未來網(wǎng)絡(luò)中可信數(shù)字身份產(chǎn)業(yè)的發(fā)展 THE IEEE GLOBAL INITIATIVE ON TRUST TECHNOLOGY_第1頁
未來網(wǎng)絡(luò)中可信數(shù)字身份產(chǎn)業(yè)的發(fā)展 THE IEEE GLOBAL INITIATIVE ON TRUST TECHNOLOGY_第2頁
未來網(wǎng)絡(luò)中可信數(shù)字身份產(chǎn)業(yè)的發(fā)展 THE IEEE GLOBAL INITIATIVE ON TRUST TECHNOLOGY_第3頁
未來網(wǎng)絡(luò)中可信數(shù)字身份產(chǎn)業(yè)的發(fā)展 THE IEEE GLOBAL INITIATIVE ON TRUST TECHNOLOGY_第4頁
未來網(wǎng)絡(luò)中可信數(shù)字身份產(chǎn)業(yè)的發(fā)展 THE IEEE GLOBAL INITIATIVE ON TRUST TECHNOLOGY_第5頁
已閱讀5頁,還剩37頁未讀, 繼續(xù)免費閱讀

下載本文檔

版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進行舉報或認領(lǐng)

文檔簡介

INDUSTRYCONNECTIONS

REPORT

STANDARDS

AATN

THEIEEEGLOBALINITIATIVEONTRUSTTECHNOLOGY

THEDEVELOPMENTOFTHETRUSTEDDIGITALIDENTITY

INDUSTRYINFUTURENETWORKS

Authoredby

LifengZhangandYihuiZhang

Authorizedlicenseduselimitedto:IEEEXplore.DownloadedonDecember10,2024at02:48:48UTCfromIEEEXplore.Restrictionsapply.

TRADEMARKSANDDISCLAIMERS

IEEEbelievestheinformationinthispublicationisaccurateasofitspublicationdate;suchinformationissubjecttochangewithoutnotice.IEEEisnotresponsibleforanyinadvertenterrors.

Theideasandproposalsinthisspecificationaretherespectiveauthor’sviewsanddonotrepresenttheviewsoftheaffiliatedorganization.

ACKNOWLEDGMENTS

Specialthanksaregiventothefollowingreviewersofthispaper:

AngBoonChong

ChengkangChuXueqinJia

TingtingLiuBoLv

WeizhiMeng

YiPan

WeiweiPangLongShi

XiaojiaSongNinaWang

YangXiang

LiangliangZhangYifengZhang

HangZhouJintaoZhu

TheInstituteofElectricalandElectronicsEngineers,Inc.3ParkAvenue,NewYork,NY10016-5997,USACopyright?2024byTheInstituteofElectricalandElectronicsEngineers,Inc.

Allrightsreserved.30October2024.PrintedintheUnitedStatesofAmerica.

PDF:STDVA27435979-8-8557-1388-6

IEEEisaregisteredtrademarkintheU.S.Patent&TrademarkOffice,ownedbyTheInstituteofElectricalandElectronicsEngineers,Incorporated.Allothertrademarksarethepropertyoftherespectivetrademarkowners.

IEEEprohibitsdiscrimination,harassment,andbullying.Formoreinformation,visit

/web/aboutus/whatis/policies/p9-26.html.

Nopartofthispublicationmaybereproducedinanyform,inanelectronicretrievalsystem,orotherwise,withoutthepriorwrittenpermissionofthepublisher.

FindIEEEstandardsandstandards-relatedproductlistingsat

:.

2IEEESAINDUSTRYCONNECTIONSCopyright?2024IEEE.Allrightsreserved.

Authorizedlicenseduselimitedto:IEEEXplore.DownloadedonDecember10,2024at02:48:48UTCfromIEEEXplore.Restrictionsapply.

NOTICEANDDISCLAIMEROFLIABILITYCONCERNINGTHE

USEOFIEEESAINDUSTRYCONNECTIONSDOCUMENTS

ThisIEEEStandardsAssociation(“IEEESA”)IndustryConnectionspublication(“Work”)isnotaconsensusstandarddocument.Specifically,thisdocumentisNOTANIEEESTANDARD.InformationcontainedinthisWorkhasbeencreatedby,orobtainedfrom,sourcesbelievedtobereliable,andreviewedbymembersoftheIEEESAIndustryConnectionsactivitythatproducedthisWork.IEEEandtheIEEESAIndustryConnectionsactivitymembersexpresslydisclaimallwarranties(express,implied,andstatutory)relatedtothisWork,including,butnotlimitedto,thewarrantiesof:merchantability;fitnessforaparticularpurpose;non-infringement;quality,accuracy,effectiveness,currency,orcompletenessoftheWorkorcontentwithintheWork.Inaddition,IEEEandtheIEEESAIndustryConnectionsactivitymembersdisclaimanyandallconditionsrelatingto:results;andworkmanlikeeffort.ThisIEEESAIndustryConnectionsdocumentissupplied“ASIS”and“WITHALLFAULTS.”

AlthoughtheIEEESAIndustryConnectionsactivitymemberswhohavecreatedthisWorkbelievethattheinformationandguidancegiveninthisWorkserveasanenhancementtousers,allpersonsmustrelyupontheirownskillandjudgmentwhenmakinguseofit.INNOEVENTSHALLIEEEORIEEESAINDUSTRYCONNECTIONSACTIVITYMEMBERSBELIABLEFORANYERRORSOROMISSIONSORDIRECT,INDIRECT,INCIDENTAL,SPECIAL,EXEMPLARY,ORCONSEQUENTIALDAMAGES(INCLUDING,BUTNOTLIMITEDTO:PROCUREMENTOFSUBSTITUTEGOODSORSERVICES;LOSSOFUSE,DATA,ORPROFITS;ORBUSINESSINTERRUPTION)HOWEVERCAUSEDANDONANYTHEORYOFLIABILITY,WHETHERINCONTRACT,STRICTLIABILITY,ORTORT(INCLUDINGNEGLIGENCEOROTHERWISE)ARISINGINANYWAYOUTOFTHEUSEOFTHISWORK,EVENIFADVISEDOFTHEPOSSIBILITYOFSUCHDAMAGEANDREGARDLESSOFWHETHERSUCHDAMAGEWASFORESEEABLE.

Further,informationcontainedinthisWorkmaybeprotectedbyintellectualpropertyrightsheldbythirdpartiesororganizations,andtheuseofthisinformationmayrequiretheusertonegotiatewithanysuchrightsholdersinordertolegallyacquiretherightstodoso,andsuchrightsholdersmayrefusetograntsuchrights.AttentionisalsocalledtothepossibilitythatimplementationofanyorallofthisWorkmayrequireuseofsubjectmattercoveredbypatentrights.BypublicationofthisWork,nopositionistakenbytheIEEEwithrespecttotheexistenceorvalidityofanypatentrightsinconnectiontherewith.TheIEEEisnotresponsibleforidentifyingpatentrightsforwhichalicensemayberequired,orforconductinginquiriesintothelegalvalidityorscopeofpatentsclaims.Usersareexpresslyadvisedthatdeterminationofthevalidityofanypatentrights,andtheriskofinfringementofsuchrights,isentirelytheirownresponsibility.Nocommitmenttograntlicensesunderpatentrightsonareasonableornon-discriminatorybasishasbeensoughtorreceivedfromanyrightsholder.Thepoliciesandproceduresunderwhichthisdocumentwascreatedcanbeviewedat

/about/sasb/iccom/.

ThisWorkispublishedwiththeunderstandingthatIEEEandtheICCommembersaresupplyinginformationthroughthisWork,notattemptingtorenderengineeringorotherprofessionalservices.Ifsuchservicesarerequired,theassistanceofanappropriateprofessionalshouldbesought.IEEEisnotresponsibleforthestatementsandopinionsadvancedinthisWork.

3IEEESAINDUSTRYCONNECTIONSCopyright?2024IEEE.Allrightsreserved.

Authorizedlicenseduselimitedto:IEEEXplore.DownloadedonDecember10,2024at02:48:48UTCfromIEEEXplore.Restrictionsapply.

ABSTRACT 5

1.INTRODUCTIONOFNETWORKIDENTITY 6

1.1.INTERNETNETWORKIDENTITY 6

1.2.COMMUNICATIONNETWORKIDENTITY 7

FIGURE1EVOLUTIONOFDIGITALIDENTITYINMOBILECOMMUNICATION

NETWORKS 9

2.INSIGHTSINTOFUTURENETWORKIDENTITY 9

2.1.THEINTEGRATIONTREND 9

2.2.THEAPPLICATIONTREND 10

2.3.THETECHNOLOGYTREND 12

2.4.THEINDUSTRYTREND 14

2.4.1.OVERVIEW 14

2.4.2.INTERNET-BASEDFUTURENETWORKIDENTITY 14

2.4.3.COMMUNICATION-BASEDFUTURENETWORKIDENTITY 15

3.THETRUSTEDDIGITALIDENTITY 15

3.1.DEFINITIONOFTRUSTEDDIGITALIDENTITY 15

3.2.KEYINDICATORS 16

4.FUTURECONSIDERATIONS 18

4.1.DEVELOPMENTSUMMARY 18

4.2.TRENDOUTLOOK 19

5.REFERENCES 20

TABLEOFCONTENTS

Authorizedlicenseduselimitedto:IEEEXplore.DownloadedonDecember10,2024at02:48:48UTCfromIEEEXplore.Restrictionsapply.

THEDEVELOPMENTOFTHETRUSTED

DIGITALIDENTITYINDUSTRYINFUTURENETWORKS

ABSTRACT

Asdigitalizationandintelligenceadvance,communicationisexpandingfromthephysicalworldtointeractionsbetweenthephysicalanddigitalworlds.Thefocusisshiftingfromhuman-to-humantomulti-modalinteractionsinvolvinghuman-to-digitalentities/robotsanddigitalentity-to-digitalentitycommunications.Thisshiftnecessitatesnewdigitalidentitytechnologies,whicharebecomingcrucialforestablishingtrustandconnectivitybetweentheseworldsandsupportingalldigitalactivities.

Withtheadventofconceptslikethenext-generationinternet(Web3.0)andnext-generationcommunicationnetworks(6G),networkidentityisundergoingsubtlechanges,withtrustemergingasacentralelement.Ensuringnetworksecurity,simplifyingaccesscontrolanddataencryptionprocessesamongmultipleentities,andsupportingtheconstructionofanopen,shared,andsecurecyberspacecommunityisessential.Additionally,pervasivecross-domainaccessrequirestrustendorsementsforusers’socialattributes,andbuildingaglobaltrustframeworkusingtechnologieslikeblockchainanddistributeddigitalidentitiesiscrucialforenhancingtheuniversalityandextensibilityofusercredentials.Trustbarriersbetweendomainscanbeovercomewithhelpfromthisframework,whileusersreceivemoreflexibleandcost-effectiveaccessoptions.

Thehistoricaldevelopmentofinformationandcommunicationnetworkidentity,aswellasinsightsintonetworkidentitytechnologies,applications,andindustrytrendsarereviewedinthisreport.Currentapproachestoimplementingdigitalidentityinfuturenetworksareoutlined,anddefinitionsandkeymetricsfortrustworthydigitalidentitiesinfuturenetworksareproposed.Additionally,aforward-lookingperspectiveonfuturedevelopmentsisprovided.

5IEEESAINDUSTRYCONNECTIONSCopyright?2024IEEE.Allrightsreserved.

Authorizedlicenseduselimitedto:IEEEXplore.DownloadedonDecember10,2024at02:48:48UTCfromIEEEXplore.Restrictionsapply.

1.INTRODUCTIONOFNETWORKIDENTITY

1.1.INTERNETNETWORKIDENTITY

Theconceptoftrustednetworkdigitalidentityhasevolvedalongsidethedevelopmentofcommunicationtechnology(CT)andinformationtechnology(IT).

ThenativeITInternetProtocols(IPs)lackanidentitylayer,meaningthatinternetusersdonothaveanativedigitalidentity.Whentheinternetwasinitiallydesigned,itonlyprovidedidentityidentifiersforcomputernodes,whichweremanagedbycentralizedauthoritativeinstitutions.Forexample,theIEEEassignsMediaAccessControl(MAC)addressestonetworkdevices,ensuringthateachdevicehasauniquehardwareidentifier.TheInternetAssignedNumbersAuthority(IANA)managesIPaddresses,whicharelogicaladdressesusedtoidentifydevicesonanetwork.TheInternetCorporationforAssignedNamesandNumbers(ICANN)managesdomainnames,convertsuser-friendlydomainnamesintomachine-readableIPaddresses,andenablesuserstoaccessresourcesontheinternet.Additionally,theidentityauthenticationofcommercialwebsitesishandledbycertificateauthorities(CAs).Since1995,CAshavebeenissuingsecuritycertificatestoensurethesecurityandtrustworthinessofwebsites.

Theseorganizationsandprotocolstogetherformthebasicpatchworkoftheinternet’sidentityrecognitionandmanagementsystem.Whilethisensuresorderlynetworkoperationandsecureinformationexchange,theinternethasnowbecomeaglobalinfrastructureoperatinginafullyopenandcomplexenvironment.ByDecember2022,therewerealready4.95billioninternetusersworldwide(Ayed

[1])

.

1

However,thenativeInternetProtocolsstilllackasecondaryconfirmationmechanisminthecommunicationnetwork,whereidentityisverifiedthroughvoiceandreal-timeinteractiveinformation.Withtherapidcommercializationoftheinternet,relyingonexternalforcesandcentralizedmanagementforsecurityandtrustisnolongerfeasible.

Inparticular,thenext-generationinternet(Web3.0)emphasizestheconceptoftheinternetofvalue,whichinvolveseconomicactivitiessuchase-commerce,dataassetcirculation,anddigitalassetexchanges.Fromaneconomicperspective,trustisfundamentaltoeconomicactivities,andtrustedidentityisthefoundationofalldigitaltrust.Therefore,fromtheperspectiveoftheinternet,establishingatrusteddigitalidentityisimperative.

1ThenumbersinbracketscorrespondtothoseofthereferencesinSection

5.

6IEEESAINDUSTRYCONNECTIONSCopyright?2024IEEE.Allrightsreserved.

Authorizedlicenseduselimitedto:IEEEXplore.DownloadedonDecember10,2024at02:48:48UTCfromIEEEXplore.Restrictionsapply.

1.2.COMMUNICATIONNETWORKIDENTITY

Theintegrationofcommunicationnetworktechnologywithdigitalidentitytechnologyhasevolved.Thefirstgenerationofmobilecommunicationtechnology(1G)introduceddigitalidentitytechnologytoidentifyentities,thoughsignificantsecurityvulnerabilitiesremained.Forinstance,1Gtechnology,representedbytheAdvancedMobilePhoneSystem(AMPS),wasananalogcellularmobilecommunicationsystem.However,withinthissystem,usersanddeviceswerestillassigneddigitalidentifiers.Usersweregivenauniquemobileidentificationnumber(MIN)byoperators,whileterminaldeviceswereidentifiedbyanelectronicserialnumber(ESN)assignedbymanufacturers.Whenauserconnectedaterminaldevicetothecommunicationnetwork,theESNandMINweretransmittedinplaintext.Thisledtowidespreadillegalphonecloning,posingmajorsecurityrisksaffectingbothusersandoperators.

Thesecondgenerationofmobilecommunicationtechnology(2G)pioneeredtheseparationofdeviceandSubscriberIdentityModule(SIM)cardidentity,effectivelyreducingsecurityrisks.2Gtechnology,representedbyGlobalSystemforMobileCommunications(GSM),introducedtheinnovativedevice-SIMseparationapproach,whereamobilephoneandSIMcardtogetherformedthemobilecommunicationterminal.Thisseparationbroughtthefollowingfourkeybenefits:

First,theSIMcardprovidedstorageforuserdata,includingidentityinformationandencryptionkeys.ThisallowedtheGSMnetworktoauthenticatetheuserandencryptvoicedataduringcalls,preventingphonecloningandeavesdropping.

Second,itseparatedtheidentifiersforusers,services,anddevices.Theinternationalmobileequipmentidentity(IMEI)identifiedtheterminaldevice,theinternationalmobilesubscriberidentity(IMSI)storedontheSIMcarduniquelyidentifiedtheuserforauthentication,andtheMobileStationInternationalISDNNumber(MSISDN)servedastheserviceidentifierforphonecalls.

Third,theintroductionofSIMcardsalloweduserstoreplacelostSIMcardswithoutaffectingtheirphonenumbers,astheIMSIwouldchangebutnottheMSISDN.

Fourth,itprotecteduserprivacythroughtheintroductionoftheTemporaryMobileSubscriberIdentity(TMSI),whichreducedtheexposureofIMSIduringtransmissionsovertheair.

Thethirdgenerationofmobilecommunicationtechnology(3G)introducedmutualauthenticationcapabilitiesandexpandedserviceidentifiers.3Gtechnology,representedbywidebandcodedivisionmultipleaccess

7IEEESAINDUSTRYCONNECTIONSCopyright?2024IEEE.Allrightsreserved.

Authorizedlicenseduselimitedto:IEEEXplore.DownloadedonDecember10,2024at02:48:48UTCfromIEEEXplore.Restrictionsapply.

(WCDMA),upgradedSIMcardstouniversalsubscriberidentitymodules(USIMs)andenabledmutualauthenticationbetweentheterminalandthenetwork.AlthoughtheIMEIstillidentifiedthedeviceandIMSIidentifiedtheuser,3Gnetworksexpandedserviceidentifierstocoverbothcircuit-switched(CS)andpacket-switched(PS)services.TheMSISDNwasusedforCSservices,whiletheaccesspointname(APN)wasintroducedforPSservices.

Thefourthgenerationofmobilecommunicationtechnology(4G)introducednewIPmultimediaidentities,enablingunifiedcommunicationandidentitymanagementbasedonIP.4Gtechnology,representedbyLTE,discontinuedtheevolutionoftheCSdomain,withtheIPMultimediaSubsystem(IMS)domaintakingoveraudioandvideoservices.IntheIMSdomain,theIPmultimediaprivateidentity(IMPI)uniquelyidentifiedtheuserforpurposessuchasregistration,authorization,andbilling,whiletheinternationalmobilesubscriberidentity(IMSI)couldbeembeddedintheIMPI.TheIPmultimediapublicidentity(IMPU)wasusedastheuser’sserviceidentifierintheIMSnetwork,presentedintheformofaSessionInitiationProtocolUniformResourceIdentifier(SIPURI)oratelephoneURIcontainingtheuser’sMSISDN.

Thefifthgenerationofmobilecommunicationtechnology(5G)introducednewserviceidentifiers,enablingsecureandflexiblenetworkslicingservicesandunifieduseridentitymanagement(Lian,Kang,andYang

[2])

.In5Gnetworks,thesubscriptionpermanentidentifier(SUPI),equivalenttoLTE’sIMSI,isnevertransmittedovertheairtopreventusertracking.Instead,thesubscriptionconcealedidentifier(SUCI),aprivacy-protectedidentifiercontainingaconcealedSUPI,isusedfortransmissionovertheair.Everyterminaldeviceconnectedtothe5Gnetworkisassignedapermanentequipmentidentifier(PEI),equivalenttoLTE’sIMEI.Serviceidentifiersincludethedatanetworkname(DNN),correspondingtoLTE’sAPN,andthenewsinglenetworksliceselectionassistanceinformation(S-NSSAI),whichidentifiesnetworkslicesforservices.IntheIMSdomain,IMPIandIMPUcontinuetobeusedforuserandserviceidentifiers.

8IEEESAINDUSTRYCONNECTIONSCopyright?2024IEEE.Allrightsreserved.

Authorizedlicenseduselimitedto:IEEEXplore.DownloadedonDecember10,2024at02:48:48UTCfromIEEEXplore.Restrictionsapply.

1G

2G

4G

5G

3G

ESN

IMEI

IMEI

IMEI

PEI

DEVICE

IMSI

IMSI

IMSI

SUPI

SUCI

GUTI

IMPI

USER

MIN

TMSI

TMSI

TMSI

IMPI

MSISD

MSISD

APN

IMPU

APN

IMPU

DNN

S-NSSAI

BUSINESS

FIGURE1EVOLUTIONOFDIGITALIDENTITYINMOBILE

COMMUNICATIONNETWORKS

Overall,theevolutionfrom1Gto5Ghasseenadeepeningintegrationofdigitalidentitytechnologywithmobilecommunicationnetworks,effectivelyachievingtheseparationandindependentdevelopmentofdeviceidentifiers,useridentifiers,andserviceidentifiers.Lookingahead,whilethesystemcenteredarounduseridentifiersisexpectedtocontinue,thediversificationofnetworkterminalsandtheexpansionofservicetypeswillleadtofurtherinnovationandchangesinthespecificformsofuseridentifiers,deviceidentifiers,andserviceidentifiers.Accordingly,digitalidentitytechnologyinmobilenetworkswillfollowthisdevelopmenttrend,continuouslyevolvingtomeetnewchallengesanddemands.

2.INSIGHTSINTOFUTURENETWORKIDENTITY

2.1.THEINTEGRATIONTREND

Networkdigitalidentityfacilitatesthecreationofnewtrustrelationshipsandthedevelopmentofadigitaltrustsystemframework.Trustisfundamentaltoeconomicactivitiesandservesastheadhesiveinsocialrelationships.Inagriculturalsocieties,trustwasbuiltthroughpersonalconnectionsbasedonkinshipandlocality.Associetiestransitionedtoindustrialization,theemergenceof“trustcredentials”suchasmoneyandassetsgaverisetoinstitutionaltrustregulatedbylegalsystems.Today,withtheadventofthedigitaleconomy,theintroductionof

9IEEESAINDUSTRYCONNECTIONSCopyright?2024IEEE.Allrightsreserved.

Authorizedlicenseduselimitedto:IEEEXplore.DownloadedonDecember10,2024at02:48:48UTCfromIEEEXplore.Restrictionsapply.

digitaltechnologieshasmovedmanyeconomicactivities,interactions,andpersonalassetsonline,creatinganewformofdigitaltrustbasedontechnology.Digitalidentitytechnologyisincreasinglybecomingacorecomponentofdigitaltrustsystems,supportingtrustrelationshipsindigitalspaces.Manydigitaltrustresearchinstitutionsworldwidearefocusedonconstructingframeworksfordigitaltrustsystemscenteredarounddigitalidentity.

Withthedevelopmentofdigitaltechnologiesandthedemandsofthedigitaleconomy,theintegrationofinformationandcommunicationtechnology(ICT)hasbecomeagiven.Intheearly1990s,theglobalspreadoftheinternetenabledpeopletoconnectthroughcomputersandnetworkstoaccessandshareinformation,layingthegroundworkfortheintegrationofcommunicationtechnology(CT)andinformationtechnology(IT).Bytheearly2000s,cloudcomputingtechnologyhadmaturedandbecomewidelyadopted,allowingCTandITenterprisestoshareinfrastructure,storage,anddata-processingcapabilities,solidifyingtheirintegrateddevelopment.Today,withtheriseofartificialintelligenceandtheInternetofThings,bothITandCTtechnologieshaveadvancedtoanewlevel,heraldinganeraofcomprehensiveintegration.Thisintegrationismoreurgentandrapidthanever,especiallyinthecontextofacceleratingdigitaleconomicdevelopmentandtheintelligenttransformationofvariousindustries.

Asacorecomponentforentitiesaccessingnetworks,digitalidentityplaysacrucialroleinbridgingthevirtualandphysicalworlds.Accurateidentificationbasedondigitalidentityhelpsensurenetworksecurityandtrustmechanisms,simplifiesaccesscontrolanddataflowbetweenvariousentities,andfostersstabledigitalinteractionrelationships.Globally,thereisactiveresearchandexplorationintonetworkdigitalidentitytechnologiesandtheirpracticalapplications.

2.2.THEAPPLICATIONTREND

Asvirtualhumansandrobotsemergeasnewtypesofvirtualandphysicalentities,theywillconnecttonetworksthroughincreasinglydiversemechanisms.Thiswilldrivefurtherupdatesandrapiddevelopmentofnetworktechnologiesthatsupporttheiridentityaccess,leadingtotherapidformationoffuturenetworksystems.Digitalidentity,asacorecomponentofentityaccess,playsacrucialroleinbridgingthevirtualandphysicalworlds.Itnotonlyhelpstoensurenetworksecurityandtrustbutalsosimplifiesaccesscontrolanddataencryptionprocessesbetweenvariousentities.Thedemandforitsapplicationisbecomingincreasinglyurgent.Therefore,theinnovativeapplicationandstandardizeddevelopmentofdigitalidentitywillprovidesolidsupportforconstructinganopen,shared,andsecurecyberspacecommunity.

10IEEESAINDUSTRYCONNECTIONSCopyright?2024IEEE.Allrightsreserved.

Authorizedlicenseduselimitedto:IEEEXplore.DownloadedonDecember10,2024at02:48:48UTCfromIEEEXplore.Restrictionsapply.

Scenario1:Virtualhumanidentityauthenticationandmanagementneeds—Virtualhumans,aspersonalintelligentassistants,areexpectedtobecomewidespread.However,virtualhumanslackphysicaltrustanchors,makingitessentialtoensuretheirtrustworthyaccesstonetworks.Additionally,duetotheinherentreplicationcharacteristicsofvirtualhumans,verifyingtheresponsibilityfortheiractionsisalsoanimportantmanagementrequirement.

Scenario2:Fine-grainedauthorizationforintelligentagents—Withtheadvancementandapplicationofartificialintelligencetechnology,theissueofAIinterpretabilityisreceivingincreasingattention.Explainingtherelationshipbetweeninputandoutputremainsachallengeacrosstheindustry.Intelligentagentsoftenexhibitadegreeofunpredictabilityintheirbehavior.Toeffectivelyaddressthecomplexityofintelligentagents’behavioranddecision-makingandhelpensuretheiractionsaresafeandcompliant,thereisapressingneedforanauthorizationmanagementsystemthatcanimplementprecisebehaviorcontrol.Thissystemaimstopreventpotentialharmthatintelligentagents,suchasembodiedrobots,mightcausetohumansortheenvironment,andtoavoidtheexcessiveleakageofsensitivepersonalinformationbyintelligentagents,suchasvirtualdigitalassistants.

Scenario3:Diversifieddigitalidentityneeds—Inthefuture,userdigitalidentitieswillextendbeyondsimpleidentityverification.Thescopeandcontentofidentitieswillbecomemorediverse,includingawiderrangeofusercredentialinformation,suchaspublickeycertificatesandattributecertificates.Theformercanprovetheuser’sidentitythroughtheirpublickeyinformation,whilethelattercandemonstrateattributessuchassocialandnaturalcharacteristics.Thiswillprovideuserswithmorecomprehensiveservicesandsupportforaccessingthedigitalworld.

Scenario4:Ubiquitoustrustacrossindustries—Asthespeedofinformationandcommunicationtechnology(ICT)integrationaccelerates,theboundariesbetweencommunicationnetworksandtheinternetarebecomingincreasinglyblurred.Withthefocusonfuturenetworks,thereisaneedtoaddresscross-scenario,industry,andbusinesstrustrequirements.Thisinvolvesexploringfuturenetworkdigitalidentitytechnologiesthatmeetcross-industryandcross-domaintrustneeds,basedonsolvinguseridentityconnection-recognitionissues.Forexample,inafuturenetworkwheredigitalidentityiscentral,atelecombusinessattributecertificatemightbeusedinnon-telecomcontexts,whiletelecombusiness-issuedattributecertificatesmightbepresentedineverydaylifescenarios,providinguserswithafoundationforcross-industryandcross-domainubiquitoustrustandsolvingmutualtrustchallengesinvariousindustry

scenarios.

11IEEESAINDUSTRYCONNECTIONSCopyright?2024IEEE.Allrightsreserved.

Authorizedlicenseduselimitedto:IEEEXplore.DownloadedonDecember10,2024at02:48:48UTCfromIEEEXplore.Restrictionsapply.

2.3.

溫馨提示

  • 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
  • 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
  • 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負責(zé)。
  • 6. 下載文件中如有侵權(quán)或不適當內(nèi)容,請與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。

評論

0/150

提交評論