版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
INDUSTRYCONNECTIONS
REPORT
STANDARDS
AATN
THEIEEEGLOBALINITIATIVEONTRUSTTECHNOLOGY
THEDEVELOPMENTOFTHETRUSTEDDIGITALIDENTITY
INDUSTRYINFUTURENETWORKS
Authoredby
LifengZhangandYihuiZhang
Authorizedlicenseduselimitedto:IEEEXplore.DownloadedonDecember10,2024at02:48:48UTCfromIEEEXplore.Restrictionsapply.
TRADEMARKSANDDISCLAIMERS
IEEEbelievestheinformationinthispublicationisaccurateasofitspublicationdate;suchinformationissubjecttochangewithoutnotice.IEEEisnotresponsibleforanyinadvertenterrors.
Theideasandproposalsinthisspecificationaretherespectiveauthor’sviewsanddonotrepresenttheviewsoftheaffiliatedorganization.
ACKNOWLEDGMENTS
Specialthanksaregiventothefollowingreviewersofthispaper:
AngBoonChong
ChengkangChuXueqinJia
TingtingLiuBoLv
WeizhiMeng
YiPan
WeiweiPangLongShi
XiaojiaSongNinaWang
YangXiang
LiangliangZhangYifengZhang
HangZhouJintaoZhu
TheInstituteofElectricalandElectronicsEngineers,Inc.3ParkAvenue,NewYork,NY10016-5997,USACopyright©2024byTheInstituteofElectricalandElectronicsEngineers,Inc.
Allrightsreserved.30October2024.PrintedintheUnitedStatesofAmerica.
PDF:STDVA27435979-8-8557-1388-6
IEEEisaregisteredtrademarkintheU.S.Patent&TrademarkOffice,ownedbyTheInstituteofElectricalandElectronicsEngineers,Incorporated.Allothertrademarksarethepropertyoftherespectivetrademarkowners.
IEEEprohibitsdiscrimination,harassment,andbullying.Formoreinformation,visit
/web/aboutus/whatis/policies/p9-26.html.
Nopartofthispublicationmaybereproducedinanyform,inanelectronicretrievalsystem,orotherwise,withoutthepriorwrittenpermissionofthepublisher.
FindIEEEstandardsandstandards-relatedproductlistingsat
:.
2IEEESAINDUSTRYCONNECTIONSCopyright©2024IEEE.Allrightsreserved.
Authorizedlicenseduselimitedto:IEEEXplore.DownloadedonDecember10,2024at02:48:48UTCfromIEEEXplore.Restrictionsapply.
NOTICEANDDISCLAIMEROFLIABILITYCONCERNINGTHE
USEOFIEEESAINDUSTRYCONNECTIONSDOCUMENTS
ThisIEEEStandardsAssociation(“IEEESA”)IndustryConnectionspublication(“Work”)isnotaconsensusstandarddocument.Specifically,thisdocumentisNOTANIEEESTANDARD.InformationcontainedinthisWorkhasbeencreatedby,orobtainedfrom,sourcesbelievedtobereliable,andreviewedbymembersoftheIEEESAIndustryConnectionsactivitythatproducedthisWork.IEEEandtheIEEESAIndustryConnectionsactivitymembersexpresslydisclaimallwarranties(express,implied,andstatutory)relatedtothisWork,including,butnotlimitedto,thewarrantiesof:merchantability;fitnessforaparticularpurpose;non-infringement;quality,accuracy,effectiveness,currency,orcompletenessoftheWorkorcontentwithintheWork.Inaddition,IEEEandtheIEEESAIndustryConnectionsactivitymembersdisclaimanyandallconditionsrelatingto:results;andworkmanlikeeffort.ThisIEEESAIndustryConnectionsdocumentissupplied“ASIS”and“WITHALLFAULTS.”
AlthoughtheIEEESAIndustryConnectionsactivitymemberswhohavecreatedthisWorkbelievethattheinformationandguidancegiveninthisWorkserveasanenhancementtousers,allpersonsmustrelyupontheirownskillandjudgmentwhenmakinguseofit.INNOEVENTSHALLIEEEORIEEESAINDUSTRYCONNECTIONSACTIVITYMEMBERSBELIABLEFORANYERRORSOROMISSIONSORDIRECT,INDIRECT,INCIDENTAL,SPECIAL,EXEMPLARY,ORCONSEQUENTIALDAMAGES(INCLUDING,BUTNOTLIMITEDTO:PROCUREMENTOFSUBSTITUTEGOODSORSERVICES;LOSSOFUSE,DATA,ORPROFITS;ORBUSINESSINTERRUPTION)HOWEVERCAUSEDANDONANYTHEORYOFLIABILITY,WHETHERINCONTRACT,STRICTLIABILITY,ORTORT(INCLUDINGNEGLIGENCEOROTHERWISE)ARISINGINANYWAYOUTOFTHEUSEOFTHISWORK,EVENIFADVISEDOFTHEPOSSIBILITYOFSUCHDAMAGEANDREGARDLESSOFWHETHERSUCHDAMAGEWASFORESEEABLE.
Further,informationcontainedinthisWorkmaybeprotectedbyintellectualpropertyrightsheldbythirdpartiesororganizations,andtheuseofthisinformationmayrequiretheusertonegotiatewithanysuchrightsholdersinordertolegallyacquiretherightstodoso,andsuchrightsholdersmayrefusetograntsuchrights.AttentionisalsocalledtothepossibilitythatimplementationofanyorallofthisWorkmayrequireuseofsubjectmattercoveredbypatentrights.BypublicationofthisWork,nopositionistakenbytheIEEEwithrespecttotheexistenceorvalidityofanypatentrightsinconnectiontherewith.TheIEEEisnotresponsibleforidentifyingpatentrightsforwhichalicensemayberequired,orforconductinginquiriesintothelegalvalidityorscopeofpatentsclaims.Usersareexpresslyadvisedthatdeterminationofthevalidityofanypatentrights,andtheriskofinfringementofsuchrights,isentirelytheirownresponsibility.Nocommitmenttograntlicensesunderpatentrightsonareasonableornon-discriminatorybasishasbeensoughtorreceivedfromanyrightsholder.Thepoliciesandproceduresunderwhichthisdocumentwascreatedcanbeviewedat
/about/sasb/iccom/.
ThisWorkispublishedwiththeunderstandingthatIEEEandtheICCommembersaresupplyinginformationthroughthisWork,notattemptingtorenderengineeringorotherprofessionalservices.Ifsuchservicesarerequired,theassistanceofanappropriateprofessionalshouldbesought.IEEEisnotresponsibleforthestatementsandopinionsadvancedinthisWork.
3IEEESAINDUSTRYCONNECTIONSCopyright©2024IEEE.Allrightsreserved.
Authorizedlicenseduselimitedto:IEEEXplore.DownloadedonDecember10,2024at02:48:48UTCfromIEEEXplore.Restrictionsapply.
ABSTRACT 5
1.INTRODUCTIONOFNETWORKIDENTITY 6
1.1.INTERNETNETWORKIDENTITY 6
1.2.COMMUNICATIONNETWORKIDENTITY 7
FIGURE1EVOLUTIONOFDIGITALIDENTITYINMOBILECOMMUNICATION
NETWORKS 9
2.INSIGHTSINTOFUTURENETWORKIDENTITY 9
2.1.THEINTEGRATIONTREND 9
2.2.THEAPPLICATIONTREND 10
2.3.THETECHNOLOGYTREND 12
2.4.THEINDUSTRYTREND 14
2.4.1.OVERVIEW 14
2.4.2.INTERNET-BASEDFUTURENETWORKIDENTITY 14
2.4.3.COMMUNICATION-BASEDFUTURENETWORKIDENTITY 15
3.THETRUSTEDDIGITALIDENTITY 15
3.1.DEFINITIONOFTRUSTEDDIGITALIDENTITY 15
3.2.KEYINDICATORS 16
4.FUTURECONSIDERATIONS 18
4.1.DEVELOPMENTSUMMARY 18
4.2.TRENDOUTLOOK 19
5.REFERENCES 20
TABLEOFCONTENTS
Authorizedlicenseduselimitedto:IEEEXplore.DownloadedonDecember10,2024at02:48:48UTCfromIEEEXplore.Restrictionsapply.
THEDEVELOPMENTOFTHETRUSTED
DIGITALIDENTITYINDUSTRYINFUTURENETWORKS
ABSTRACT
Asdigitalizationandintelligenceadvance,communicationisexpandingfromthephysicalworldtointeractionsbetweenthephysicalanddigitalworlds.Thefocusisshiftingfromhuman-to-humantomulti-modalinteractionsinvolvinghuman-to-digitalentities/robotsanddigitalentity-to-digitalentitycommunications.Thisshiftnecessitatesnewdigitalidentitytechnologies,whicharebecomingcrucialforestablishingtrustandconnectivitybetweentheseworldsandsupportingalldigitalactivities.
Withtheadventofconceptslikethenext-generationinternet(Web3.0)andnext-generationcommunicationnetworks(6G),networkidentityisundergoingsubtlechanges,withtrustemergingasacentralelement.Ensuringnetworksecurity,simplifyingaccesscontrolanddataencryptionprocessesamongmultipleentities,andsupportingtheconstructionofanopen,shared,andsecurecyberspacecommunityisessential.Additionally,pervasivecross-domainaccessrequirestrustendorsementsforusers’socialattributes,andbuildingaglobaltrustframeworkusingtechnologieslikeblockchainanddistributeddigitalidentitiesiscrucialforenhancingtheuniversalityandextensibilityofusercredentials.Trustbarriersbetweendomainscanbeovercomewithhelpfromthisframework,whileusersreceivemoreflexibleandcost-effectiveaccessoptions.
Thehistoricaldevelopmentofinformationandcommunicationnetworkidentity,aswellasinsightsintonetworkidentitytechnologies,applications,andindustrytrendsarereviewedinthisreport.Currentapproachestoimplementingdigitalidentityinfuturenetworksareoutlined,anddefinitionsandkeymetricsfortrustworthydigitalidentitiesinfuturenetworksareproposed.Additionally,aforward-lookingperspectiveonfuturedevelopmentsisprovided.
5IEEESAINDUSTRYCONNECTIONSCopyright©2024IEEE.Allrightsreserved.
Authorizedlicenseduselimitedto:IEEEXplore.DownloadedonDecember10,2024at02:48:48UTCfromIEEEXplore.Restrictionsapply.
1.INTRODUCTIONOFNETWORKIDENTITY
1.1.INTERNETNETWORKIDENTITY
Theconceptoftrustednetworkdigitalidentityhasevolvedalongsidethedevelopmentofcommunicationtechnology(CT)andinformationtechnology(IT).
ThenativeITInternetProtocols(IPs)lackanidentitylayer,meaningthatinternetusersdonothaveanativedigitalidentity.Whentheinternetwasinitiallydesigned,itonlyprovidedidentityidentifiersforcomputernodes,whichweremanagedbycentralizedauthoritativeinstitutions.Forexample,theIEEEassignsMediaAccessControl(MAC)addressestonetworkdevices,ensuringthateachdevicehasauniquehardwareidentifier.TheInternetAssignedNumbersAuthority(IANA)managesIPaddresses,whicharelogicaladdressesusedtoidentifydevicesonanetwork.TheInternetCorporationforAssignedNamesandNumbers(ICANN)managesdomainnames,convertsuser-friendlydomainnamesintomachine-readableIPaddresses,andenablesuserstoaccessresourcesontheinternet.Additionally,theidentityauthenticationofcommercialwebsitesishandledbycertificateauthorities(CAs).Since1995,CAshavebeenissuingsecuritycertificatestoensurethesecurityandtrustworthinessofwebsites.
Theseorganizationsandprotocolstogetherformthebasicpatchworkoftheinternet’sidentityrecognitionandmanagementsystem.Whilethisensuresorderlynetworkoperationandsecureinformationexchange,theinternethasnowbecomeaglobalinfrastructureoperatinginafullyopenandcomplexenvironment.ByDecember2022,therewerealready4.95billioninternetusersworldwide(Ayed
[1])
.
1
However,thenativeInternetProtocolsstilllackasecondaryconfirmationmechanisminthecommunicationnetwork,whereidentityisverifiedthroughvoiceandreal-timeinteractiveinformation.Withtherapidcommercializationoftheinternet,relyingonexternalforcesandcentralizedmanagementforsecurityandtrustisnolongerfeasible.
Inparticular,thenext-generationinternet(Web3.0)emphasizestheconceptoftheinternetofvalue,whichinvolveseconomicactivitiessuchase-commerce,dataassetcirculation,anddigitalassetexchanges.Fromaneconomicperspective,trustisfundamentaltoeconomicactivities,andtrustedidentityisthefoundationofalldigitaltrust.Therefore,fromtheperspectiveoftheinternet,establishingatrusteddigitalidentityisimperative.
1ThenumbersinbracketscorrespondtothoseofthereferencesinSection
5.
6IEEESAINDUSTRYCONNECTIONSCopyright©2024IEEE.Allrightsreserved.
Authorizedlicenseduselimitedto:IEEEXplore.DownloadedonDecember10,2024at02:48:48UTCfromIEEEXplore.Restrictionsapply.
1.2.COMMUNICATIONNETWORKIDENTITY
Theintegrationofcommunicationnetworktechnologywithdigitalidentitytechnologyhasevolved.Thefirstgenerationofmobilecommunicationtechnology(1G)introduceddigitalidentitytechnologytoidentifyentities,thoughsignificantsecurityvulnerabilitiesremained.Forinstance,1Gtechnology,representedbytheAdvancedMobilePhoneSystem(AMPS),wasananalogcellularmobilecommunicationsystem.However,withinthissystem,usersanddeviceswerestillassigneddigitalidentifiers.Usersweregivenauniquemobileidentificationnumber(MIN)byoperators,whileterminaldeviceswereidentifiedbyanelectronicserialnumber(ESN)assignedbymanufacturers.Whenauserconnectedaterminaldevicetothecommunicationnetwork,theESNandMINweretransmittedinplaintext.Thisledtowidespreadillegalphonecloning,posingmajorsecurityrisksaffectingbothusersandoperators.
Thesecondgenerationofmobilecommunicationtechnology(2G)pioneeredtheseparationofdeviceandSubscriberIdentityModule(SIM)cardidentity,effectivelyreducingsecurityrisks.2Gtechnology,representedbyGlobalSystemforMobileCommunications(GSM),introducedtheinnovativedevice-SIMseparationapproach,whereamobilephoneandSIMcardtogetherformedthemobilecommunicationterminal.Thisseparationbroughtthefollowingfourkeybenefits:
First,theSIMcardprovidedstorageforuserdata,includingidentityinformationandencryptionkeys.ThisallowedtheGSMnetworktoauthenticatetheuserandencryptvoicedataduringcalls,preventingphonecloningandeavesdropping.
Second,itseparatedtheidentifiersforusers,services,anddevices.Theinternationalmobileequipmentidentity(IMEI)identifiedtheterminaldevice,theinternationalmobilesubscriberidentity(IMSI)storedontheSIMcarduniquelyidentifiedtheuserforauthentication,andtheMobileStationInternationalISDNNumber(MSISDN)servedastheserviceidentifierforphonecalls.
Third,theintroductionofSIMcardsalloweduserstoreplacelostSIMcardswithoutaffectingtheirphonenumbers,astheIMSIwouldchangebutnottheMSISDN.
Fourth,itprotecteduserprivacythroughtheintroductionoftheTemporaryMobileSubscriberIdentity(TMSI),whichreducedtheexposureofIMSIduringtransmissionsovertheair.
Thethirdgenerationofmobilecommunicationtechnology(3G)introducedmutualauthenticationcapabilitiesandexpandedserviceidentifiers.3Gtechnology,representedbywidebandcodedivisionmultipleaccess
7IEEESAINDUSTRYCONNECTIONSCopyright©2024IEEE.Allrightsreserved.
Authorizedlicenseduselimitedto:IEEEXplore.DownloadedonDecember10,2024at02:48:48UTCfromIEEEXplore.Restrictionsapply.
(WCDMA),upgradedSIMcardstouniversalsubscriberidentitymodules(USIMs)andenabledmutualauthenticationbetweentheterminalandthenetwork.AlthoughtheIMEIstillidentifiedthedeviceandIMSIidentifiedtheuser,3Gnetworksexpandedserviceidentifierstocoverbothcircuit-switched(CS)andpacket-switched(PS)services.TheMSISDNwasusedforCSservices,whiletheaccesspointname(APN)wasintroducedforPSservices.
Thefourthgenerationofmobilecommunicationtechnology(4G)introducednewIPmultimediaidentities,enablingunifiedcommunicationandidentitymanagementbasedonIP.4Gtechnology,representedbyLTE,discontinuedtheevolutionoftheCSdomain,withtheIPMultimediaSubsystem(IMS)domaintakingoveraudioandvideoservices.IntheIMSdomain,theIPmultimediaprivateidentity(IMPI)uniquelyidentifiedtheuserforpurposessuchasregistration,authorization,andbilling,whiletheinternationalmobilesubscriberidentity(IMSI)couldbeembeddedintheIMPI.TheIPmultimediapublicidentity(IMPU)wasusedastheuser’sserviceidentifierintheIMSnetwork,presentedintheformofaSessionInitiationProtocolUniformResourceIdentifier(SIPURI)oratelephoneURIcontainingtheuser’sMSISDN.
Thefifthgenerationofmobilecommunicationtechnology(5G)introducednewserviceidentifiers,enablingsecureandflexiblenetworkslicingservicesandunifieduseridentitymanagement(Lian,Kang,andYang
[2])
.In5Gnetworks,thesubscriptionpermanentidentifier(SUPI),equivalenttoLTE’sIMSI,isnevertransmittedovertheairtopreventusertracking.Instead,thesubscriptionconcealedidentifier(SUCI),aprivacy-protectedidentifiercontainingaconcealedSUPI,isusedfortransmissionovertheair.Everyterminaldeviceconnectedtothe5Gnetworkisassignedapermanentequipmentidentifier(PEI),equivalenttoLTE’sIMEI.Serviceidentifiersincludethedatanetworkname(DNN),correspondingtoLTE’sAPN,andthenewsinglenetworksliceselectionassistanceinformation(S-NSSAI),whichidentifiesnetworkslicesforservices.IntheIMSdomain,IMPIandIMPUcontinuetobeusedforuserandserviceidentifiers.
8IEEESAINDUSTRYCONNECTIONSCopyright©2024IEEE.Allrightsreserved.
Authorizedlicenseduselimitedto:IEEEXplore.DownloadedonDecember10,2024at02:48:48UTCfromIEEEXplore.Restrictionsapply.
1G
2G
4G
5G
3G
ESN
IMEI
IMEI
IMEI
PEI
DEVICE
IMSI
IMSI
IMSI
SUPI
SUCI
GUTI
IMPI
USER
MIN
TMSI
TMSI
TMSI
IMPI
MSISD
MSISD
APN
IMPU
APN
IMPU
DNN
S-NSSAI
BUSINESS
FIGURE1EVOLUTIONOFDIGITALIDENTITYINMOBILE
COMMUNICATIONNETWORKS
Overall,theevolutionfrom1Gto5Ghasseenadeepeningintegrationofdigitalidentitytechnologywithmobilecommunicationnetworks,effectivelyachievingtheseparationandindependentdevelopmentofdeviceidentifiers,useridentifiers,andserviceidentifiers.Lookingahead,whilethesystemcenteredarounduseridentifiersisexpectedtocontinue,thediversificationofnetworkterminalsandtheexpansionofservicetypeswillleadtofurtherinnovationandchangesinthespecificformsofuseridentifiers,deviceidentifiers,andserviceidentifiers.Accordingly,digitalidentitytechnologyinmobilenetworkswillfollowthisdevelopmenttrend,continuouslyevolvingtomeetnewchallengesanddemands.
2.INSIGHTSINTOFUTURENETWORKIDENTITY
2.1.THEINTEGRATIONTREND
Networkdigitalidentityfacilitatesthecreationofnewtrustrelationshipsandthedevelopmentofadigitaltrustsystemframework.Trustisfundamentaltoeconomicactivitiesandservesastheadhesiveinsocialrelationships.Inagriculturalsocieties,trustwasbuiltthroughpersonalconnectionsbasedonkinshipandlocality.Associetiestransitionedtoindustrialization,theemergenceof“trustcredentials”suchasmoneyandassetsgaverisetoinstitutionaltrustregulatedbylegalsystems.Today,withtheadventofthedigitaleconomy,theintroductionof
9IEEESAINDUSTRYCONNECTIONSCopyright©2024IEEE.Allrightsreserved.
Authorizedlicenseduselimitedto:IEEEXplore.DownloadedonDecember10,2024at02:48:48UTCfromIEEEXplore.Restrictionsapply.
digitaltechnologieshasmovedmanyeconomicactivities,interactions,andpersonalassetsonline,creatinganewformofdigitaltrustbasedontechnology.Digitalidentitytechnologyisincreasinglybecomingacorecomponentofdigitaltrustsystems,supportingtrustrelationshipsindigitalspaces.Manydigitaltrustresearchinstitutionsworldwidearefocusedonconstructingframeworksfordigitaltrustsystemscenteredarounddigitalidentity.
Withthedevelopmentofdigitaltechnologiesandthedemandsofthedigitaleconomy,theintegrationofinformationandcommunicationtechnology(ICT)hasbecomeagiven.Intheearly1990s,theglobalspreadoftheinternetenabledpeopletoconnectthroughcomputersandnetworkstoaccessandshareinformation,layingthegroundworkfortheintegrationofcommunicationtechnology(CT)andinformationtechnology(IT).Bytheearly2000s,cloudcomputingtechnologyhadmaturedandbecomewidelyadopted,allowingCTandITenterprisestoshareinfrastructure,storage,anddata-processingcapabilities,solidifyingtheirintegrateddevelopment.Today,withtheriseofartificialintelligenceandtheInternetofThings,bothITandCTtechnologieshaveadvancedtoanewlevel,heraldinganeraofcomprehensiveintegration.Thisintegrationismoreurgentandrapidthanever,especiallyinthecontextofacceleratingdigitaleconomicdevelopmentandtheintelligenttransformationofvariousindustries.
Asacorecomponentforentitiesaccessingnetworks,digitalidentityplaysacrucialroleinbridgingthevirtualandphysicalworlds.Accurateidentificationbasedondigitalidentityhelpsensurenetworksecurityandtrustmechanisms,simplifiesaccesscontrolanddataflowbetweenvariousentities,andfostersstabledigitalinteractionrelationships.Globally,thereisactiveresearchandexplorationintonetworkdigitalidentitytechnologiesandtheirpracticalapplications.
2.2.THEAPPLICATIONTREND
Asvirtualhumansandrobotsemergeasnewtypesofvirtualandphysicalentities,theywillconnecttonetworksthroughincreasinglydiversemechanisms.Thiswilldrivefurtherupdatesandrapiddevelopmentofnetworktechnologiesthatsupporttheiridentityaccess,leadingtotherapidformationoffuturenetworksystems.Digitalidentity,asacorecomponentofentityaccess,playsacrucialroleinbridgingthevirtualandphysicalworlds.Itnotonlyhelpstoensurenetworksecurityandtrustbutalsosimplifiesaccesscontrolanddataencryptionprocessesbetweenvariousentities.Thedemandforitsapplicationisbecomingincreasinglyurgent.Therefore,theinnovativeapplicationandstandardizeddevelopmentofdigitalidentitywillprovidesolidsupportforconstructinganopen,shared,andsecurecyberspacecommunity.
10IEEESAINDUSTRYCONNECTIONSCopyright©2024IEEE.Allrightsreserved.
Authorizedlicenseduselimitedto:IEEEXplore.DownloadedonDecember10,2024at02:48:48UTCfromIEEEXplore.Restrictionsapply.
Scenario1:Virtualhumanidentityauthenticationandmanagementneeds—Virtualhumans,aspersonalintelligentassistants,areexpectedtobecomewidespread.However,virtualhumanslackphysicaltrustanchors,makingitessentialtoensuretheirtrustworthyaccesstonetworks.Additionally,duetotheinherentreplicationcharacteristicsofvirtualhumans,verifyingtheresponsibilityfortheiractionsisalsoanimportantmanagementrequirement.
Scenario2:Fine-grainedauthorizationforintelligentagents—Withtheadvancementandapplicationofartificialintelligencetechnology,theissueofAIinterpretabilityisreceivingincreasingattention.Explainingtherelationshipbetweeninputandoutputremainsachallengeacrosstheindustry.Intelligentagentsoftenexhibitadegreeofunpredictabilityintheirbehavior.Toeffectivelyaddressthecomplexityofintelligentagents’behavioranddecision-makingandhelpensuretheiractionsaresafeandcompliant,thereisapressingneedforanauthorizationmanagementsystemthatcanimplementprecisebehaviorcontrol.Thissystemaimstopreventpotentialharmthatintelligentagents,suchasembodiedrobots,mightcausetohumansortheenvironment,andtoavoidtheexcessiveleakageofsensitivepersonalinformationbyintelligentagents,suchasvirtualdigitalassistants.
Scenario3:Diversifieddigitalidentityneeds—Inthefuture,userdigitalidentitieswillextendbeyondsimpleidentityverification.Thescopeandcontentofidentitieswillbecomemorediverse,includingawiderrangeofusercredentialinformation,suchaspublickeycertificatesandattributecertificates.Theformercanprovetheuser’sidentitythroughtheirpublickeyinformation,whilethelattercandemonstrateattributessuchassocialandnaturalcharacteristics.Thiswillprovideuserswithmorecomprehensiveservicesandsupportforaccessingthedigitalworld.
Scenario4:Ubiquitoustrustacrossindustries—Asthespeedofinformationandcommunicationtechnology(ICT)integrationaccelerates,theboundariesbetweencommunicationnetworksandtheinternetarebecomingincreasinglyblurred.Withthefocusonfuturenetworks,thereisaneedtoaddresscross-scenario,industry,andbusinesstrustrequirements.Thisinvolvesexploringfuturenetworkdigitalidentitytechnologiesthatmeetcross-industryandcross-domaintrustneeds,basedonsolvinguseridentityconnection-recognitionissues.Forexample,inafuturenetworkwheredigitalidentityiscentral,atelecombusinessattributecertificatemightbeusedinnon-telecomcontexts,whiletelecombusiness-issuedattributecertificatesmightbepresentedineverydaylifescenarios,providinguserswithafoundationforcross-industryandcross-domainubiquitoustrustandsolvingmutualtrustchallengesinvariousindustry
scenarios.
11IEEESAINDUSTRYCONNECTIONSCopyright©2024IEEE.Allrightsreserved.
Authorizedlicenseduselimitedto:IEEEXplore.DownloadedonDecember10,2024at02:48:48UTCfromIEEEXplore.Restrictionsapply.
2.3.
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 2024年医疗护理劳务合同2篇
- 2024年广告合同法律风险培训2篇
- 2024年农村土地流转合同样本3篇
- 2024年度农产品加工企业第三方抵押贷款协议3篇
- 2024年度水泥行业人才培养与交流合同3篇
- 2024年度社保待遇领取资格核查合同3篇
- 2024年度城市环境综合整治安全与环境合作协议3篇
- 2024年度防盗门安装与智能家居合同3篇
- 2024年度食堂装修工程设计与施工监理合同2篇
- 2024年新型产权锁定二手房买卖合同3篇
- 入行论第33课 ppt 讲解
- 边坡挂网喷锚施工方案(完整常用版)
- 钢塑复合管的壁厚标准
- 初二数学压轴大题集(100道)
- 介入科工作总结
- 四年级上册道德与法治知识点汇总复习过程
- QC课题提高检查井周边压实度
- 交接班流程图
- 工程项目节能减排策划案(共61页)
- 轻钢龙骨纸面石膏板吊顶施工工艺及方法
- 用人单位职业病危害项目申报及审核PPT课件
评论
0/150
提交评论