未来网络中可信数字身份产业的发展 THE IEEE GLOBAL INITIATIVE ON TRUST TECHNOLOGY_第1页
未来网络中可信数字身份产业的发展 THE IEEE GLOBAL INITIATIVE ON TRUST TECHNOLOGY_第2页
未来网络中可信数字身份产业的发展 THE IEEE GLOBAL INITIATIVE ON TRUST TECHNOLOGY_第3页
未来网络中可信数字身份产业的发展 THE IEEE GLOBAL INITIATIVE ON TRUST TECHNOLOGY_第4页
未来网络中可信数字身份产业的发展 THE IEEE GLOBAL INITIATIVE ON TRUST TECHNOLOGY_第5页
已阅读5页,还剩37页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

INDUSTRYCONNECTIONS

REPORT

STANDARDS

AATN

THEIEEEGLOBALINITIATIVEONTRUSTTECHNOLOGY

THEDEVELOPMENTOFTHETRUSTEDDIGITALIDENTITY

INDUSTRYINFUTURENETWORKS

Authoredby

LifengZhangandYihuiZhang

Authorizedlicenseduselimitedto:IEEEXplore.DownloadedonDecember10,2024at02:48:48UTCfromIEEEXplore.Restrictionsapply.

TRADEMARKSANDDISCLAIMERS

IEEEbelievestheinformationinthispublicationisaccurateasofitspublicationdate;suchinformationissubjecttochangewithoutnotice.IEEEisnotresponsibleforanyinadvertenterrors.

Theideasandproposalsinthisspecificationaretherespectiveauthor’sviewsanddonotrepresenttheviewsoftheaffiliatedorganization.

ACKNOWLEDGMENTS

Specialthanksaregiventothefollowingreviewersofthispaper:

AngBoonChong

ChengkangChuXueqinJia

TingtingLiuBoLv

WeizhiMeng

YiPan

WeiweiPangLongShi

XiaojiaSongNinaWang

YangXiang

LiangliangZhangYifengZhang

HangZhouJintaoZhu

TheInstituteofElectricalandElectronicsEngineers,Inc.3ParkAvenue,NewYork,NY10016-5997,USACopyright©2024byTheInstituteofElectricalandElectronicsEngineers,Inc.

Allrightsreserved.30October2024.PrintedintheUnitedStatesofAmerica.

PDF:STDVA27435979-8-8557-1388-6

IEEEisaregisteredtrademarkintheU.S.Patent&TrademarkOffice,ownedbyTheInstituteofElectricalandElectronicsEngineers,Incorporated.Allothertrademarksarethepropertyoftherespectivetrademarkowners.

IEEEprohibitsdiscrimination,harassment,andbullying.Formoreinformation,visit

/web/aboutus/whatis/policies/p9-26.html.

Nopartofthispublicationmaybereproducedinanyform,inanelectronicretrievalsystem,orotherwise,withoutthepriorwrittenpermissionofthepublisher.

FindIEEEstandardsandstandards-relatedproductlistingsat

:.

2IEEESAINDUSTRYCONNECTIONSCopyright©2024IEEE.Allrightsreserved.

Authorizedlicenseduselimitedto:IEEEXplore.DownloadedonDecember10,2024at02:48:48UTCfromIEEEXplore.Restrictionsapply.

NOTICEANDDISCLAIMEROFLIABILITYCONCERNINGTHE

USEOFIEEESAINDUSTRYCONNECTIONSDOCUMENTS

ThisIEEEStandardsAssociation(“IEEESA”)IndustryConnectionspublication(“Work”)isnotaconsensusstandarddocument.Specifically,thisdocumentisNOTANIEEESTANDARD.InformationcontainedinthisWorkhasbeencreatedby,orobtainedfrom,sourcesbelievedtobereliable,andreviewedbymembersoftheIEEESAIndustryConnectionsactivitythatproducedthisWork.IEEEandtheIEEESAIndustryConnectionsactivitymembersexpresslydisclaimallwarranties(express,implied,andstatutory)relatedtothisWork,including,butnotlimitedto,thewarrantiesof:merchantability;fitnessforaparticularpurpose;non-infringement;quality,accuracy,effectiveness,currency,orcompletenessoftheWorkorcontentwithintheWork.Inaddition,IEEEandtheIEEESAIndustryConnectionsactivitymembersdisclaimanyandallconditionsrelatingto:results;andworkmanlikeeffort.ThisIEEESAIndustryConnectionsdocumentissupplied“ASIS”and“WITHALLFAULTS.”

AlthoughtheIEEESAIndustryConnectionsactivitymemberswhohavecreatedthisWorkbelievethattheinformationandguidancegiveninthisWorkserveasanenhancementtousers,allpersonsmustrelyupontheirownskillandjudgmentwhenmakinguseofit.INNOEVENTSHALLIEEEORIEEESAINDUSTRYCONNECTIONSACTIVITYMEMBERSBELIABLEFORANYERRORSOROMISSIONSORDIRECT,INDIRECT,INCIDENTAL,SPECIAL,EXEMPLARY,ORCONSEQUENTIALDAMAGES(INCLUDING,BUTNOTLIMITEDTO:PROCUREMENTOFSUBSTITUTEGOODSORSERVICES;LOSSOFUSE,DATA,ORPROFITS;ORBUSINESSINTERRUPTION)HOWEVERCAUSEDANDONANYTHEORYOFLIABILITY,WHETHERINCONTRACT,STRICTLIABILITY,ORTORT(INCLUDINGNEGLIGENCEOROTHERWISE)ARISINGINANYWAYOUTOFTHEUSEOFTHISWORK,EVENIFADVISEDOFTHEPOSSIBILITYOFSUCHDAMAGEANDREGARDLESSOFWHETHERSUCHDAMAGEWASFORESEEABLE.

Further,informationcontainedinthisWorkmaybeprotectedbyintellectualpropertyrightsheldbythirdpartiesororganizations,andtheuseofthisinformationmayrequiretheusertonegotiatewithanysuchrightsholdersinordertolegallyacquiretherightstodoso,andsuchrightsholdersmayrefusetograntsuchrights.AttentionisalsocalledtothepossibilitythatimplementationofanyorallofthisWorkmayrequireuseofsubjectmattercoveredbypatentrights.BypublicationofthisWork,nopositionistakenbytheIEEEwithrespecttotheexistenceorvalidityofanypatentrightsinconnectiontherewith.TheIEEEisnotresponsibleforidentifyingpatentrightsforwhichalicensemayberequired,orforconductinginquiriesintothelegalvalidityorscopeofpatentsclaims.Usersareexpresslyadvisedthatdeterminationofthevalidityofanypatentrights,andtheriskofinfringementofsuchrights,isentirelytheirownresponsibility.Nocommitmenttograntlicensesunderpatentrightsonareasonableornon-discriminatorybasishasbeensoughtorreceivedfromanyrightsholder.Thepoliciesandproceduresunderwhichthisdocumentwascreatedcanbeviewedat

/about/sasb/iccom/.

ThisWorkispublishedwiththeunderstandingthatIEEEandtheICCommembersaresupplyinginformationthroughthisWork,notattemptingtorenderengineeringorotherprofessionalservices.Ifsuchservicesarerequired,theassistanceofanappropriateprofessionalshouldbesought.IEEEisnotresponsibleforthestatementsandopinionsadvancedinthisWork.

3IEEESAINDUSTRYCONNECTIONSCopyright©2024IEEE.Allrightsreserved.

Authorizedlicenseduselimitedto:IEEEXplore.DownloadedonDecember10,2024at02:48:48UTCfromIEEEXplore.Restrictionsapply.

ABSTRACT 5

1.INTRODUCTIONOFNETWORKIDENTITY 6

1.1.INTERNETNETWORKIDENTITY 6

1.2.COMMUNICATIONNETWORKIDENTITY 7

FIGURE1EVOLUTIONOFDIGITALIDENTITYINMOBILECOMMUNICATION

NETWORKS 9

2.INSIGHTSINTOFUTURENETWORKIDENTITY 9

2.1.THEINTEGRATIONTREND 9

2.2.THEAPPLICATIONTREND 10

2.3.THETECHNOLOGYTREND 12

2.4.THEINDUSTRYTREND 14

2.4.1.OVERVIEW 14

2.4.2.INTERNET-BASEDFUTURENETWORKIDENTITY 14

2.4.3.COMMUNICATION-BASEDFUTURENETWORKIDENTITY 15

3.THETRUSTEDDIGITALIDENTITY 15

3.1.DEFINITIONOFTRUSTEDDIGITALIDENTITY 15

3.2.KEYINDICATORS 16

4.FUTURECONSIDERATIONS 18

4.1.DEVELOPMENTSUMMARY 18

4.2.TRENDOUTLOOK 19

5.REFERENCES 20

TABLEOFCONTENTS

Authorizedlicenseduselimitedto:IEEEXplore.DownloadedonDecember10,2024at02:48:48UTCfromIEEEXplore.Restrictionsapply.

THEDEVELOPMENTOFTHETRUSTED

DIGITALIDENTITYINDUSTRYINFUTURENETWORKS

ABSTRACT

Asdigitalizationandintelligenceadvance,communicationisexpandingfromthephysicalworldtointeractionsbetweenthephysicalanddigitalworlds.Thefocusisshiftingfromhuman-to-humantomulti-modalinteractionsinvolvinghuman-to-digitalentities/robotsanddigitalentity-to-digitalentitycommunications.Thisshiftnecessitatesnewdigitalidentitytechnologies,whicharebecomingcrucialforestablishingtrustandconnectivitybetweentheseworldsandsupportingalldigitalactivities.

Withtheadventofconceptslikethenext-generationinternet(Web3.0)andnext-generationcommunicationnetworks(6G),networkidentityisundergoingsubtlechanges,withtrustemergingasacentralelement.Ensuringnetworksecurity,simplifyingaccesscontrolanddataencryptionprocessesamongmultipleentities,andsupportingtheconstructionofanopen,shared,andsecurecyberspacecommunityisessential.Additionally,pervasivecross-domainaccessrequirestrustendorsementsforusers’socialattributes,andbuildingaglobaltrustframeworkusingtechnologieslikeblockchainanddistributeddigitalidentitiesiscrucialforenhancingtheuniversalityandextensibilityofusercredentials.Trustbarriersbetweendomainscanbeovercomewithhelpfromthisframework,whileusersreceivemoreflexibleandcost-effectiveaccessoptions.

Thehistoricaldevelopmentofinformationandcommunicationnetworkidentity,aswellasinsightsintonetworkidentitytechnologies,applications,andindustrytrendsarereviewedinthisreport.Currentapproachestoimplementingdigitalidentityinfuturenetworksareoutlined,anddefinitionsandkeymetricsfortrustworthydigitalidentitiesinfuturenetworksareproposed.Additionally,aforward-lookingperspectiveonfuturedevelopmentsisprovided.

5IEEESAINDUSTRYCONNECTIONSCopyright©2024IEEE.Allrightsreserved.

Authorizedlicenseduselimitedto:IEEEXplore.DownloadedonDecember10,2024at02:48:48UTCfromIEEEXplore.Restrictionsapply.

1.INTRODUCTIONOFNETWORKIDENTITY

1.1.INTERNETNETWORKIDENTITY

Theconceptoftrustednetworkdigitalidentityhasevolvedalongsidethedevelopmentofcommunicationtechnology(CT)andinformationtechnology(IT).

ThenativeITInternetProtocols(IPs)lackanidentitylayer,meaningthatinternetusersdonothaveanativedigitalidentity.Whentheinternetwasinitiallydesigned,itonlyprovidedidentityidentifiersforcomputernodes,whichweremanagedbycentralizedauthoritativeinstitutions.Forexample,theIEEEassignsMediaAccessControl(MAC)addressestonetworkdevices,ensuringthateachdevicehasauniquehardwareidentifier.TheInternetAssignedNumbersAuthority(IANA)managesIPaddresses,whicharelogicaladdressesusedtoidentifydevicesonanetwork.TheInternetCorporationforAssignedNamesandNumbers(ICANN)managesdomainnames,convertsuser-friendlydomainnamesintomachine-readableIPaddresses,andenablesuserstoaccessresourcesontheinternet.Additionally,theidentityauthenticationofcommercialwebsitesishandledbycertificateauthorities(CAs).Since1995,CAshavebeenissuingsecuritycertificatestoensurethesecurityandtrustworthinessofwebsites.

Theseorganizationsandprotocolstogetherformthebasicpatchworkoftheinternet’sidentityrecognitionandmanagementsystem.Whilethisensuresorderlynetworkoperationandsecureinformationexchange,theinternethasnowbecomeaglobalinfrastructureoperatinginafullyopenandcomplexenvironment.ByDecember2022,therewerealready4.95billioninternetusersworldwide(Ayed

[1])

.

1

However,thenativeInternetProtocolsstilllackasecondaryconfirmationmechanisminthecommunicationnetwork,whereidentityisverifiedthroughvoiceandreal-timeinteractiveinformation.Withtherapidcommercializationoftheinternet,relyingonexternalforcesandcentralizedmanagementforsecurityandtrustisnolongerfeasible.

Inparticular,thenext-generationinternet(Web3.0)emphasizestheconceptoftheinternetofvalue,whichinvolveseconomicactivitiessuchase-commerce,dataassetcirculation,anddigitalassetexchanges.Fromaneconomicperspective,trustisfundamentaltoeconomicactivities,andtrustedidentityisthefoundationofalldigitaltrust.Therefore,fromtheperspectiveoftheinternet,establishingatrusteddigitalidentityisimperative.

1ThenumbersinbracketscorrespondtothoseofthereferencesinSection

5.

6IEEESAINDUSTRYCONNECTIONSCopyright©2024IEEE.Allrightsreserved.

Authorizedlicenseduselimitedto:IEEEXplore.DownloadedonDecember10,2024at02:48:48UTCfromIEEEXplore.Restrictionsapply.

1.2.COMMUNICATIONNETWORKIDENTITY

Theintegrationofcommunicationnetworktechnologywithdigitalidentitytechnologyhasevolved.Thefirstgenerationofmobilecommunicationtechnology(1G)introduceddigitalidentitytechnologytoidentifyentities,thoughsignificantsecurityvulnerabilitiesremained.Forinstance,1Gtechnology,representedbytheAdvancedMobilePhoneSystem(AMPS),wasananalogcellularmobilecommunicationsystem.However,withinthissystem,usersanddeviceswerestillassigneddigitalidentifiers.Usersweregivenauniquemobileidentificationnumber(MIN)byoperators,whileterminaldeviceswereidentifiedbyanelectronicserialnumber(ESN)assignedbymanufacturers.Whenauserconnectedaterminaldevicetothecommunicationnetwork,theESNandMINweretransmittedinplaintext.Thisledtowidespreadillegalphonecloning,posingmajorsecurityrisksaffectingbothusersandoperators.

Thesecondgenerationofmobilecommunicationtechnology(2G)pioneeredtheseparationofdeviceandSubscriberIdentityModule(SIM)cardidentity,effectivelyreducingsecurityrisks.2Gtechnology,representedbyGlobalSystemforMobileCommunications(GSM),introducedtheinnovativedevice-SIMseparationapproach,whereamobilephoneandSIMcardtogetherformedthemobilecommunicationterminal.Thisseparationbroughtthefollowingfourkeybenefits:

First,theSIMcardprovidedstorageforuserdata,includingidentityinformationandencryptionkeys.ThisallowedtheGSMnetworktoauthenticatetheuserandencryptvoicedataduringcalls,preventingphonecloningandeavesdropping.

Second,itseparatedtheidentifiersforusers,services,anddevices.Theinternationalmobileequipmentidentity(IMEI)identifiedtheterminaldevice,theinternationalmobilesubscriberidentity(IMSI)storedontheSIMcarduniquelyidentifiedtheuserforauthentication,andtheMobileStationInternationalISDNNumber(MSISDN)servedastheserviceidentifierforphonecalls.

Third,theintroductionofSIMcardsalloweduserstoreplacelostSIMcardswithoutaffectingtheirphonenumbers,astheIMSIwouldchangebutnottheMSISDN.

Fourth,itprotecteduserprivacythroughtheintroductionoftheTemporaryMobileSubscriberIdentity(TMSI),whichreducedtheexposureofIMSIduringtransmissionsovertheair.

Thethirdgenerationofmobilecommunicationtechnology(3G)introducedmutualauthenticationcapabilitiesandexpandedserviceidentifiers.3Gtechnology,representedbywidebandcodedivisionmultipleaccess

7IEEESAINDUSTRYCONNECTIONSCopyright©2024IEEE.Allrightsreserved.

Authorizedlicenseduselimitedto:IEEEXplore.DownloadedonDecember10,2024at02:48:48UTCfromIEEEXplore.Restrictionsapply.

(WCDMA),upgradedSIMcardstouniversalsubscriberidentitymodules(USIMs)andenabledmutualauthenticationbetweentheterminalandthenetwork.AlthoughtheIMEIstillidentifiedthedeviceandIMSIidentifiedtheuser,3Gnetworksexpandedserviceidentifierstocoverbothcircuit-switched(CS)andpacket-switched(PS)services.TheMSISDNwasusedforCSservices,whiletheaccesspointname(APN)wasintroducedforPSservices.

Thefourthgenerationofmobilecommunicationtechnology(4G)introducednewIPmultimediaidentities,enablingunifiedcommunicationandidentitymanagementbasedonIP.4Gtechnology,representedbyLTE,discontinuedtheevolutionoftheCSdomain,withtheIPMultimediaSubsystem(IMS)domaintakingoveraudioandvideoservices.IntheIMSdomain,theIPmultimediaprivateidentity(IMPI)uniquelyidentifiedtheuserforpurposessuchasregistration,authorization,andbilling,whiletheinternationalmobilesubscriberidentity(IMSI)couldbeembeddedintheIMPI.TheIPmultimediapublicidentity(IMPU)wasusedastheuser’sserviceidentifierintheIMSnetwork,presentedintheformofaSessionInitiationProtocolUniformResourceIdentifier(SIPURI)oratelephoneURIcontainingtheuser’sMSISDN.

Thefifthgenerationofmobilecommunicationtechnology(5G)introducednewserviceidentifiers,enablingsecureandflexiblenetworkslicingservicesandunifieduseridentitymanagement(Lian,Kang,andYang

[2])

.In5Gnetworks,thesubscriptionpermanentidentifier(SUPI),equivalenttoLTE’sIMSI,isnevertransmittedovertheairtopreventusertracking.Instead,thesubscriptionconcealedidentifier(SUCI),aprivacy-protectedidentifiercontainingaconcealedSUPI,isusedfortransmissionovertheair.Everyterminaldeviceconnectedtothe5Gnetworkisassignedapermanentequipmentidentifier(PEI),equivalenttoLTE’sIMEI.Serviceidentifiersincludethedatanetworkname(DNN),correspondingtoLTE’sAPN,andthenewsinglenetworksliceselectionassistanceinformation(S-NSSAI),whichidentifiesnetworkslicesforservices.IntheIMSdomain,IMPIandIMPUcontinuetobeusedforuserandserviceidentifiers.

8IEEESAINDUSTRYCONNECTIONSCopyright©2024IEEE.Allrightsreserved.

Authorizedlicenseduselimitedto:IEEEXplore.DownloadedonDecember10,2024at02:48:48UTCfromIEEEXplore.Restrictionsapply.

1G

2G

4G

5G

3G

ESN

IMEI

IMEI

IMEI

PEI

DEVICE

IMSI

IMSI

IMSI

SUPI

SUCI

GUTI

IMPI

USER

MIN

TMSI

TMSI

TMSI

IMPI

MSISD

MSISD

APN

IMPU

APN

IMPU

DNN

S-NSSAI

BUSINESS

FIGURE1EVOLUTIONOFDIGITALIDENTITYINMOBILE

COMMUNICATIONNETWORKS

Overall,theevolutionfrom1Gto5Ghasseenadeepeningintegrationofdigitalidentitytechnologywithmobilecommunicationnetworks,effectivelyachievingtheseparationandindependentdevelopmentofdeviceidentifiers,useridentifiers,andserviceidentifiers.Lookingahead,whilethesystemcenteredarounduseridentifiersisexpectedtocontinue,thediversificationofnetworkterminalsandtheexpansionofservicetypeswillleadtofurtherinnovationandchangesinthespecificformsofuseridentifiers,deviceidentifiers,andserviceidentifiers.Accordingly,digitalidentitytechnologyinmobilenetworkswillfollowthisdevelopmenttrend,continuouslyevolvingtomeetnewchallengesanddemands.

2.INSIGHTSINTOFUTURENETWORKIDENTITY

2.1.THEINTEGRATIONTREND

Networkdigitalidentityfacilitatesthecreationofnewtrustrelationshipsandthedevelopmentofadigitaltrustsystemframework.Trustisfundamentaltoeconomicactivitiesandservesastheadhesiveinsocialrelationships.Inagriculturalsocieties,trustwasbuiltthroughpersonalconnectionsbasedonkinshipandlocality.Associetiestransitionedtoindustrialization,theemergenceof“trustcredentials”suchasmoneyandassetsgaverisetoinstitutionaltrustregulatedbylegalsystems.Today,withtheadventofthedigitaleconomy,theintroductionof

9IEEESAINDUSTRYCONNECTIONSCopyright©2024IEEE.Allrightsreserved.

Authorizedlicenseduselimitedto:IEEEXplore.DownloadedonDecember10,2024at02:48:48UTCfromIEEEXplore.Restrictionsapply.

digitaltechnologieshasmovedmanyeconomicactivities,interactions,andpersonalassetsonline,creatinganewformofdigitaltrustbasedontechnology.Digitalidentitytechnologyisincreasinglybecomingacorecomponentofdigitaltrustsystems,supportingtrustrelationshipsindigitalspaces.Manydigitaltrustresearchinstitutionsworldwidearefocusedonconstructingframeworksfordigitaltrustsystemscenteredarounddigitalidentity.

Withthedevelopmentofdigitaltechnologiesandthedemandsofthedigitaleconomy,theintegrationofinformationandcommunicationtechnology(ICT)hasbecomeagiven.Intheearly1990s,theglobalspreadoftheinternetenabledpeopletoconnectthroughcomputersandnetworkstoaccessandshareinformation,layingthegroundworkfortheintegrationofcommunicationtechnology(CT)andinformationtechnology(IT).Bytheearly2000s,cloudcomputingtechnologyhadmaturedandbecomewidelyadopted,allowingCTandITenterprisestoshareinfrastructure,storage,anddata-processingcapabilities,solidifyingtheirintegrateddevelopment.Today,withtheriseofartificialintelligenceandtheInternetofThings,bothITandCTtechnologieshaveadvancedtoanewlevel,heraldinganeraofcomprehensiveintegration.Thisintegrationismoreurgentandrapidthanever,especiallyinthecontextofacceleratingdigitaleconomicdevelopmentandtheintelligenttransformationofvariousindustries.

Asacorecomponentforentitiesaccessingnetworks,digitalidentityplaysacrucialroleinbridgingthevirtualandphysicalworlds.Accurateidentificationbasedondigitalidentityhelpsensurenetworksecurityandtrustmechanisms,simplifiesaccesscontrolanddataflowbetweenvariousentities,andfostersstabledigitalinteractionrelationships.Globally,thereisactiveresearchandexplorationintonetworkdigitalidentitytechnologiesandtheirpracticalapplications.

2.2.THEAPPLICATIONTREND

Asvirtualhumansandrobotsemergeasnewtypesofvirtualandphysicalentities,theywillconnecttonetworksthroughincreasinglydiversemechanisms.Thiswilldrivefurtherupdatesandrapiddevelopmentofnetworktechnologiesthatsupporttheiridentityaccess,leadingtotherapidformationoffuturenetworksystems.Digitalidentity,asacorecomponentofentityaccess,playsacrucialroleinbridgingthevirtualandphysicalworlds.Itnotonlyhelpstoensurenetworksecurityandtrustbutalsosimplifiesaccesscontrolanddataencryptionprocessesbetweenvariousentities.Thedemandforitsapplicationisbecomingincreasinglyurgent.Therefore,theinnovativeapplicationandstandardizeddevelopmentofdigitalidentitywillprovidesolidsupportforconstructinganopen,shared,andsecurecyberspacecommunity.

10IEEESAINDUSTRYCONNECTIONSCopyright©2024IEEE.Allrightsreserved.

Authorizedlicenseduselimitedto:IEEEXplore.DownloadedonDecember10,2024at02:48:48UTCfromIEEEXplore.Restrictionsapply.

Scenario1:Virtualhumanidentityauthenticationandmanagementneeds—Virtualhumans,aspersonalintelligentassistants,areexpectedtobecomewidespread.However,virtualhumanslackphysicaltrustanchors,makingitessentialtoensuretheirtrustworthyaccesstonetworks.Additionally,duetotheinherentreplicationcharacteristicsofvirtualhumans,verifyingtheresponsibilityfortheiractionsisalsoanimportantmanagementrequirement.

Scenario2:Fine-grainedauthorizationforintelligentagents—Withtheadvancementandapplicationofartificialintelligencetechnology,theissueofAIinterpretabilityisreceivingincreasingattention.Explainingtherelationshipbetweeninputandoutputremainsachallengeacrosstheindustry.Intelligentagentsoftenexhibitadegreeofunpredictabilityintheirbehavior.Toeffectivelyaddressthecomplexityofintelligentagents’behavioranddecision-makingandhelpensuretheiractionsaresafeandcompliant,thereisapressingneedforanauthorizationmanagementsystemthatcanimplementprecisebehaviorcontrol.Thissystemaimstopreventpotentialharmthatintelligentagents,suchasembodiedrobots,mightcausetohumansortheenvironment,andtoavoidtheexcessiveleakageofsensitivepersonalinformationbyintelligentagents,suchasvirtualdigitalassistants.

Scenario3:Diversifieddigitalidentityneeds—Inthefuture,userdigitalidentitieswillextendbeyondsimpleidentityverification.Thescopeandcontentofidentitieswillbecomemorediverse,includingawiderrangeofusercredentialinformation,suchaspublickeycertificatesandattributecertificates.Theformercanprovetheuser’sidentitythroughtheirpublickeyinformation,whilethelattercandemonstrateattributessuchassocialandnaturalcharacteristics.Thiswillprovideuserswithmorecomprehensiveservicesandsupportforaccessingthedigitalworld.

Scenario4:Ubiquitoustrustacrossindustries—Asthespeedofinformationandcommunicationtechnology(ICT)integrationaccelerates,theboundariesbetweencommunicationnetworksandtheinternetarebecomingincreasinglyblurred.Withthefocusonfuturenetworks,thereisaneedtoaddresscross-scenario,industry,andbusinesstrustrequirements.Thisinvolvesexploringfuturenetworkdigitalidentitytechnologiesthatmeetcross-industryandcross-domaintrustneeds,basedonsolvinguseridentityconnection-recognitionissues.Forexample,inafuturenetworkwheredigitalidentityiscentral,atelecombusinessattributecertificatemightbeusedinnon-telecomcontexts,whiletelecombusiness-issuedattributecertificatesmightbepresentedineverydaylifescenarios,providinguserswithafoundationforcross-industryandcross-domainubiquitoustrustandsolvingmutualtrustchallengesinvariousindustry

scenarios.

11IEEESAINDUSTRYCONNECTIONSCopyright©2024IEEE.Allrightsreserved.

Authorizedlicenseduselimitedto:IEEEXplore.DownloadedonDecember10,2024at02:48:48UTCfromIEEEXplore.Restrictionsapply.

2.3.

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论