the second hash value after the DID role type byte is added as a third hash value. And calculating the third hash value based on a hash algorithm to obtain a fourth hash value. And acquiring bytes with the second numerical length of the fourth hash value, splicing the bytes with the second numerical length with the third hash value, and taking the obtained spliced value as a fifth hash value. And carrying out encoding processing on the fifth hash value to obtain the DID corresponding to the first user, and taking the DID as virtual identity information of the first user.
Wherein the first number of bytes may be the first 20 bytes and the second number of bytes may be the first 4 bytes. The hash algorithm may be SHA-512 (Secure Hash Algorithm-512, secure hash algorithm). The DID role type byte indicates the role type represented by the DID, where the role type may be an application, a person, a device, or the like. Encoding the fifth hash value may use a Base58 encoding method.
The designated bytes can be 64 bytes, the length of the private key can be 512 bits, so that 2 different private keys can exist 512 times, namely, the number of the private keys is close to 150 times of 10, the probability that the randomly selected private keys are identical is one 150 times of 10 and is close to 0, and further, the uniqueness and the security of the private keys can be improved.
The communication method provided by the embodiment of the disclosure can generate the private key of the first user based on the random number, ensures the uniqueness and the safety of the private key, generates the virtual identity information of the user when the user registers the SIM card, and ensures the ownership of the virtual identity information of the user, thereby ensuring that the virtual identity interpretation right of the user is on the user rather than the Internet platform, being beneficial to the privacy protection of the user and promoting the development of the universe.
In one implementation, when the SIM card is lost or damaged, the user may recover the SIM card and, in response, the user's identity may be verified. As shown in fig. 9, fig. 9 is a flowchart of a user authentication process provided in an embodiment of the present disclosure, including:
And S901, when the user identity of the user to be verified is required to be verified, acquiring a user password and user real identity information provided by the user to be verified.
S902, based on the pre-recorded corresponding relation between the user true identity information, the encrypted random number and the operator password corresponding to the user true identity information provided by the user to be verified are determined.
The encrypted random number recorded in the corresponding relation is obtained by encrypting based on a user password provided by a registered user and a corresponding operator password.
S903, judging whether the determined encrypted random number can be successfully decrypted based on the determined operator password and the user password provided by the user to be authenticated, if so, executing step S904, and if not, executing step S905.
S904, determining that the user to be authenticated passes the authentication.
S905 determining that the user to be authenticated fails the authentication.
In this disclosure, a random number may also be referred to as a seed, and an encrypted random number may also be referred to as an encrypted seed.
In one implementation, the user may provide a user password when registering the SIM card. For example, the user password may be a fixed-length string. In addition, the user may provide true identity information. The real identity information may include the name and identification number of the user. The operator password is generated by the operator when the user registers the SIM card. The carrier passwords corresponding to different users can be the same or different. For each user, when the user registers the SIM card, the SIM card can store the encrypted random number corresponding to the user, the operator password and the real identity information provided by the user in the service operation platform of the operator after obtaining the corresponding encrypted random number.
The user to be verified is a user needing user identity verification currently, and when the user identity of the user to be verified needs to be verified, the SIM card can acquire an encrypted random number and an operator password which are recorded in the service operation platform and correspond to the user to be verified and provide real identity information. The SIM card decrypts the encrypted random number by combining the user password and the operator password provided by the user to be verified, if the decryption is successful, the user to be verified is determined to pass the authentication, and if the decryption is unsuccessful, the user to be verified is determined to not pass the authentication.
According to the communication method provided by the embodiment of the disclosure, the service operation platform stores the encrypted seed and does not store the user password of the user, so that the operator cannot obtain the seed, the private key and the asset of the user only based on the operator password, the user asset safety is ensured, and the privacy protection of the user is facilitated.
In an implementation manner, referring to fig. 10, fig. 10 is a schematic diagram of user authentication to be authenticated according to an embodiment of the disclosure. In fig. 10, when the SIM card is lost or damaged, the user to be authenticated may apply for a recovery card from the operator. The operator can write the recorded encryption seeds and the operator passwords corresponding to the true identity information such as the mobile phone number provided by the user to be verified into the SIM card. In addition, the SIM card can acquire the user password input by the user to be verified, further, the SIM card decrypts the encrypted seed based on the operator password and the user password, if decryption is successful, the user to be verified is determined to pass identity verification, and correspondingly, the operator can recover the SIM card for the user to be verified, namely, the user to be verified obtains a new card and retrieves a wallet (namely, the private key of the user to be verified), and if decryption is unsuccessful, the user to be verified is determined to not pass identity verification.
In an implementation manner, referring to fig. 11, fig. 11 is a schematic communication diagram of an operating system of an intelligent terminal and a SIM card provided in an embodiment of the present disclosure. As shown in fig. 11, the intelligent terminal may be a mobile phone, and the mobile phone OS (operating system) may call an SDK (software development kit ) through a specific interface to communicate with a SIM card, where the SIM card stores a mobile phone number, an encryption seed, a private key, an encrypted digital asset, and a SIM card calculation program of the user. The SIM card computing program can generate virtual identity information of the user, sign the transaction record, generate unique identification of the virtual asset and verify the identity of the user.
In one implementation, referring to fig. 12, fig. 12 is a schematic diagram of managing virtual assets by using a SIM card according to an embodiment of the present disclosure. In fig. 12, a user identity (i.e., virtual identity information), a user asset (virtual asset), a native asset (an operator-issued credit) of a user may be stored in a BSIM card. Blockchain-based authentication of digital identities, construction of digital asset trading malls (e.g., point trading platforms), and trading of digital artwork (including music, video, pictures, etc.), game assets (including equipment, items, capabilities, skin, etc.), and metauniverse assets may be implemented. For example, for digital works of art, ownership and use rights can be defined, rights and assets of the metauniverse can be managed, and the property attribution and value can be widely confirmed without boundary in the metauniverse. The block chain link points comprise alliance chain block chain nodes, block chain consensus nodes, copyright protection nodes, cross-chain nodes and the like, and the nodes respectively realize different service functions based on intelligent contracts.
In one implementation, as shown in fig. 13, fig. 13 is a schematic diagram of a meta-space asset management flow provided in an embodiment of the present disclosure. In fig. 13, BSIM cards may be used as entry devices for metauniverse, based on BSIM cards, may enable authentication of blockchain distributed digital identities, management of metauniverse digital assets, and digital asset transactions based on passcards. The constructed metauniverse can serve data equity and asset circulation, and metauniverse digital identity and asset transaction ecology are created. The BSIM card has the advantages of supporting various blockchain algorithms, being high in performance, good in safety, convenient to use and the like. The method is beneficial to pulling the 5G large-network traffic income, the digital assets on the blockchain are not easy to migrate, the user viscosity is provided, and the method is beneficial to the operation of the existing high-net-value users and the attraction of the different-network users.
Based on the same inventive concept, the embodiments of the present disclosure further provide a communication device, referring to fig. 14, and fig. 14 is a structural diagram of the communication device provided by the embodiments of the present disclosure, where the device is applied to a meta space application module in a terminal device, and the terminal device further includes a SIM card, where the device includes:
The identity information request sending module 1401 is configured to send an identity information request to the SIM card when the metauniverse platform needs to be accessed, so that the SIM card obtains locally recorded virtual identity information when receiving the identity information request, and sends the virtual identity information to the metauniverse application module, where the virtual identity information is obtained by generating, by the SIM card, a private key of the first user based on the private key of the first user when the first user logged in the metauniverse application module registers the SIM card;
The authentication request sending module 1402 is configured to send an authentication request to the metauniverse platform based on the virtual identity information, so that the metauniverse platform authenticates the authentication request based on the virtual identity information.
In some embodiments, the apparatus further comprises:
The transaction record acquisition module is used for acquiring a transaction record of the first user in the meta-universe platform;
The transaction record sending module is used for sending the transaction record to the SIM card so that the SIM card encrypts the transaction record based on the private key of the first user to obtain a corresponding digital signature and sending the digital signature to the meta space application module;
and the digital signature acquisition module is used for acquiring the digital signature from the SIM card and sending the transaction record and the digital signature to the metauniverse platform.
In some embodiments, the apparatus further comprises:
And the virtual asset sending module is used for sending the virtual asset to the SIM card when the first user is detected to acquire the virtual asset in the metauniverse platform, so that the SIM card generates a unique identifier of the virtual asset based on the virtual identity information, and correspondingly records the virtual asset and the unique identifier locally.
Based on the same inventive concept, the embodiments of the present disclosure further provide a communication device, referring to fig. 15, and fig. 15 is a structural diagram of yet another communication device provided by the embodiments of the present disclosure, where the device is applied to a SIM card in a terminal device, and the terminal device further includes a meta space application module, where the device includes:
the virtual identity information acquisition module 1501 is configured to acquire locally recorded virtual identity information when an identity information request is received, where the identity information request is sent to the SIM card when the meta-universe application module needs to access the meta-universe platform;
The virtual identity information sending module 1502 is configured to send virtual identity information to the metauniverse application module, where the virtual identity information is obtained by generating, by a first user logged in the metauniverse application module, a private key of the first user based on the first user when the first user registers the SIM card, and performing hash computation on a preset random number by the private key of the first user, so that the metauniverse application module sends an authentication request to the metauniverse platform based on the virtual identity information, so that the metauniverse platform authenticates the authentication request based on the virtual identity information.
In some embodiments, the apparatus further comprises:
The system comprises a transaction record receiving module, a meta-universe application module and a first user, wherein the transaction record receiving module is used for receiving a transaction record sent by the meta-universe application module, and the transaction record is a transaction record of the first user in a meta-universe platform;
The digital signature generation module is used for encrypting the transaction record based on the private key of the first user to obtain a corresponding digital signature;
And the digital signature sending module is used for sending the digital signature to the metauniverse application module so that the metauniverse application module can send the transaction record and the digital signature to the metauniverse platform.
In some embodiments, the apparatus further comprises:
the system comprises a first user, a first metauniverse platform, a second user, a virtual asset receiving module, a first user and a second user, wherein the first user is used for acquiring a first metauniverse platform;
And the unique identification generation module is used for generating the unique identification of the virtual asset based on the virtual identity information and correspondingly recording the virtual asset and the unique identification locally.
In some embodiments, the apparatus further comprises:
the random number generation module is used for generating random numbers;
the private key generation module is used for calculating the hash value of the random number based on a preset hash algorithm to obtain the private key of the first user;
and the DID generation module is used for generating the decentralised identity DID of the first user based on the private key of the first user and taking the decentralised identity DID as virtual identity information of the first user.
In some embodiments, the apparatus further comprises:
the first acquisition module is used for acquiring a user password and user real identity information provided by the user to be verified when the user identity of the user to be verified is required to be verified;
The first determining module is used for determining the encrypted random number and the operator password corresponding to the user real identity information provided by the user to be verified based on the corresponding relation between the pre-recorded user real identity information and the encrypted random number and the operator password, wherein the encrypted random number recorded in the corresponding relation is obtained by encrypting the user password provided by the registered user and the corresponding operator password;
the first judging module is used for judging whether the determined encrypted random number can be successfully decrypted based on the determined operator password and the user password provided by the user to be verified, if so, determining that the user to be verified passes the identity verification, and if not, determining that the user to be verified does not pass the identity verification.
The embodiment of the disclosure further provides an electronic device, as shown in fig. 16, and fig. 16 is a structural diagram of the electronic device provided by the embodiment of the present application. Comprising a processor 1601, a communication interface 1602, a memory 1603 and a communication bus 1604, wherein the processor 1601, the communication interface 1602, the memory 1603 perform communication with each other via the communication bus 1604,
A memory 1603 for storing a computer program;
the processor 1601 is configured to implement the steps of any of the communication methods in the above embodiments when executing a program stored on the memory 1603.
The communication bus mentioned above for the electronic device may be a peripheral component interconnect standard (PERIPHERAL COMPONENT INTERCONNECT, PCI) bus or an extended industry standard architecture (Extended Industry Standard Architecture, EISA) bus, etc. The communication bus may be classified as an address bus, a data bus, a control bus, or the like. For ease of illustration, the figures are shown with only one bold line, but not with only one bus or one type of bus.
The communication interface is used for communication between the electronic device and other devices.
The Memory may include random access Memory (Random Access Memory, RAM) or may include Non-Volatile Memory (NVM), such as at least one disk Memory. Optionally, the memory may also be at least one memory device located remotely from the aforementioned processor.
The Processor may be a general-purpose Processor including a central processing unit (Central Processing Unit, CPU), a network Processor (Network Processor, NP), etc., or may be a digital signal Processor (DIGITAL SIGNAL Processor, DSP), application SPECIFIC INTEGRATED Circuit (ASIC), field-Programmable gate array (Field-Programmable GATE ARRAY, FPGA) or other Programmable logic device, discrete gate or transistor logic device, discrete hardware components.
In yet another embodiment provided by the present disclosure, there is also provided a computer-readable storage medium having stored therein a computer program which, when executed by a processor, implements the steps of any of the communication methods described above.
In yet another embodiment provided by the present disclosure, there is also provided a computer program product containing instructions that, when run on a computer, cause the computer to perform any of the communication methods of the above embodiments.
In the above embodiments, it may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When loaded and executed on a computer, produces a flow or function in accordance with embodiments of the present disclosure, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a computer network, or other programmable apparatus. The computer instructions may be stored in or transmitted from one computer-readable storage medium to another, for example, by wired (e.g., coaxial cable, optical fiber, digital Subscriber Line (DSL)), or wireless (e.g., infrared, wireless, microwave, etc.). The computer readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server, data center, etc. that contains an integration of one or more available media. The usable medium may be a magnetic medium (e.g., floppy disk, hard disk, tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., solid state disk Solid STATE DISK (SSD)), etc.
It is noted that relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises an element.
In this specification, each embodiment is described in a related manner, and identical and similar parts of each embodiment are all referred to each other, and each embodiment mainly describes differences from other embodiments. In particular, for the device, SIM card, electronic device and terminal device embodiments, since they are substantially similar to the method embodiments, the description is relatively simple, and reference should be made to the description of the method embodiments for relevant points.
The foregoing description is only of the preferred embodiments of the present disclosure, and is not intended to limit the scope of the present disclosure. Any modification, equivalent replacement, improvement, etc. made within the spirit and principles of the present disclosure are included in the protection scope of the present disclosure.
Claims (20)
Priority Applications (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202210837363.5A CN115811412B (en) | 2022-07-15 | 2022-07-15 | Communication method and device, SIM card, electronic equipment and terminal equipment |
| PCT/CN2022/142033 WO2024011863A1 (en) | 2022-07-15 | 2022-12-26 | Communication method and apparatus, sim card, electronic device, and terminal device |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202210837363.5A CN115811412B (en) | 2022-07-15 | 2022-07-15 | Communication method and device, SIM card, electronic equipment and terminal equipment |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN115811412A CN115811412A (en) | 2023-03-17 |
| CN115811412B true CN115811412B (en) | 2024-12-24 |
Family
ID=85482352
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202210837363.5A Active CN115811412B (en) | 2022-07-15 | 2022-07-15 | Communication method and device, SIM card, electronic equipment and terminal equipment |
Country Status (2)
| Country | Link |
|---|---|
| CN (1) | CN115811412B (en) |
| WO (1) | WO2024011863A1 (en) |
Families Citing this family (8)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20240146551A1 (en) * | 2022-11-02 | 2024-05-02 | At&T Intellectual Property I, L.P. | Method and apparatus for communicating with a metaverse device |
| CN119227703A (en) * | 2023-06-30 | 2024-12-31 | 华为技术有限公司 | Identity recognition method, QR code verification method and related equipment |
| CN117172772B (en) * | 2023-09-05 | 2024-12-27 | 深圳星火互娱数字科技有限公司 | Metaverse access method based on blockchain network and blockchain network device |
| CN117806465B (en) * | 2024-02-29 | 2024-06-04 | 南昌菱形信息技术有限公司 | An immersive digital experience method and system based on metaverse technology |
| CN118282663B (en) * | 2024-03-27 | 2025-01-24 | 贵州大学 | A first impression-based anti-disguise identity authentication method in the metaverse |
| CN118133259B (en) * | 2024-04-12 | 2024-12-20 | 苏州和数智能软件有限公司 | Meta-universe digital asset identity verification system |
| CN119299224B (en) * | 2024-12-10 | 2025-07-22 | 南京信息工程大学 | Meta universe cross-scene anonymous seamless identity authentication method based on double-block chain |
| CN120128436B (en) * | 2025-05-14 | 2025-07-29 | 杭州摩西科技发展有限公司 | Motion data safety management method and system in meta-universe intelligent motion |
Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN108696870A (en) * | 2018-04-26 | 2018-10-23 | 越亮传奇科技股份有限公司 | A kind of mobile terminal authentication method based on SWP-SIM technologies |
| CN111787530A (en) * | 2020-08-06 | 2020-10-16 | 联通雄安产业互联网有限公司 | Block chain digital identity management method based on SIM card |
Family Cites Families (11)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US8914854B2 (en) * | 2008-09-11 | 2014-12-16 | International Business Machines Corporation | User credential verification indication in a virtual universe |
| RU2013131684A (en) * | 2013-07-09 | 2015-01-20 | Иван Александрович Петриди | METHOD OF SERVICE mobile subscribers using the virtual subscriber identification module (SIM-VIRTUAL CARD) SYSTEM PROVIDING SERVICES COMMUNICATION MOBILE SUBSCRIBERS USING VIRTUAL MODELS subscriber identification (virtual SIM / USIM card) and computer readable medium |
| CN106161032B (en) * | 2015-04-24 | 2019-03-19 | 华为技术有限公司 | A kind of identity authentication method and device |
| CN108702603B (en) * | 2016-07-14 | 2020-12-25 | 华为技术有限公司 | Method and equipment for communication through virtual customer identification module |
| CN106997239A (en) * | 2016-10-13 | 2017-08-01 | 阿里巴巴集团控股有限公司 | Service implementation method and device based on virtual reality scenario |
| KR102044008B1 (en) * | 2019-05-07 | 2019-11-12 | 옥철식 | System for identity authentication and management in the virtual reality world |
| CN110493769A (en) * | 2019-07-05 | 2019-11-22 | 南京航空航天大学 | Cell-phone number security scheme based on lightweight Hash mapping |
| CN111859348B (en) * | 2020-07-31 | 2022-07-19 | 上海微位网络科技有限公司 | Identity authentication method and device based on user identification module and block chain technology |
| CN114338086B (en) * | 2021-12-03 | 2024-06-28 | 浙江毫微米科技有限公司 | Identity authentication method and device |
| CN114417421B (en) * | 2022-01-26 | 2024-08-20 | 深圳技术大学 | Shared information privacy protection method and related device based on meta universe |
| CN114666168B (en) * | 2022-05-23 | 2022-11-01 | 浙江毫微米科技有限公司 | Decentralized identity certificate verification method and device, and electronic equipment |
-
2022
- 2022-07-15 CN CN202210837363.5A patent/CN115811412B/en active Active
- 2022-12-26 WO PCT/CN2022/142033 patent/WO2024011863A1/en not_active Ceased
Patent Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN108696870A (en) * | 2018-04-26 | 2018-10-23 | 越亮传奇科技股份有限公司 | A kind of mobile terminal authentication method based on SWP-SIM technologies |
| CN111787530A (en) * | 2020-08-06 | 2020-10-16 | 联通雄安产业互联网有限公司 | Block chain digital identity management method based on SIM card |
Also Published As
| Publication number | Publication date |
|---|---|
| WO2024011863A1 (en) | 2024-01-18 |
| WO2024011863A9 (en) | 2024-02-29 |
| CN115811412A (en) | 2023-03-17 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN115811412B (en) | Communication method and device, SIM card, electronic equipment and terminal equipment | |
| CN112333198B (en) | Secure cross-domain login method, system and server | |
| CN111737724B (en) | Data processing method and device, intelligent equipment and storage medium | |
| US20220407720A1 (en) | Electronic identification verification methods and systems with storage of certification records to a side chain | |
| JP6877448B2 (en) | Methods and systems for guaranteeing computer software using distributed hash tables and blockchain | |
| JP6514831B1 (en) | Method and system for verifying ownership of digital assets using distributed hash tables and peer-to-peer distributed ledgers | |
| CN112671720A (en) | Token construction method, device and equipment for cloud platform resource access control | |
| TW201931275A (en) | Methods for access control of contract data in a distributed system with distributed consensus and contract generator and validation server thereof | |
| WO2018145127A1 (en) | Electronic identification verification methods and systems with storage of certification records to a side chain | |
| JP6543743B1 (en) | Management program | |
| CN111275419A (en) | Block chain wallet signature right confirming method, device and system | |
| CN114629713B (en) | Identity verification method, device and system | |
| CN111241492A (en) | Product multi-tenant secure credit granting method, system and electronic equipment | |
| CN107347073B (en) | A kind of resource information processing method | |
| CN112347516A (en) | Asset certification method and device based on block chain | |
| USRE49968E1 (en) | Electronic identification verification methods and systems with storage of certification records to a side chain | |
| CN113722749A (en) | Data processing method and device for block chain BAAS service based on encryption algorithm | |
| CN120017386A (en) | A cloud computing data secure transmission system and method | |
| WO2025020651A1 (en) | Data generation method, data processing method, data sending method, communication system, electronic terminal and storage medium | |
| US8755521B2 (en) | Security method and system for media playback devices | |
| KR102517001B1 (en) | System and method for processing digital signature on a blockchain network | |
| WO2024088145A1 (en) | Data processing method and apparatus, and program product, computer device and storage medium | |
| CN119096521A (en) | Systems and methods for facilitating secure authentication when performing blockchain operations using cryptography-based storage applications | |
| CN118590251A (en) | A data processing method, device, equipment and medium | |
| CN115361147A (en) | Device registration method and device, computer device and storage medium |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant |