The network operators offer the digital asset management services for the users, with which some information (e.g. IDs) can be certified by the operator. The digital asset management services can also include
-
The management of the digital asset container is performed according to the applicable regulations.
-
The digital asset container has security properties (cannot be spoofed, access control with a policy determined by the user, etc.).
In the case of immersive XR media services, the user can choose, in the digital asset container, his/her digital representation and the related information, for example, the digital representation of the user (e.g. avatar), electronic money and associated financial services, identity, purchased items (the format of this information is at application layer and is not studied in 3GPP). This information can be used when accessing immersive XR media services or for real life services as the presentation of the identity.
Alice has a service subscription with the operator. As part of the service, the network operator provides
-
The digital asset container management according to the future applicable regulations;
-
Security protection options of the digital asset container (e.g. cannot be spoofed, access control with a policy determined by the user, etc.).
Alice is authorized to access and use the dump.
This feature is currently not documented in the 3GPP specifications.
Concerning the user identity related aspects, the features described in the document
TR 22.904 can be applied.
[PR 5.13.6-1]
The 5G system shall support allow a user to securely manage a digital asset container (e.g. store and update the information associated with this user).
[PR 5.13.6-2]
The 5G system shall support mechanisms to retrieve the information of a digital asset container associated with a user by an authorized third party.
[PR 5.13.6-3]
According to the service invoked when a user accesses an application platform, the 5G system shall support mechanisms to provide the information associated with the user to a third party.
[PR 5.13.6-4]
The 5G system shall support mechanisms to certify the authenticity of the information of a digital asset container associated with a user.
[PR 5.13.6-5]
The 5G system shall protect against spoofing attacks of the customer's digital asset container.