Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x
Top   in Index   Prev   Next

TR 33.721
Study on Security aspects of 5G Mobile Metaverse services

V19.1.0 (Wzip)  2025/09  … p.
Rapporteur:
Miss Xiong, Lihui
OPPO

full Table of Contents for  TR 33.721  Word version:  19.1.0

each clause number in 'red' refers to the equivalent title in the Partial Content
Here   Top
1Scope  p. 8
2References  p. 8
3Definitions of terms, symbols and abbreviations  p. 8
3.1Terms  p. 8
3.2Symbols  p. 9
3.3Abbreviations  p. 9
4Security assumptions  p. 9
5Key issues  p. 9
5.1Key Issue #1: Authorization supporting spatial localization service  p. 9
5.1.1Key issue details  p. 9
5.1.2Security threats  p. 9
5.1.3Potential security requirements  p. 10
5.2Key Issue #2: Privacy of user sensitive information  p. 10
5.2.1Key issue details  p. 10
5.2.2Security threats  p. 10
5.2.3Potential security requirements  p. 10
5.3Key issue #3: Security aspects of digital asset container in 5G  p. 10
5.3.1Key issue details  p. 10
5.3.2Security threats  p. 10
5.3.3Potential security requirements  p. 10
5.4Key Issue #4: Authentication and authorization of digital representation  p. 11
5.4.1Key issue details  p. 11
5.4.2Security threats  p. 11
5.4.3Potential security requirements  p. 12
6Solutions  p. 12
6.0Mapping of solutions to key issues  p. 12
6.1Solution #1: Support for spatial localization service authorization  p. 12
6.1.1Introduction  p. 12
6.1.2Solution details  p. 12
6.1.3Evaluation  p. 14
6.2Solution #2: Solution for KI#1 on Authorization supporting spatial localization service with CAPIF Core Function (CCF)  p. 14
6.2.1Introduction  p. 14
6.2.2Solution details  p. 14
6.2.2.0General  p. 14
6.2.2.1Procedure of authorization for spatial localization service  p. 15
6.2.3Evaluation  p. 16
6.3Solution #3: Solution for KI#1 on Authorization supporting spatial localization service with CAPIF Core Function (CCF) in case of different resource owner  p. 16
6.3.1Introduction  p. 16
6.3.2Solution details  p. 16
6.3.2.0General  p. 16
6.3.2.1Procedure of authorization of spatial anchor service with multiple VAL server  p. 17
6.3.3Evaluation  p. 18
6.4Solution #4: Privacy protection for user sensitive information exposure  p. 18
6.4.1Introduction  p. 18
6.4.2Solution details  p. 18
6.4.3Evaluation  p. 18
6.5Solution #5: Privacy protection during metaverse service discovery  p. 18
6.5.1Introduction  p. 18
6.5.2Solution details  p. 19
6.5.3Evaluation  p. 20
6.6Solution #6: Digital asset request validation  p. 20
6.6.1Introduction  p. 20
6.6.2Solution details  p. 20
6.6.2.1Access token request/response  p. 20
6.6.2.2Digital asset request validation procedure  p. 21
6.6.3Evaluation  p. 21
6.7Solution #7: Authorize avatar by metaverse service provider  p. 21
6.7.1Introduction  p. 21
6.7.2Solution details  p. 22
6.7.3Evaluation  p. 23
6.8Solution #8: Authenticate and authorize DA client to create a digital asset  p. 23
6.8.1Introduction  p. 23
6.8.2Solution details  p. 24
6.8.3Evaluation  p. 25
6.9Solution #9: Authenticate and authorize VAL server/client to access digital asset  p. 25
6.9.1Introduction  p. 25
6.9.2Solution details  p. 26
6.9.3Evaluation  p. 27
6.10Solution #10: Avatar authentication and authorization supported by A-DACM architecture  p. 27
6.10.1Introduction  p. 27
6.10.2Solution details  p. 27
6.10.2.1Description  p. 27
6.10.2.2Avatar authentication procedure  p. 28
6.10.2.3Avatar authorization procedure  p. 29
6.10.3Evaluation  p. 30
6.11Solution #11: Avatar authentication and authorization supported by CAPIF  p. 31
6.11.1Introduction  p. 31
6.11.2Solution details  p. 31
6.11.3Evaluation  p. 32
7Conclusions  p. 32
7.1Conclusion on Key Issue #1  p. 32
7.2Conclusion on Key Issue #2  p. 32
7.3Conclusion on Key Issue #3  p. 32
7.4Conclusion on Key Issue #4  p. 33
$Change history  p. 34

Up   Top