Information processing device and method
An information processing device and a technology for interactive information, applied in the field of information processing devices, can solve the problems of users handling daily affairs and low level of intelligence, and achieve the effect of improving the level of intelligence and improving user experience
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 example
[0074] Such as image 3 As shown, the first embodiment of the information processing method of the present invention is proposed, and the method includes the following steps:
[0075] S11. Collect user information and store it.
[0076] The user information includes at least endorsement information, and may also include personal information such as the user's name, address, contact number, date of birth, height, weight, certificate number, family members and friends. Endorsement information is information that can represent the identity of the user and uniquely corresponds to the user, such as any of the private information such as the user's biometric information, the user's signature information, the identification information of the mobile terminal held by the user (phone number, device ID, etc.) or a combination of at least two.
[0077] Biometric information such as eye prints (such as iris and sclera), fingerprints, ear prints, lip prints, voice prints and other featur...
no. 2 example
[0091] Such as Figure 4 As shown, the second embodiment of the information processing method of the present invention is proposed, and the method includes the following steps:
[0092] S21. Collect user information and store it.
[0093] This step S21 is the same as the step S11 in the first embodiment, and will not be repeated here.
[0094] At the same time, in this embodiment, the user information also includes identity verification information, and the identity verification information may be the user's biometric information, the user's signature information, and password information such as text passwords and graphic passwords set by the user.
[0095] S22. Receive the first interaction information sent by the external device.
[0096] This step S22 is the same as the step S12 in the first embodiment, and will not be repeated here.
[0097] S23. Perform identity verification on the user. When the verification is successful, step S24 is executed; when the verification...
no. 3 example
[0103] Such as Figure 5 Shown, propose the method 3rd embodiment of the present invention, described method comprises the following steps:
[0104] S31. Collect user information and store it.
[0105] This step S31 is the same as the step S11 in the first embodiment, and will not be repeated here.
[0106]At the same time, in this embodiment, the user information also includes identity verification information, and the identity verification information may be the user's biometric information, the user's signature information, and password information such as text passwords and graphic passwords set by the user.
[0107] S32. Receive the first interaction information sent by the external device.
[0108] S33. Acquire second interaction information according to the first interaction information and user information.
[0109] Steps S32 and S33 in this embodiment are respectively the same as steps S12 and S13 in the first embodiment, and will not be repeated here.
[0110] S3...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


