Authentication-based presentation of virtual content
A content and device technology, applied in digital data authentication, program/content distribution protection, 3D image processing, etc., can solve problems such as creators or creator content that are not allowed to experience
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0027] The techniques described herein enable the restriction and / or customization of virtual content displayed in an experience based on user identification. User information (e.g., login name, authentication credentials such as passwords or biometric data, etc.) may be used to determine and / or authenticate access to and from another computing device via the head mounted display device or connected to the head mounted display device. and / or the identity of the user who consumed the experience. The user identification can be used to determine which virtual content to display to the user as part of the experience. Thus, different users entering the same experience may be presented with different virtual content. This enables the creator of the experience to limit viewing of confidential and / or sensitive information. This also enables the creator of the experience to tailor or customize the virtual content displayed to each user entering and / or consuming the experience.
[00...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


