Content for  TR 22.856  Word version:  19.2.0

Top   Top   Up   Prev   Next
1…   5…   5.2…   5.3…   5.4…   5.5…   5.6…   5.7…   5.8…   5.9…   5.10…   5.11…   5.12…   5.13…   5.14…   5.15…   5.16…   5.17…   5.18…   5.19…   5.20…   5.21…   5.22…   5.23…   5.24…   5.25…   5.26…   5.27…   5.28…   6   7…   7.2   8   A   B   C…


5.13  Use Case on digital asset container information access and certificationp. 53

5.13.1  Descriptionp. 53

The network operators offer the digital asset management services for the users, with which some information (e.g. IDs) can be certified by the operator. The digital asset management services can also include
  • The management of the digital asset container is performed according to the applicable regulations.
  • The digital asset container has security properties (cannot be spoofed, access control with a policy determined by the user, etc.).
In the case of immersive XR media services, the user can choose, in the digital asset container, his/her digital representation and the related information, for example, the digital representation of the user (e.g. avatar), electronic money and associated financial services, identity, purchased items (the format of this information is at application layer and is not studied in 3GPP). This information can be used when accessing immersive XR media services or for real life services as the presentation of the identity.

5.13.2  Pre-conditionsp. 53

Alice has a service subscription with the operator. As part of the service, the network operator provides
  • The digital asset container management according to the future applicable regulations;
  • Security protection options of the digital asset container (e.g. cannot be spoofed, access control with a policy determined by the user, etc.).

5.13.3  Service Flowsp. 53

  1. Alice accesses the digital asset container data services. The digital asset container is initiated with Alice information (digital representation (e.g. avatar) profile, IDs ...). The digital assets are completed and modified over time. The service (allowing to store and update information) can be provided by the network operator or by a third party using an operator's trusted API.
  2. Alice wants to dispose of old paint and solvent at a local dump. She has to identify herself as being a local resident, authorized to use the dump. She has to provide payment information, to pay the fee to dispose of toxic waste. She interacts with the dump (services) and the ID and payment information is shared with the service. The authorities that run the facility now allowing Alice to put down the paint and solvent.
    Alice access to her digital asset container to select the list of information (local resident, payment information, ID) that she has already configured and saved (e.g. her digital representation (e.g. avatar) and other information like her electronic money and associated financial services, ID, purchased items, …). The choice of information can be automated (without action on the part of the user).
  3. She then connects to the digital service, e.g. mobile metaverse service, with the information she authorises to share for the successful provision of the service.

5.13.4  Post-conditionsp. 54

Alice is authorized to access and use the dump.

5.13.5  Existing features partly or fully covering the use case functionalityp. 54

This feature is currently not documented in the 3GPP specifications.
Concerning the user identity related aspects, the features described in the document TR 22.904 can be applied.

5.13.6  Potential New Requirements needed to support the use casep. 54

[PR 5.13.6-1]
The 5G system shall support allow a user to securely manage a digital asset container (e.g. store and update the information associated with this user).
[PR 5.13.6-2]
The 5G system shall support mechanisms to retrieve the information of a digital asset container associated with a user by an authorized third party.
[PR 5.13.6-3]
According to the service invoked when a user accesses an application platform, the 5G system shall support mechanisms to provide the information associated with the user to a third party.
[PR 5.13.6-4]
The 5G system shall support mechanisms to certify the authenticity of the information of a digital asset container associated with a user.
[PR 5.13.6-5]
The 5G system shall protect against spoofing attacks of the customer's digital asset container.

Up   Top   ToC