Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x

Content for  TR 22.856  Word version:  19.2.0

Top   Top   Up   Prev   Next
1…   5…   5.2…   5.3…   5.4…   5.5…   5.6…   5.7…   5.8…   5.9…   5.10…   5.11…   5.12…   5.13…   5.14…   5.15…   5.16…   5.17…   5.18…   5.19…   5.20…   5.21…   5.22…   5.23…   5.24…   5.25…   5.26…   5.27…   5.28…   6   7…   7.2   8   A   B   C…

 

5.15  Use Case on Access to avatarsp. 55

5.15.1  Descriptionp. 55

Mobile metaverse services often involve the use of digital representation (e.g. avatars, which are discussed throughout this use case.) Given different use cases, the data associated with the avatars of a user are generated and stored in different mobile metaverse servers. For example, a user uses life-like avatars for e-commerce and cartoonish avatars for gaming. Network operators enabling users to obtain diverse mobile metaverse services should support avatar management. For example, network operators can leverage their existing connections to extensive mobile metaverse servers and provide access to avatars across these servers acting as a proxy. Compared to the model where two mobile metaverse servers define direct access APIs, the interconnect model described in the use case can utilise the 5G system capability of authenticating and authorizing the third-party entities.
The advantage of having a central storage of the information related to avatars is that the same avatar could potentially be used in different mobile metaverse services. The information exposed by the central point, i.e. the 5G system, to different mobile metaverse services helps them share and use the same avatar for a user. Users would therefore benefit from using their UE/ mobile access for metaverse services because there are enablers (like this one) that provide consistency between different metaverse services.
It is noted that the storage location of avatars is subject to service agreement between the operator and the third-party entities, and hence it is out of scope of 3GPP.
Up

5.15.2  Pre-conditionsp. 56

ClothingA and ClothingB are two small clothing companies that both have virtual stores and provide avatar-based shopping services. Online shoppers can use immersive real-time technology to virtually try-on apparel, accessories, or full looks on the digital representation of themselves, i.e. avatars. Their avatars are stored in mobile metaverse servers, and interoperable data formats between these servers are used for avatars.
T is a mobile network operator. Based on its service level agreements with ClothingA and ClothingB, it provides multimedia communication services to enable virtual shopping. Moreover, T behaves like a proxy and supports the exchange of avatars stored in the databases of ClothingA, ClothingB, and any other companies that have agreements with T.
Shaun, an online shopper, has used the virtual try-on service provided by ClothingA several times. His avatar-a 3D actual visual representation of himself is stored in the ClothingA database.
Up

5.15.3  Service Flowsp. 56

  1. ClothingA and ClothingB register with the operator T. Shaun registers with T by a UE that has a subscription with T.
  2. Shaun visits the ClothingA virtual store using his avatar stored in the ClothingA database. He is authenticated by T and ClothingA, and a multimedia communication session is established between Shaun, a shop assistant, and associated devices (e.g. AR glasses). Shaun tries on some products and sees 3D digital clothing automatically appear on himself.
  3. Shaun terminates the session with ClothingA. His user profile on T's system is updated with the information that an avatar is stored in the ClothingA database. Parameters linked to this avatar in the user profile may include
    • last access time. This could potentially help a user select which avatar to use and help the 5G system determine if the avatar is still available;
    • authorised mobile metaverse services;
    • address (e.g. IP address). This could potentially help a trusted third party retrieve the avatar.
  4. Having authenticated by T and ClothingB, Shaun visits the ClothingB virtual store for the first time. Since it is his first visit, Shaun has no avatars available in ClothingB. ClothingB requests the 5G system for the avatar-related information of Shaun.
  5. The 5G system accepts the request and exposes the selected avatar-related information in Shaun's user profile to ClothingB. The decision of what information to be exposed is subject to user consent and service agreement between third parties and T. As pre-agreed by ClothingA, the information related to the avatar stored in its database is exposed to ClothingB. The information is then provided to Shaun, based on which Shaun decides to reuse the avatar stored in the ClothingA database.
  6. ClothingB sends a request for Shaun's avatar to the 5G system. The 5G system authorises the request and provides ClothingB with the IP address of the avatar.
  7. ClothingB retrieves the avatar from the ClothingA database using the given IP address.
Up

5.15.4  Post-conditionsp. 57

Shaun tries on products in the ClothingB virtual store with his avatar.
Shaun's user profile on T's system is updated to record the use of his avatar in the ClothingB virtual store.
T charges ClothingA, ClothingB, and Shaun for supporting virtual shopping sessions.

5.15.5  Existing features partly or fully covering the use case functionalityp. 57

The functional requirements for user identity are captured in clause 26a of TS 22.101.

5.15.6  Potential New Requirements needed to support the use casep. 57

[PR 5.15.6-1]
Subject to user consent, operator policy, and regulatory requirements, the 5G system shall be able to store and update the information related to digital representations for a user (e.g. last access time and address).
[PR 5.15.6-2]
Subject to user consent, operator policy, and regulatory requirements, the 5G system shall support mechanisms to expose the information related to the digital representations of a user to a trusted third party.
[PR 5.15.6-3]
Subject to user consent and operator policy, the 5G system shall be able to authorise a trusted third party to use the digital representations of a user.
Up

Up   Top   ToC