CN116432155A - Identity verification method based on VR equipment - Google Patents

Identity verification method based on VR equipment Download PDF

Info

Publication number
CN116432155A
CN116432155A CN202310249540.2A CN202310249540A CN116432155A CN 116432155 A CN116432155 A CN 116432155A CN 202310249540 A CN202310249540 A CN 202310249540A CN 116432155 A CN116432155 A CN 116432155A
Authority
CN
China
Prior art keywords
data
preset
verification
user identity
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310249540.2A
Other languages
Chinese (zh)
Inventor
窦方钰
陈锣斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alipay Hangzhou Information Technology Co Ltd
Original Assignee
Alipay Hangzhou Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alipay Hangzhou Information Technology Co Ltd filed Critical Alipay Hangzhou Information Technology Co Ltd
Priority to CN202310249540.2A priority Critical patent/CN116432155A/en
Publication of CN116432155A publication Critical patent/CN116432155A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/011Arrangements for interaction with the human body, e.g. for user immersion in virtual reality
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • G06Q20/40145Biometric identity checks

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Human Computer Interaction (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The invention discloses an identity verification method based on VR equipment, which comprises the following steps: receiving user setting data; extracting user identity authentication data from the user setting data and storing the user identity authentication data; wherein the user setting data comprises preset cursor data received by the VR device and/or preset action data of the VR handle sensed by a sensor of the VR device; when identity verification is carried out, receiving a verification password input by a user, extracting user identity verification data from the verification password, comparing the user identity verification data with the user identity authentication data, and judging whether identity verification is passed or not based on a comparison result; wherein the verification password comprises verification cursor data received by the VR device and/or verification action data of the VR handle sensed by a sensor of the VR device. Correspondingly, the invention also discloses VR equipment and an identity verification system based on the VR equipment.

Description

Identity verification method based on VR equipment
Technical Field
The present invention relates to identity verification methods, and more particularly, to identity verification methods for VR devices.
Background
VR technology is also known as virtual reality technology, and provides a realistic virtual world with multiple sensory experiences, such as three-dimensional vision, hearing, touch, etc., for users by means of devices such as computers, handles, etc. With the continuous development of social productivity and science and technology, various industries have increasingly demanded VR technology, and the output of VR devices has also become larger and larger, and thus, the traffic entrance of a part of services is also a strong demand for performing payment operations in VR devices.
Currently, there are two common ways to perform payment operations in VR devices:
the method is convenient and provides good user experience, and the payment channel and the VR equipment are bound for payment subscription in the early stage, and the payment is completed through fund deduction in the later stage. However, since the fund substitute is not checked for user identity during payment, other users can also pay directly on the bound VR device, with a certain fund security risk.
In another mode, the VR equipment is compatible with data of a payment tool on the side of the mobile phone App, and a user can input an original account number and a payment password in the App through a virtual keyboard to complete identity verification. However, the payment password in the method is very easy to be stolen by malicious attack on VR equipment with low security water level, so that funds and information in an App are at risk of being stolen, and the user experience provided by the method lacks immersion and has insufficient personalized expansibility.
Therefore, the invention hopes to provide an identity verification method and system on VR equipment, which can ensure the reliability of user authorization and the safety of funds by carrying out identity verification during each payment.
Disclosure of Invention
The invention aims to provide an identity verification method based on VR equipment, which can ensure that a user performs identity verification when paying each time by using the VR equipment, so that the reliability of user authorization and the safety of funds can be effectively ensured.
Based on the above object, the present invention provides an identity verification method based on VR device, which includes the steps of:
receiving user setting data;
extracting user identity authentication data from the user setting data and storing the user identity authentication data; wherein the user setting data comprises preset cursor data received by the VR device and/or preset action data of the VR handle sensed by a sensor of the VR device;
when identity verification is carried out, receiving a verification password input by a user, extracting user identity verification data from the verification password, comparing the user identity verification data with the user identity authentication data, and judging whether identity verification is passed or not based on a comparison result; wherein the verification password comprises verification cursor data received by the VR device and/or verification action data of the VR handle sensed by a sensor of the VR device.
The identity verification method based on the VR device comprises two stages of user setting and identity verification, and is different from the prior art in that the identity verification method based on the VR device is used for verifying the identity of a user based on somatosensory data, including cursor data and/or action data, collected by the VR device, wherein the cursor data is input and displayed on a VR screen through actions of a VR handle, and the action data is actions of the VR handle collected by a sensor. By comparing the verification password with the characteristics of the somatosensory data with the preset user identity authentication data, the identity verification method with high safety level and personalized expansibility is provided, and meanwhile, the immersive experience characteristic of the VR equipment is maintained, so that the identity verification method has higher suitability with the VR equipment.
Further, extracting user identity authentication data from the user setting data and storing specifically includes:
obtaining a preset cursor trace based on the preset cursor data;
identifying corresponding preset characters based on the preset cursor trace, and storing the preset characters as one of the user identity authentication data;
extracting user identity verification data from the verification password, and comparing the user identity verification data with the user identity authentication data specifically comprises the following steps:
obtaining a check cursor trace based on the check cursor data;
identifying corresponding check characters based on the check cursor marks;
and comparing the check characters with preset characters.
Further, extracting user identity authentication data from the user setting data and storing specifically includes:
obtaining a preset cursor trace based on the preset cursor data;
converting the preset cursor trace into a preset image, and storing the preset image as one of the user identity authentication data;
extracting user identity verification data from the verification password, and comparing the user identity verification data with the user identity authentication data specifically comprises the following steps:
Obtaining a check cursor trace based on the check cursor data;
converting the check cursor trace into a check image;
and comparing the check image with a preset image.
Further, extracting user identity authentication data from the user setting data and storing specifically includes:
obtaining a preset multidimensional directional vector group based on the preset action data;
storing the preset multidimensional directional vector group as one of the user identity authentication data;
extracting user identity verification data from the verification password, and comparing the user identity verification data with the user identity authentication data specifically comprises the following steps:
based on the verification action data, a verification multidimensional directional vector group is obtained;
and comparing the checking multi-dimensional directional vector group with a preset multi-dimensional directional vector group.
Further, the preset multi-dimensional directional vector group and the check multi-dimensional directional vector group respectively at least comprise: a time series of height changes and a time series of angle changes of the VR handle.
It should be noted that the user authentication data and the user identity verification data may include only one password feature, such as a text or an image or a multidimensional directed vector group; various password features can be included, such as any two of the above combinations or the combination of words, images and multidimensional directed vector groups, the more the password features are included, the higher the accuracy of identity verification, and the better the security effect.
In a preferred embodiment, to further ensure security, identity verification may be performed by: comparing the check characters with preset characters; comparing the check image with a preset image; and comparing the checking multi-dimensional directional vector group with a preset multi-dimensional directional vector group, and considering that the checking passes only if the three comparison passes.
Further, the user authentication data is bound to the VR device that sets the user setting data corresponding to the user authentication data, so that the user authentication data uniquely corresponds to the VR device.
The identity verification method based on the VR device can be realized based on various physical devices, for example, the identity verification method can be realized based on the VR device or can be realized based on the VR device and a server with data interaction with the VR device. Based on this:
the invention further aims to provide the VR equipment which has the function of identity verification, a user inputs a verification password by utilizing the VR handle, and the identity verification information is received by combining a cursor in a VR screen and a sensor on the VR handle, so that the identity verification equipment which has a high safety level and personalized expansibility is provided, and the immersion sense of user experience is ensured.
Based on the above objects, the present invention provides a VR device comprising a VR handle, a sensor, and an identity verification module, wherein:
the identity verification module receives user setting data input by a user, extracts user identity authentication data from the user setting data and stores the user identity authentication data; the user setting data comprise preset cursor data received by the VR equipment and/or preset action data of the VR handle sensed by the sensor;
when identity verification is carried out, the identity verification module receives a verification password input by a user, extracts user identity verification data from the verification password, compares the user identity verification data with the user identity authentication data, and judges whether identity verification is passed or not based on a comparison result; wherein the verification password comprises verification cursor data received by the VR device and/or verification action data of the VR handle sensed by the sensor.
After the user adopts the VR equipment to carry out identity verification and inputs a verification password through the setting of the VR handle, the obtained verification password is analyzed and compared by utilizing a cursor in the VR screen and a sensor on the VR handle, and the VR equipment and the user are bound one by one.
Further, extracting user identity authentication data from the user setting data and storing specifically includes:
obtaining a preset cursor trace based on the preset cursor data;
identifying corresponding preset characters based on the preset cursor trace, and storing the preset characters as one of the user identity authentication data;
extracting user identity verification data from the verification password, and comparing the user identity verification data with the user identity authentication data specifically comprises the following steps:
obtaining a check cursor trace based on the check cursor data;
identifying corresponding check characters based on the check cursor marks;
and comparing the check characters with preset characters.
Further, extracting user identity authentication data from the user setting data and storing specifically includes:
obtaining a preset cursor trace based on the preset cursor data;
converting the preset cursor trace into a preset image, and storing the preset image as one of the user identity authentication data;
extracting user identity verification data from the verification password, and comparing the user identity verification data with the user identity authentication data specifically comprises the following steps:
Obtaining a check cursor trace based on the check cursor data;
converting the check cursor trace into a check image;
and comparing the check image with a preset image.
Further, extracting user identity authentication data from the user setting data and storing specifically includes:
obtaining a preset multidimensional directional vector group based on the preset action data;
storing the preset multidimensional directional vector group as one of the user identity authentication data;
extracting user identity verification data from the verification password, and comparing the user identity verification data with the user identity authentication data specifically comprises the following steps:
based on the verification action data, a verification multidimensional directional vector group is obtained;
and comparing the checking multi-dimensional directional vector group with a preset multi-dimensional directional vector group.
Further, the preset multi-dimensional directional vector group and the check multi-dimensional directional vector group respectively at least comprise: a time series of height changes and a time series of angle changes of the VR handle.
It should be noted that the user authentication data and the user identity verification data may include only one password feature, such as a text or an image or a multidimensional directed vector group; various password features can be included, such as any two of the above combinations or the combination of words, images and multidimensional directed vector groups, the more the password features are included, the higher the accuracy of identity verification, and the better the security effect.
In a preferred embodiment, to further ensure security, identity verification may be performed by: comparing the check characters with preset characters; comparing the check image with a preset image; and comparing the checking multi-dimensional directional vector group with a preset multi-dimensional directional vector group, and considering that the checking passes only if the three comparison passes.
Further, it binds the user authentication data with the VR device that sets the user setting data corresponding to the user authentication data so that the user authentication data uniquely corresponds to the VR device.
It is a further object of the present invention to provide an identity verification system based on VR devices.
Based on the above object, the present invention also provides an identity verification system based on VR device, which includes a server and VR device, wherein:
the VR device receives user setting data from the VR device;
the server extracts user identity authentication data from the user setting data and stores the user identity authentication data; wherein the user setting data comprises preset cursor data received by the VR device and/or preset action data of the VR handle sensed by a sensor of the VR device;
When identity verification is carried out, the server receives a verification password input by a user from VR equipment, extracts user identity verification data from the verification password, compares the user identity verification data with the user identity authentication data, and judges whether identity verification is passed or not based on a comparison result; wherein the verification password comprises verification cursor data received by the VR device and/or verification action data of the VR handle sensed by a sensor of the VR device.
Further, the server extracts user identity authentication data from the user setting data and stores the user identity authentication data specifically including:
obtaining a preset cursor trace based on the preset cursor data;
identifying corresponding preset characters based on the preset cursor trace, and storing the preset characters as one of the user identity authentication data;
extracting user identity verification data from the verification password, and comparing the user identity verification data with the user identity authentication data specifically comprises the following steps:
obtaining a check cursor trace based on the check cursor data;
identifying corresponding check characters based on the check cursor marks;
And comparing the check characters with preset characters.
Further, the server extracts user identity authentication data from the user setting data and stores the user identity authentication data specifically including:
obtaining a preset cursor trace based on the preset cursor data;
converting the preset cursor trace into a preset image, and storing the preset image as one of the user identity authentication data;
extracting user identity verification data from the verification password, and comparing the user identity verification data with the user identity authentication data specifically comprises the following steps:
obtaining a check cursor trace based on the check cursor data;
converting the check cursor trace into a check image;
and comparing the check image with a preset image.
Further, the server extracts user identity authentication data from the user setting data and stores the user identity authentication data specifically including:
obtaining a preset multidimensional directional vector group based on the preset action data;
storing the preset multidimensional directional vector group as one of the user identity authentication data;
extracting user identity verification data from the verification password, and comparing the user identity verification data with the user identity authentication data specifically comprises the following steps:
Based on the verification action data, a verification multidimensional directional vector group is obtained;
and comparing the checking multi-dimensional directional vector group with a preset multi-dimensional directional vector group.
Further, the preset multi-dimensional directional vector group and the check multi-dimensional directional vector group respectively at least comprise: a time series of height changes and a time series of angle changes of the VR handle.
It should be noted that the user authentication data and the user identity verification data may include only one password feature, such as a text or an image or a multidimensional directed vector group; various password features can be included, such as any two of the above combinations or the combination of words, images and multidimensional directed vector groups, the more the password features are included, the higher the accuracy of identity verification, and the better the security effect.
In a preferred embodiment, to further ensure security, identity verification may be performed by: comparing the check characters with preset characters; comparing the check image with a preset image; and comparing the checking multi-dimensional directional vector group with a preset multi-dimensional directional vector group, and considering that the checking passes only if the three comparison passes.
Further, the server binds the user authentication data with the VR device that transmits the user setting data corresponding to the user authentication data, so that the user authentication data uniquely corresponds to the VR device.
It is a further object of the present invention to provide a computer readable storage medium storing a computer program which, when executed by a processor, implements the steps of any of the methods described above.
It is a further object of the invention to provide an electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, which processor implements the steps of any of the methods described above when executing the program.
The identity verification method based on VR equipment has the following beneficial effects:
the identity verification method based on the VR equipment verifies the identity of the user based on the collection and verification of the somatosensory action data of the user, so that different users have identity authentication information which is special for the user and is difficult to forge and break through, compared with the existing scheme of inputting passwords through a virtual keyboard of the VR equipment, the identity verification method based on the VR equipment has higher safety, personalized expansibility and the characteristic of immersive experience of the VR equipment is reserved, and the identity verification method based on the VR equipment has higher suitability with the VR equipment.
In a more preferable technical scheme, VR equipment and users are bound one by one, so that the safety is further guaranteed.
Drawings
Fig. 1 schematically illustrates a flow chart of a VR device-based identity verification method according to the present invention in one embodiment.
Fig. 2 schematically illustrates steps performed by the VR device based identity verification method of the present invention in one embodiment.
Fig. 3 schematically illustrates a VR device according to an embodiment of the present invention.
Fig. 4 schematically illustrates a structural diagram of a VR device-based identity verification system in accordance with the present invention in one embodiment.
Detailed Description
The VR device based identity verification method and system of the present invention will be described in further detail below with reference to the attached drawings and specific examples, but the detailed description is not meant to limit the invention.
Fig. 1 schematically illustrates a flow chart of a VR device-based identity verification method according to the present invention in one embodiment.
In one embodiment of the present invention, a VR device-based identity verification method is provided, as shown in fig. 1, including:
100: user setting data is received.
Before the VR device is used for identity verification for the first time, the user needs to set user setting data, which may be referred to as a setting password. The user enters a setting password interface in the VR screen, and inputs the setting password through the VR handle. The user setting data includes preset cursor data received by the VR device and/or preset motion data of the VR handle sensed by a sensor of the VR device, and in a preferred embodiment, both the preset cursor data and the preset motion data.
In a particular embodiment, setting the password includes presenting various characters on the VR screen, such as at least one of chinese, english, numbers, graphics, symbols, and the like; further included is motion data sensed by the sensor when the VR handle is drawing the characters.
110: extracting user identity authentication data from the user setting data and storing the user identity authentication data:
as is well known to those skilled in the art, VR devices typically include a VR handle for inputting somatosensory motion signals of a user and VR glasses in which virtual scenes, including virtual screens, may be displayed.
Thus, in some embodiments, the preset cursor data in the user setting data may be drawn by action through the VR handle, and in some embodiments may also be displayed on the virtual screen of the VR glasses in conjunction with a button press input on the VR handle. The cursor displays the currently selected and indicated position, for example, in the PICO device, the position is indicated by using two rays as the cursor.
Therefore, by analyzing the preset cursor data, the cursor handwriting corresponding to the set password set and input by the user, namely the cursor trace, can be obtained, the cursor trace can be further analyzed to obtain characters or images representing the content of the set password, and the user identity authentication data is extracted from the user set data, namely the characters and/or images are extracted.
The preset action data in the user setting data is obtained by sensing the change of the amplitude and the angle of the action of the VR handle with time when the user inputs the setting password through the sensor. Through analysis of preset action data, action characteristics of a user operating the VR handle in the password inputting process can be obtained, the action characteristics can be expressed in the form of vector groups, the user identity authentication data can be extracted from the user setting data, and the action characteristics can be extracted.
In some preferred embodiments, the user authentication data and the VR device that sets the user setting data corresponding to the user authentication data may be bound such that the user authentication data uniquely corresponds to the VR device.
User identity authentication data containing various password features is obtained and the data is uniquely bound with equipment, so that the accuracy of identity verification is guaranteed, the safety level of the identity verification is greatly improved, and the risk that payment passwords are stolen after VR equipment suffers from malicious attack is reduced.
120: when identity verification is carried out, receiving a verification password input by a user, extracting user identity verification data from the verification password, comparing the user identity verification data with user identity authentication data, and judging whether the identity verification is passed or not based on a comparison result; wherein the verification password includes verification cursor data received by the VR device and/or verification action data of the VR handle sensed by a sensor of the VR device.
When the identity is verified, after entering an interface for inputting a verification password, a sensor on the VR device is synchronously started to capture action data related to the verification password.
When the user inputs the verification password, the user also performs action drawing through the VR handle, and in some embodiments, the user can also input by pressing a button on the VR handle, so that the user can display the verification password on a virtual screen of the VR glasses. Meanwhile, the verification action data are obtained by sensing the change of the amplitude and the angle of the action of the VR handle with time when the user inputs the verification password through the sensor.
Similarly, by analyzing the verification cursor data, the corresponding cursor handwriting, i.e. the cursor trace, can be obtained, and further analyzing the cursor trace can obtain the text or image representing the content of the verification password, and extracting the user identity verification data from the verification password includes extracting the text and/or image.
Likewise, by analyzing the verification action data, an action feature of the user when operating the VR handle during inputting the verification password may be obtained, where the action feature may be represented in a vector group, and extracting the user identity verification data from the verification password may further include extracting the action feature.
It should be noted that the user identity verification data may comprise only one password feature, i.e. text, or an image, or a multi-dimensional directed vector set. Multiple password features can be included, for example, characters, images and multidimensional directed vector groups are included at the same time, and the more the password features are included, the higher the accuracy of identity verification is, and the better the security effect is. When data comparison is carried out, for user identity authentication data and user identity verification data containing a password feature, if the password feature comparison is successful, identity verification can be passed; for user identity authentication data and user identity verification data containing multiple password features, identity verification can only be passed when all password features are successfully compared. Wherein, for the password characteristics in the text form, the consistency comparison can be directly carried out; for password features in the forms of images or vector groups, the general similarity algorithm can be used for similarity calculation and matching, and if the similarity is higher than a set threshold value, the comparison is successful.
In some specific embodiments, extracting user identity authentication data from the user setup data and storing specifically includes: obtaining a preset cursor trace based on preset cursor data; and identifying corresponding preset characters based on the preset cursor trace, and storing the preset characters as one of the user identity authentication data.
Extracting user identity verification data from the verification password, and comparing the user identity verification data with user identity authentication data specifically comprises the following steps: obtaining a check cursor trace based on the check cursor data; identifying corresponding check characters based on the check cursor trace; and comparing the check characters with preset characters.
The password is formed by combining a plurality of symbols such as Chinese, english, numerals and the like, the specific content can be expressed by directly using characters, and after the corresponding preset cursor trace is obtained or the cursor trace is checked, the specific character content of the corresponding password can be identified by utilizing a universal OCR character recognition algorithm. And comparing the characters in the user identity authentication data with the characters in the user identity verification data by a general algorithm, and if the characters are completely consistent, successfully comparing. When the corresponding preset text is identified based on the preset cursor trace, if the corresponding preset text cannot be identified, the user is required to reenter the password.
In some specific embodiments, extracting user identity authentication data from the user setup data and storing specifically includes: obtaining a preset cursor trace based on preset cursor data; and converting the preset cursor trace into a preset image, and storing the preset image as one of the user identity authentication data.
Extracting user identity verification data from the verification password, and comparing the user identity verification data with user identity authentication data specifically comprises the following steps: obtaining a check cursor trace based on the check cursor data; converting the calibration mark into a calibration image; and comparing the check image with a preset image.
When comparing the check image with the preset image, the similarity algorithm in the prior art can be adopted to carry out similarity comparison, and if the calculated similarity is higher than a certain threshold value, the comparison is successful. If the words express the specific content of the password, the image can express the shape characteristic of the password, and the errors generated by word recognition are made up, so that a more accurate data comparison result and an identity verification result are obtained.
In some specific embodiments, extracting user identity authentication data from the user setup data and storing specifically includes: obtaining a preset multidimensional directional vector group based on preset action data; and storing the preset multidimensional directional vector group as one of the user identity authentication data.
Extracting user identity verification data from the verification password, and comparing the user identity verification data with user identity authentication data specifically comprises the following steps: based on the verification action data, obtaining a verification multidimensional directional vector group; and comparing the check multi-dimensional directional vector group with a preset multi-dimensional directional vector group.
In some more specific embodiments, the preset multi-dimensional directional vector set and the check multi-dimensional directional vector set each include at least: a time series of height changes and a time series of angle changes of the VR handle.
The change of the height and the angle can reflect the movement amplitude of the arm and the wrist of the user in the process of inputting the password once, and the time sequence can reflect the speed of each action when the user operates the entity trigger, so that whether the characters input by the user are consistent or not can be reflected. Compared with characters and images, the multidimensional directed vector group expresses password characteristics from abstract sense dimensions, so that user identity verification data and user identity authentication data are more comprehensive.
When the checking multi-dimensional directional vector set is compared with the preset multi-dimensional directional vector set, similarity matching can be performed by adopting a similarity algorithm in the prior art or other similar methods known to those skilled in the art, and if the calculated similarity is higher than a set threshold value, the comparison is successful.
It should be noted that the user authentication data and the user identity verification data may include only one password feature, such as a text or an image or a multidimensional directed vector group; various password features can be included, such as any two of the above combinations or the combination of words, images and multidimensional directed vector groups, the more the password features are included, the higher the accuracy of identity verification, and the better the security effect.
When data comparison is carried out, for user identity authentication data and user identity verification data containing a password feature, if the password feature comparison is successful, identity verification can be passed; for user identity authentication data and user identity verification data containing multiple password features, identity verification can only be passed when all password features are successfully compared.
Fig. 2 schematically illustrates steps performed by the VR device based identity verification method of the present invention in one embodiment.
In a preferred embodiment, as shown in fig. 2, the identity verification method comprises a setup phase and a verification phase.
Before identity verification is performed for the first time, a user needs to perform setting of user setting data. In the setup phase, the user enters a password setup interface while the sensors on the VR device are synchronously on for capturing user setup data. The user setting data comprises preset cursor data received by the VR device and preset action data of a VR handle sensed by a sensor of the VR device.
Then extracting user identity authentication data from the user setting data, obtaining corresponding preset characters through cursor position perception analysis for preset cursor data, and obtaining corresponding preset images through cursor image analysis; and for preset action data, acquiring a corresponding preset multidimensional directed vector group comprising a height change time sequence and an angle change time sequence of the VR handle through a sensor, so that all user identity authentication data are acquired through VR equipment data perception analysis and stored in a system database.
In the verification stage, a user initiates an identity verification request, and after entering an interface for inputting a verification password, a sensor on the VR equipment is synchronously started, so that the user inputs the verification password through the VR equipment, wherein the verification password simultaneously comprises verification cursor data received by the VR equipment and verification action data of a VR handle sensed by the sensor of the VR equipment. After receiving a verification password input by a user, extracting user identity verification data from the verification password, comparing the user identity verification data with user identity authentication data, judging whether the identity verification is passed or not based on a comparison result, and returning an identity verification result.
In this embodiment, all of the following three types of comparisons need to be satisfied at the same time to pass identity verification:
Obtaining a check cursor trace based on the check cursor data; identifying corresponding check characters based on the check cursor trace; and comparing whether the check characters are consistent with the preset characters, and if so, successfully comparing.
Obtaining a check cursor trace based on the check cursor data; converting the calibration mark into a calibration image; and comparing the similarity between the check image and the preset image, and if the similarity is higher than a set threshold value, successfully comparing.
Based on the verification action data, obtaining a verification multidimensional directional vector group; and comparing and checking the similarity of the multi-dimensional directional vector group and the preset multi-dimensional directional vector group, and if the similarity is higher than a certain threshold value, successfully comparing.
When the comparison of the three groups of data is successful, the identity verification is passed; otherwise, if only one group of data fails to be compared, the identity verification is not passed.
Fig. 3 schematically illustrates a VR device according to an embodiment of the present invention.
In another embodiment of the present invention, a VR device is provided, as shown in fig. 3, comprising a VR handle 20, VR glasses (not shown), a sensor 22, and an identity verification module 24, wherein:
the identity verification module receives user setting data input by a user, extracts user identity authentication data from the user setting data and stores the user identity authentication data; the user setting data comprise preset cursor data received by the VR equipment and/or preset action data of the VR handle sensed by the sensor;
When identity verification is carried out, the identity verification module receives a verification password input by a user, extracts user identity verification data from the verification password, compares the user identity verification data with the user identity authentication data, and judges whether the identity verification is passed or not based on a comparison result; wherein the verification password comprises verification cursor data received by the VR device and/or verification action data of the VR handle sensed by the sensor.
In some embodiments, user authentication data is bound to a VR device that sets user setup data corresponding to the user authentication data such that the user authentication data uniquely corresponds to the VR device.
The identity verification module can obtain cursor handwriting corresponding to the password set and input by the user, namely a cursor trace, through analyzing the preset cursor data, and further analyze the cursor trace to obtain characters or images representing the password content, and the characters or images are stored in the system database as one of the user identity authentication data. Meanwhile, through analysis of preset action data, action characteristics of a user operating the VR handle in the password inputting process can be obtained, and the action characteristics are stored in a system database in the form of vector groups as one of user identity authentication data.
In some specific embodiments, extracting user identity authentication data from the user setup data and storing specifically includes: obtaining a preset cursor trace based on preset cursor data; and identifying corresponding preset characters based on the preset cursor trace, and storing the preset characters as one of the user identity authentication data.
Extracting user identity verification data from the verification password, and comparing the user identity verification data with user identity authentication data specifically comprises the following steps: obtaining a check cursor trace based on the check cursor data; identifying corresponding check characters based on the check cursor trace; and comparing the check characters with preset characters.
In some embodiments, the setting password and the corresponding verification password may be formed by combining a plurality of symbols such as Chinese, english, numerals, etc., the specific content of the setting password and the corresponding verification password may be expressed directly by using text, and when the corresponding preset cursor trace or the corresponding verification cursor trace is obtained, the specific text content of the corresponding password may be identified by using a general OCR text recognition algorithm. And comparing the characters in the user identity authentication data with the characters in the user identity verification data character by character, and if the characters are completely consistent, successfully comparing. When the corresponding preset text is identified based on the preset cursor trace, if the corresponding preset text cannot be identified, the user is required to input the verification password again.
In some specific embodiments, extracting user identity authentication data from the user setup data and storing specifically includes: obtaining a preset cursor trace based on preset cursor data; and converting the preset cursor trace into a preset image, and storing the preset image as one of the user identity authentication data.
Extracting user identity verification data from the verification password, and comparing the user identity verification data with user identity authentication data specifically comprises the following steps: obtaining a check cursor trace based on the check cursor data; converting the calibration mark into a calibration image; and comparing the check image with a preset image.
When comparing the check image with the preset image, the similarity algorithm in the prior art can be adopted to carry out similarity comparison, and if the calculated similarity is higher than a set threshold value, the comparison is successful. If the words express the specific content of the password, the image can express the shape characteristic of the password, and the errors generated by word recognition are made up, so that a more accurate data comparison result and an identity verification result are obtained.
In some specific embodiments, extracting user identity authentication data from the user setup data and storing specifically includes: obtaining a preset multidimensional directional vector group based on preset action data; and storing the preset multidimensional directional vector group as one of the user identity authentication data.
Extracting user identity verification data from the verification password, and comparing the user identity verification data with user identity authentication data specifically comprises the following steps: based on the verification action data, obtaining a verification multidimensional directional vector group; and comparing the check multi-dimensional directional vector group with a preset multi-dimensional directional vector group.
In some more specific embodiments, the preset multi-dimensional directional vector set and the check multi-dimensional directional vector set each include at least: a time series of height changes and a time series of angle changes of the VR handle.
The change of the height and the angle can reflect the movement amplitude of the arm and the wrist of the user in the process of inputting the password once, and the time sequence can reflect the speed of each action when the user operates the entity trigger, so that whether the characters input by the user are consistent or not can be reflected. Compared with characters and images, the multidimensional directed vector group expresses password characteristics from abstract sense dimensions, so that user identity verification data and user identity authentication data are more comprehensive.
When the checking multidimensional directional vector group is compared with the preset multidimensional directional vector group, similarity matching can be carried out by adopting a similarity algorithm or other more complex models in the prior art, and if the calculated similarity is higher than a certain threshold value, the comparison is successful.
It should be noted that the user authentication data and the user identity verification data may include only one password feature, such as a text or an image or a multidimensional directed vector group; various password features can be included, such as any two of the above combinations or the combination of words, images and multidimensional directed vector groups, the more the password features are included, the higher the accuracy of identity verification, and the better the security effect.
When data comparison is carried out, for user identity authentication data and user identity verification data containing a password feature, if the password feature comparison is successful, identity verification can be passed; for user identity authentication data and user identity verification data containing multiple password features, identity verification can only be passed when all password features are successfully compared.
In another embodiment of the present invention, a VR device based identity verification system is presented, as shown in fig. 4, comprising a server 30 and a VR device 32, wherein:
the VR device 32 receives user setting data from the VR device;
the server 30 extracts user identity authentication data from the user setting data and stores the data; wherein the user setting data includes preset cursor data received by the VR device 32 and/or preset motion data of the VR handle sensed by a sensor of the VR device 32;
When identity verification is performed, the server 30 receives a verification password input by a user from the VR device 32, extracts user identity verification data from the verification password, compares the user identity verification data with user identity authentication data, and determines whether identity verification is passed or not based on a comparison result; wherein the verification password includes verification cursor data received by the VR device 32 and/or verification action data of the VR handle sensed by a sensor of the VR device 32.
Before identity verification is performed for the first time, a user needs to input user setting data, which can be called a setting password, through VR equipment. The user enters a password setting interface in a virtual screen of the VR glasses, and simultaneously a sensor on the VR device is synchronously started, so that the user inputs a password through the VR device, and user setting data are obtained. After the setting is completed, the VR device sends the user setting data to the server, and the server extracts the user identity authentication data from the user setting data and stores the user identity authentication data.
The preset cursor data in the user setting data and the check cursor data in the check password are input by drawing actions through the VR handle, and in some embodiments, the preset cursor data and the check cursor data in the user setting data can also be input by pressing a button on the VR handle, so that the preset cursor data and the check cursor data in the check password are displayed on a virtual screen of the VR glasses. The preset action data in the user setting data and the verification action data in the verification password sense the change of the action amplitude and angle of the operation VR handle with time when the user inputs the password through a sensor on the VR handle.
When the identity verification is performed, after entering an interface for inputting a verification password, a sensor on the VR equipment is synchronously started, so that a user inputs the verification password through the VR equipment, the verification password is sent to the server, the server extracts user identity verification data from the verification password, compares the user identity verification data with user identity authentication data, and judges whether the identity verification is passed or not based on a comparison result.
The server can obtain cursor handwriting corresponding to the password set and input by the user, namely cursor trace, through analyzing the preset cursor data, and further analyze the cursor trace to obtain characters or images representing the password content, and the characters or images are used as one of the user identity authentication data and stored in the system database. Through analysis of the preset action data, action characteristics of a user operating the VR handle in the password inputting process can be obtained, and the action characteristics are stored in a system database in the form of vector groups as one of user identity authentication data. The server thus extracts the user authentication data from the user setting data and stores it in the database.
In some embodiments, user authentication data is bound to a VR device that sets user setup data corresponding to the user authentication data such that the user authentication data uniquely corresponds to the VR device.
By acquiring user identity authentication data containing various password features and uniquely binding the data with equipment, the accuracy of identity verification is guaranteed, the safety level of the identity verification is greatly improved, and the risk that payment passwords are stolen after VR equipment encounters malicious attack is reduced.
During identity verification, the server receives a verification password input by a user from the VR device, extracts user identity verification data from the verification password, compares the user identity verification data with user identity authentication data, and judges whether identity verification is passed or not based on a comparison result. In the verification password, the verification cursor data on the VR screen and the verification action data sensed by the VR handle sensor are analyzed to obtain user identity verification data at least including password features such as characters, images or vector groups, and the specific steps of extracting the user identity verification data from the verification password are similar to the steps of extracting the user identity authentication data from the user setting data, and are not repeated herein.
It should be noted that, the user identity authentication data and the user identity verification data may only include one password feature, such as a text, an image or a multidimensional directional vector group, or may also include multiple password features, such as a text, an image and a multidimensional directional vector group, where the more password features included, the higher the accuracy of identity verification, and the better the security effect.
When data comparison is carried out, for user identity authentication data and user identity verification data containing a password feature, if the password feature comparison is successful, identity verification can be passed; for user identity authentication data and user identity verification data containing multiple password features, identity verification can only be passed when all password features are successfully compared.
In some specific embodiments, extracting user identity authentication data from the user setup data and storing specifically includes: obtaining a preset cursor trace based on preset cursor data; and identifying corresponding preset characters based on the preset cursor trace, and storing the preset characters as one of the user identity authentication data.
Extracting user identity verification data from the verification password, and comparing the user identity verification data with user identity authentication data specifically comprises the following steps: obtaining a check cursor trace based on the check cursor data; identifying corresponding check characters based on the check cursor trace; and comparing the check characters with preset characters.
The password is formed by combining a plurality of symbols such as Chinese, english, numerals and the like, the specific content can be expressed by directly using characters, and after the corresponding preset cursor trace is obtained or the cursor trace is checked, the specific character content of the corresponding password can be identified by utilizing a universal OCR character recognition algorithm. And comparing the characters in the user identity authentication data with the characters in the user identity verification data by a general algorithm, and if the characters are completely consistent, successfully comparing. When the corresponding preset text is identified based on the preset cursor trace, if the corresponding preset text cannot be identified, the user is required to reenter the password.
In some specific embodiments, extracting user identity authentication data from the user setup data and storing specifically includes: obtaining a preset cursor trace based on preset cursor data; and converting the preset cursor trace into a preset image, and storing the preset image as one of the user identity authentication data.
Extracting user identity verification data from the verification password, and comparing the user identity verification data with user identity authentication data specifically comprises the following steps: obtaining a check cursor trace based on the check cursor data; converting the calibration mark into a calibration image; and comparing the check image with a preset image.
When comparing the check image with the preset image, the similarity algorithm in the prior art can be adopted to carry out similarity comparison, and if the calculated similarity is higher than a certain threshold value, the comparison is successful. If the words express the specific content of the password, the image can express the shape characteristic of the password, and the errors generated by word recognition are made up, so that a more accurate data comparison result and an identity verification result are obtained.
In some specific embodiments, extracting user identity authentication data from the user setup data and storing specifically includes: obtaining a preset multidimensional directional vector group based on preset action data; and storing the preset multidimensional directional vector group as one of the user identity authentication data.
Extracting user identity verification data from the verification password, and comparing the user identity verification data with user identity authentication data specifically comprises the following steps: based on the verification action data, obtaining a verification multidimensional directional vector group; and comparing the check multi-dimensional directional vector group with a preset multi-dimensional directional vector group.
The sensor can sense the measured information and convert the sensed information into an electric signal or other information output in a required form according to a certain rule so as to meet the requirements of information detection, recording, processing, storage, transmission and the like. The preset motion data or the verification motion data is obtained by sensing the change of the amplitude and the angle of the operation VR handle with time when the user inputs the password through a sensor, and is stored in the form of a multi-dimensional directional vector group. Through analysis of the preset action data, action characteristics of a user operating the VR handle in the password input process can be obtained.
In some more specific embodiments, the preset multi-dimensional directional vector set and the check multi-dimensional directional vector set each include at least: a time series of height changes and a time series of angle changes of the VR handle.
The change of the height and the angle can reflect the movement amplitude of the arm and the wrist of the user in the process of inputting the password once, and the time sequence can reflect the speed of each action when the user operates the entity trigger, so that whether the characters input by the user are consistent or not can be reflected. Compared with characters and images, the multidimensional directed vector group expresses password characteristics from abstract sense dimensions, so that user identity verification data and user identity authentication data are more comprehensive.
When the checking multidimensional directional vector group is compared with the preset multidimensional directional vector group, similarity matching can be carried out by adopting a similarity algorithm or other more complex models in the prior art, and if the calculated similarity is higher than a certain threshold value, the comparison is successful.
It should be noted that the user authentication data and the user identity verification data may include only one password feature, such as a text or an image or a multidimensional directed vector group; various password features can be included, such as any two of the above combinations or the combination of words, images and multidimensional directed vector groups, the more the password features are included, the higher the accuracy of identity verification, and the better the security effect.
The identity verification method can be applied to the scenes of payment and the like on VR equipment, through carrying out user identity verification during each payment, the payment risk brought by a payment mode of fund deduction is avoided, the fund safety is ensured, meanwhile, the method is compatible with a mobile phone payment tool and inputs a payment password through a virtual keyboard, an attacker is prevented from maliciously stealing information and funds of a user through the VR equipment with low safety water level, personalized user experience with more immersion is provided, and the reliability of user authorization, the safety of the funds and the payment experience are ensured.
It should be noted that the above-mentioned embodiments are merely examples of the present invention, and it is obvious that the present invention is not limited to the above-mentioned embodiments, and many similar variations are possible. All modifications attainable or obvious from the present disclosure set forth herein should be deemed to be within the scope of the present disclosure.

Claims (20)

1. An identity verification method based on VR device, comprising:
receiving user setting data;
extracting user identity authentication data from the user setting data and storing the user identity authentication data; wherein the user setting data comprises preset cursor data received by the VR device and/or preset action data of the VR handle sensed by a sensor of the VR device;
when identity verification is carried out, receiving a verification password input by a user, extracting user identity verification data from the verification password, comparing the user identity verification data with the user identity authentication data, and judging whether identity verification is passed or not based on a comparison result; wherein the verification password comprises verification cursor data received by the VR device and/or verification action data of the VR handle sensed by a sensor of the VR device.
2. The VR device-based identity verification method of claim 1,
Extracting user identity authentication data from the user setting data and storing the user identity authentication data specifically comprises:
obtaining a preset cursor trace based on the preset cursor data;
identifying corresponding preset characters based on the preset cursor trace, and storing the preset characters as one of the user identity authentication data;
extracting user identity verification data from the verification password, and comparing the user identity verification data with the user identity authentication data specifically comprises the following steps:
obtaining a check cursor trace based on the check cursor data;
identifying corresponding check characters based on the check cursor marks;
and comparing the check characters with preset characters.
3. The VR device-based identity verification method of claim 1,
extracting user identity authentication data from the user setting data and storing the user identity authentication data specifically comprises:
obtaining a preset cursor trace based on the preset cursor data;
converting the preset cursor trace into a preset image, and storing the preset image as one of the user identity authentication data;
extracting user identity verification data from the verification password, and comparing the user identity verification data with the user identity authentication data specifically comprises the following steps:
Obtaining a check cursor trace based on the check cursor data;
converting the check cursor trace into a check image;
and comparing the check image with a preset image.
4. The VR device-based identity verification method of claim 1,
extracting user identity authentication data from the user setting data and storing the user identity authentication data specifically comprises:
obtaining a preset multidimensional directional vector group based on the preset action data;
storing the preset multidimensional directional vector group as one of the user identity authentication data;
extracting user identity verification data from the verification password, and comparing the user identity verification data with the user identity authentication data specifically comprises the following steps:
based on the verification action data, a verification multidimensional directional vector group is obtained;
and comparing the checking multi-dimensional directional vector group with a preset multi-dimensional directional vector group.
5. The VR device-based identity verification method of claim 4, the preset and verified multidimensional directional vector sets each comprising at least: a time series of height changes and a time series of angle changes of the VR handle.
6. The VR device-based identity verification method of claim 1, further comprising: binding the user identity authentication data with the VR device that sets the user setting data corresponding to the user identity authentication data so that the user identity authentication data uniquely corresponds to the VR device.
7. A VR device comprising a VR handle, a sensor, and an identity verification module, wherein:
the identity verification module receives user setting data input by a user, extracts user identity authentication data from the user setting data and stores the user identity authentication data; the user setting data comprise preset cursor data received by the VR equipment and/or preset action data of the VR handle sensed by the sensor;
when identity verification is carried out, the identity verification module receives a verification password input by a user, extracts user identity verification data from the verification password, compares the user identity verification data with the user identity authentication data, and judges whether identity verification is passed or not based on a comparison result; wherein the verification password comprises verification cursor data received by the VR device and/or verification action data of the VR handle sensed by the sensor.
8. The VR device of claim 7,
extracting user identity authentication data from the user setting data and storing the user identity authentication data specifically comprises:
obtaining a preset cursor trace based on the preset cursor data;
identifying corresponding preset characters based on the preset cursor trace, and storing the preset characters as one of the user identity authentication data;
Extracting user identity verification data from the verification password, and comparing the user identity verification data with the user identity authentication data specifically comprises the following steps:
obtaining a check cursor trace based on the check cursor data;
identifying corresponding check characters based on the check cursor marks;
and comparing the check characters with preset characters.
9. The VR device of claim 7,
extracting user identity authentication data from the user setting data and storing the user identity authentication data specifically comprises:
obtaining a preset cursor trace based on the preset cursor data;
converting the preset cursor trace into a preset image, and storing the preset image as one of the user identity authentication data;
extracting user identity verification data from the verification password, and comparing the user identity verification data with the user identity authentication data specifically comprises the following steps:
obtaining a check cursor trace based on the check cursor data;
converting the check cursor trace into a check image;
and comparing the check image with a preset image.
10. The VR device of claim 7,
extracting user identity authentication data from the user setting data and storing the user identity authentication data specifically comprises:
Obtaining a preset multidimensional directional vector group based on the preset action data;
storing the preset multidimensional directional vector group as one of the user identity authentication data;
extracting user identity verification data from the verification password, and comparing the user identity verification data with the user identity authentication data specifically comprises the following steps:
based on the verification action data, a verification multidimensional directional vector group is obtained;
and comparing the checking multi-dimensional directional vector group with a preset multi-dimensional directional vector group.
11. The VR device of claim 10, the preset and verified multi-dimensional directional vector sets each comprising at least: a time series of height changes and a time series of angle changes of the VR handle.
12. The VR device of claim 7, to bind user authentication data to a present VR device that sets user setup data corresponding to the user authentication data such that the user authentication data uniquely corresponds to the VR device.
13. An identity verification system based on VR devices, comprising a server and VR devices, wherein:
the VR device receives user setting data from the VR device;
The server extracts user identity authentication data from the user setting data and stores the user identity authentication data; wherein the user setting data comprises preset cursor data received by the VR device and/or preset action data of the VR handle sensed by a sensor of the VR device;
when identity verification is carried out, the server receives a verification password input by a user from VR equipment, extracts user identity verification data from the verification password, compares the user identity verification data with the user identity authentication data, and judges whether identity verification is passed or not based on a comparison result; wherein the verification password comprises verification cursor data received by the VR device and/or verification action data of the VR handle sensed by a sensor of the VR device.
14. The VR device-based identity verification system of claim 13,
the server extracts user identity authentication data from the user setting data and stores the user identity authentication data specifically including:
obtaining a preset cursor trace based on the preset cursor data;
identifying corresponding preset characters based on the preset cursor trace, and storing the preset characters as one of the user identity authentication data;
Extracting user identity verification data from the verification password, and comparing the user identity verification data with the user identity authentication data specifically comprises the following steps:
obtaining a check cursor trace based on the check cursor data;
identifying corresponding check characters based on the check cursor marks;
and comparing the check characters with preset characters.
15. The VR device-based identity verification system of claim 13,
the server extracts user identity authentication data from the user setting data and stores the user identity authentication data specifically including:
obtaining a preset cursor trace based on the preset cursor data;
converting the preset cursor trace into a preset image, and storing the preset image as one of the user identity authentication data;
extracting user identity verification data from the verification password, and comparing the user identity verification data with the user identity authentication data specifically comprises the following steps:
obtaining a check cursor trace based on the check cursor data;
converting the check cursor trace into a check image;
and comparing the check image with a preset image.
16. The VR device-based identity verification system of claim 13,
The server extracts user identity authentication data from the user setting data and stores the user identity authentication data specifically including:
obtaining a preset multidimensional directional vector group based on the preset action data;
storing the preset multidimensional directional vector group as one of the user identity authentication data;
extracting user identity verification data from the verification password, and comparing the user identity verification data with the user identity authentication data specifically comprises the following steps:
based on the verification action data, a verification multidimensional directional vector group is obtained;
and comparing the checking multi-dimensional directional vector group with a preset multi-dimensional directional vector group.
17. The VR device-based identity verification system of claim 16, the preset and verified multidimensional directional vector sets each comprising at least: a time series of height changes and a time series of angle changes of the VR handle.
18. The VR device-based identity verification system of claim 13, the server to associate the user authentication data with a VR that sends user setup data corresponding to the user authentication data
The device binds such that the user authentication data uniquely corresponds to the VR device.
19. A computer-readable storage medium, characterized in that the storage medium stores a computer program which, when executed by a processor, implements the steps of the method of any of the preceding claims 1-6.
20. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the steps of the method of any of the preceding claims 1-6 when the program is executed by the processor.
CN202310249540.2A 2023-03-08 2023-03-08 Identity verification method based on VR equipment Pending CN116432155A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310249540.2A CN116432155A (en) 2023-03-08 2023-03-08 Identity verification method based on VR equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310249540.2A CN116432155A (en) 2023-03-08 2023-03-08 Identity verification method based on VR equipment

Publications (1)

Publication Number Publication Date
CN116432155A true CN116432155A (en) 2023-07-14

Family

ID=87093449

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310249540.2A Pending CN116432155A (en) 2023-03-08 2023-03-08 Identity verification method based on VR equipment

Country Status (1)

Country Link
CN (1) CN116432155A (en)

Similar Documents

Publication Publication Date Title
US9747491B2 (en) Dynamic handwriting verification and handwriting-based user authentication
CN108229130B (en) Verification method and device
CN107785021B (en) Voice input method, device, computer equipment and medium
CN109684803B (en) Man-machine verification method based on gesture sliding
JP2020009452A (en) User authentication method and handwriting sign-in server
CN108664364B (en) Terminal testing method and device
JP6667801B2 (en) Segment-based handwritten signature authentication system and method
WO2020252932A1 (en) Operation behavior-based human and machine recognition method and apparatus, and computer device
CN110378095B (en) Interactive verification method, device, medium and computing equipment based on verification code
CN109086834B (en) Character recognition method, character recognition device, electronic equipment and storage medium
CN109271762B (en) User authentication method and device based on slider verification code
CN106529255B (en) Method for identifying ID and device based on person's handwriting fingerprint
JP2018530094A (en) Segment block-based handwritten signature authentication system and method
CN113656761B (en) Business processing method and device based on biological recognition technology and computer equipment
CN110795714A (en) Identity authentication method and device, computer equipment and storage medium
CN111563746A (en) Method, device, electronic equipment and medium for user identity authentication
CN113095292A (en) Gesture recognition method and device, electronic equipment and readable storage medium
CN110008670A (en) Identity identifying method and device based on hand-written password
Rilvan et al. Capacitive swipe gesture based smartphone user authentication and identification
CN114037998A (en) Method and device for improving account security by analyzing handwriting by using model
CN114972500A (en) Checking method, marking method, system, device, terminal, equipment and medium
US20170277423A1 (en) Information processing method and electronic device
CN111859322A (en) Identity verification method and device and electronic equipment
CN103440447A (en) Online handwriting identity authentication method with attacker identity recognition capability
CN116432155A (en) Identity verification method based on VR equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination