SECURITY APPROACHES FOR VIRTUAL REALITY TRANSACTIONS
First Claim
1. A computer-implemented method, comprising:
- receiving, by a processor associated with virtual reality hardware, an indication that an avatar of a user has initiated a transaction in a virtual reality environment, the virtual reality environment presented by the virtual reality hardware to the user;
obtaining, by the processor, a first biometric sample from the user interacting with the virtual reality hardware;
generating, by the processor, a partial biometric template based at least in part on the first biometric sample; and
providing, by the processor, the partial biometric template and personal authentication information for the avatar to an authentication computer, wherein the personal authentication information and the partial biometric template are used to authenticate the avatar.
1 Assignment
0 Petitions
Accused Products
Abstract
One embodiment of the invention is directed to a computer-implemented method comprising, receiving an indication that an avatar of a user has initiated a transaction in a virtual reality environment. The method further comprises obtaining a first biometric sample from the user interacting with the virtual reality hardware. The method further comprises generating a partial biometric template based at least in part on the first biometric sample. The method further comprises providing the partial biometric template and personal authentication information for the avatar to an authentication computer where the personal authentication information and the partial biometric template are used to authenticate the avatar.
53 Citations
20 Claims
-
1. A computer-implemented method, comprising:
-
receiving, by a processor associated with virtual reality hardware, an indication that an avatar of a user has initiated a transaction in a virtual reality environment, the virtual reality environment presented by the virtual reality hardware to the user; obtaining, by the processor, a first biometric sample from the user interacting with the virtual reality hardware; generating, by the processor, a partial biometric template based at least in part on the first biometric sample; and providing, by the processor, the partial biometric template and personal authentication information for the avatar to an authentication computer, wherein the personal authentication information and the partial biometric template are used to authenticate the avatar. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. Virtual reality hardware comprising:
-
a processor; and a memory including instructions that, when executed with the processor, cause the virtual reality hardware to, at least; receive an indication that an avatar of a user has initiated a transaction in a virtual reality environment, the virtual reality environment presented by the virtual reality hardware to the user; obtain a first biometric sample from the user interacting with the virtual reality hardware; generate a partial biometric template based at least in part on the first biometric sample; and provide the partial biometric template and personal authentication information for the avatar to an authentication computer, wherein the personal authentication information and the partial biometric template are used to authenticate the avatar. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14)
-
-
15. A computer-implemented method, comprising:
-
receiving, by an authentication computer, a first biometric sample and personal authentication information associated with a user initiating a transaction in a virtual reality environment, the personal authentication information provided by an avatar of the user in the virtual reality environment; generating, by the authentication computer, a partial biometric template based at least in part on the first biometric sample; generating, by the authentication computer, a value based at least in part on the partial biometric template and the personal authentication information, the value representing a risk level associated with the transaction; and authenticating, by the authentication computer, the transaction based at least in part on the value and a threshold associated with the transaction. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification