Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security setting and verifying method based on VR (Virtual Reality) equipment and terminal

A security verification and equipment technology, applied in the field of communications, can solve problems such as poor user experience and inability to perform verification, and achieve the effect of simple verification procedures, providing user experience, and a strong sense of context

Inactive Publication Date: 2017-07-04
SHENZHEN SPRINGWOODS HLDG CO LTD
View PDF2 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] This smart terminal verification method must require the user to carry the smart terminal with him to receive the password sent by the server during password verification. Difference

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security setting and verifying method based on VR (Virtual Reality) equipment and terminal
  • Security setting and verifying method based on VR (Virtual Reality) equipment and terminal
  • Security setting and verifying method based on VR (Virtual Reality) equipment and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] Embodiments of the present invention provide a VR device-based security setting and verification method and a terminal, which are used to improve user experience.

[0023] see figure 1 , an embodiment of the VR device-based security setting method in the embodiment of the present invention includes:

[0024] 101. Record the user's identity information;

[0025] When a user uses a VR device as a security tool, in order to ensure the accuracy and privacy of user information, the VR device binds and stores the user's identity information and password to facilitate the later verification of the user's identity by the VR device. Before the user sets a password, the user's identity information will be recorded.

[0026] 102. Prompt the user to start setting a password;

[0027] After the user enters his identity information in the VR device, the VR device prompts the user to start setting a password, and the user then enters his own password according to the prompt of the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a security setting and security verifying method based on VR (Virtual Reality) equipment and a terminal, which are used for improving the convenience and the usage experience of user verification. The security setting method based on the VR equipment in the embodiment of the invention comprises the steps of recording identity information of a user; reminding the user to start to set a password; displaying all sight focal points capable of being used as the password for the user; tracking and recording a customized sight focal point selected by the user from all the sight focal points; carrying out association storage on the identity information of the user and the customized sight focal point of the user. The invention also provides the security verifying method based on the VR equipment and the terminal, which are used for improving the convenience and the usage experience of the user verification.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to a VR device-based security setting and verification method and a terminal. Background technique [0002] With the continuous development of science and technology, smart terminals have been widely used in people's lives, and powerful smart terminals have also brought more and more convenience to people's daily life. In order to ensure the privacy of users in various fields Security, smart terminals are often widely used as a security tool. [0003] At present, the smart terminal on the market is used as a security tool, and usually receives the verification code sent by the server, and then requires the user to enter the verification code sent by the smart terminal. If the verification code is entered correctly, the user verification is successful, otherwise the verification fails. [0004] This smart terminal verification method must require the user to carry the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31G06F21/46H04L9/32
CPCG06F21/316G06F21/46H04L9/3226H04L9/3234
Inventor 贾二东
Owner SHENZHEN SPRINGWOODS HLDG CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products