Service control and user identity authentication based on virtual reality

ABSTRACT

In an implementation, one or more user interactions from a virtual reality (VR) device user for initiating a service in a VR scenario of a VR application are detected. One or more eye physiological characteristics of the VR device user are obtained for user identity authentication. The obtained one or more eye physiological characteristics are compared with one or more pre-stored eye physiological characteristics samples. The VR device user is authenticated if the one or more eye physiological characteristics match at least a portion of the one or more pre-stored eye physiological characteristics samples, and a server that provides and performs the service is communicated with.

The application is a continuation of and claims the benefit of priorityof U.S. patent application Ser. No. 15/819,041, which claims priority toChinese Patent Application No. 201611079020.8, filed on Nov. 29, 2016,which is incorporated by reference in its entirety. The subject matterof the present invention is also related to U.S. patent application Ser.No. 15/819,034, filed on November 2017, which is incorporated byreference in its entirety.

TECHNICAL FIELD

This disclosure relates to virtual reality applications, and moreparticularly to service control and user identity authentication basedon virtual reality.

BACKGROUND

Virtual reality (VR) is a computer technology that uses VR devices, suchas headsets, sometimes in combination with physical spaces ormulti-projected environments, to generate realistic images, sounds, andother sensations that simulate a user's physical presence in a threedimensional (3D) virtual environment and allows the VR user to interactwith the virtual environment. Many applications, such as those forgaming, content consumption, and productivity, have been developed toprovide user an immersive experience using VR technology. Many VRapplications allow in-application purchases, user customization, orparental control. These operations should require user identityauthentication for security purposes.

SUMMARY

The present disclosure describes methods and systems, includingcomputer-implemented methods, computer program products, and computersystems for service control and user identity authentication based onvirtual reality (VR).

In an implementation, one or more user interactions from a VR deviceuser for initiating a service in a VR scenario of a VR application aredetected. One or more eye physiological characteristics of the VR deviceuser are obtained for user identity authentication. The obtained one ormore eye physiological characteristics are compared with one or morepre-stored eye physiological characteristics samples. The VR device useris authenticated if the one or more eye physiological characteristicsmatch at least a portion of the one or more pre-stored eye physiologicalcharacteristics samples, and a server that provides and performs theservice is communicated with.

Implementations of the described subject matter, including thepreviously described implementation, can be implemented using acomputer-implemented method; a non-transitory, computer-readable mediumstoring computer-readable instructions to perform thecomputer-implemented method; and a computer-implemented systemcomprising one or more computer memory devices interoperably coupledwith one or more computers and having tangible, non-transitory,machine-readable media storing instructions that, when executed by theone or more computers, perform the computer-implemented method/thecomputer-readable instructions stored on the non-transitory,computer-readable medium.

The subject matter described in this specification can be implemented inparticular implementations, so as to realize efficient user identityauthentication in a virtual environment to provide faster, moreconvenient operations, and more immersive experience to VR users.

The details of one or more implementations of the subject matter of thisspecification are set forth in the Detailed Description, the Claims, andthe accompanying drawings. Other features, aspects, and advantages ofthe subject matter will become apparent to those of ordinary skill inthe art from the Detailed Description, the Claims, and the accompanyingdrawings.

DESCRIPTION OF DRAWINGS

FIG. 1 is a flowchart illustrating an example of a method for performinguser identity authentication based on eye physiological characteristicsin a virtual reality scenario, according to an implementation of thepresent disclosure.

FIG. 2 is a block diagram illustrating an example of acomputer-implemented system used to provide computationalfunctionalities associated with described algorithms, methods,functions, processes, flows, and procedures, according to animplementation of the present disclosure.

Like reference numbers and designations in the various drawings indicatelike elements.

DETAILED DESCRIPTION

The following detailed description describes technologies related toperforming biometric authentication based on a virtual reality (VR)device user's eye physiological characteristics, and is presented toenable any person skilled in the art to make and use the disclosedsubject matter in the context of one or more particular implementations.Various modifications, alterations, and permutations of the disclosedimplementations can be made and will be readily apparent to those orordinary skill in the art, and the general principles defined can beapplied to other implementations and applications, without departingfrom the scope of the present disclosure. In some instances, one or moretechnical details that are unnecessary to obtain an understanding of thedescribed subject matter and that are within the skill of one ofordinary skill in the art may be omitted so as to not obscure one ormore described implementations. The present disclosure is not intendedto be limited to the described or illustrated implementations, but to beaccorded the widest scope consistent with the described principles andfeatures.

VR is a computer technology that uses VR devices, such as headsets,sometimes in combination with physical spaces or multi-projectedenvironments, to generate realistic images, sounds, and other sensationsthat simulate a user's physical presence in a three-dimensional (3D)virtual environment and allows the VR user to interact with the virtualenvironment. Many applications, such as those for gaming, contentconsumption, and productivity, have been developed to provide user animmersive experience using VR technology. Many VR applications allowin-application purchases, user customization, or parental control. Theseoperations should require user identity authentication for securitypurposes.

The present disclosure describes technologies for faster and moreconvenient user identity authentication based on a VR device user's eyephysiological characteristics. When a user uses a VR device to perform aservice, the VR device can identify user interaction operations withvirtual elements rendered in the virtual reality scenario using one ormore sensors. When it is identified that the user interaction operationsmatch one or more pre-stored operations, the VR device can invokebiometric authentication based on the user's eye physiologicalcharacteristics for user identity verification. If the biometricauthentication is successful, the user can perform a service interactionto complete the service. As such, the VR device can collect a user's eyephysiological characteristics to quickly perform biometricauthentication in the VR environment, to simplify the user identityauthentication procedure and ensure account security. For example, whenusing a payment service in a VR environment, biometric authenticationthrough the VR device can allow faster user identity authentication, ascompared to entering a password through complicated user interactionswith a virtual keyboard.

FIG. 1 is a flowchart illustrating an example method for performing useridentity authentication based on eye physiological characteristics in avirtual reality scenario, according to an implementation of the presentdisclosure. For clarity of presentation, the description that followsgenerally describes method 100 in the context of the other figures inthis description. However, it will be understood that method 100 can beperformed, for example, by any suitable system, environment, software,and hardware, or a combination of systems, environments, software, andhardware, as appropriate. In some implementations, various steps ofmethod 100 can be run in parallel, in combination, in loops, or in anyorder. The VR software can be developed to provide a 3D immersive VRuser experience.

At 110, one or more user interactions from a VR device user forinitiating a service in a VR scenario of a VR application are detected.The service can be any service or task offered in a VR applicationperformed by the user that requires user identity authentication. Insome cases, the service can be a local task performed by a usercomputing device or an online task performed by a server. For example,the service can be an online payment service, such as payment made in VRapplications such as VR shopping, VR games, VR based video-on-demand, ordonation to a VR live cast. Alternatively, the service can be a localservice that requires user account login or password protected unlock.The VR application can be any software or application that is developedbased on VR. The VR application can render a VR scenario through the VRdevice to provide user with immersive 3D experience.

The VR scenario or VR environment can be created by VR modeling using amodeling tool, such as UNITY, 3DSMAX, or PHOTOSHOP. In some cases, theVR modeling and VR scenario texture mapping can be based on real lifescenarios. For example, texture maps of materials and real life scenariomodels can first be collected by photographing real life objects orscenarios. Modeling tools such as PHOTOSHOP or 3DMAX can then be usedfor texture processing and real-life 3D model creation. The 3D model canthen be imported to a UNITY3D (U3D) platform and multi-dimensionallyrendered through sound effects, graphical interfaces, plug-ins, andlighting. Interaction code can then be executed to convert the 3D modelto the VR scenario model.

After the VR scenario and service interface modeling, the VR device canpresent the VR scenario and the service interface to the user. In somecases, the VR scenario model and a virtual element for triggering theservice interface can be presented to the user. When a user needs toperform the service while having an immersive experience in the VRscenario, the user can interact with the virtual element to trigger theservice interface.

The user can interact with the virtual element through any movements orgestures, such as a head movement and hand gesture. For example, theuser can move their head to control the movement of their visual focus,which can be used as the operation focus (for example, a cursor) in theVR scenario. The VR device can use a sensor to track the movement of thehead, and use the sensed movement to change the operational focus in theVR scenario. When the user moves their head to change the operationfocus to a virtual element and stay focused on the virtual element for apredetermined amount of time (for example, three seconds), the VR devicecan determine that the virtual element is selected and trigger theservice interface in the VR scenario.

As another example, the user can position the operation focus on thevirtual element by moving their hand, and then using a predetermined 3Dgesture to select the virtual element. The VR device can use a sensor totrack the user's hand movement, calculate depth information of theuser's hand with respect to the VR scenario based on the user's handdisplacement sensed by the sensor, and then restore a 3D gesture made bythe user in the VR scenario. If the 3D gesture is the same as one of thepre-stored gestures, the VR device can select the virtual element andtrigger the service interface in the VR scenario.

In some cases, the one or more user interactions can include a voicecommand. The VR device can use voice recognition software to recognize auser's voice command. As such, when the user needs to perform a servicewhile having an immersive experience in the VR scenario, the user canuse voice command to initiate the service instead of interacting withone or more virtual elements to trigger the service interface.

In some cases, the VR device can collect the voice input from the VRuser and use the voice recognition software to recognize voice commandsdictated by the user. In some other cases, voice recognition can beperformed by a server that provides the service. For example, a serviceplatform formed by a server cluster can designate a server for voicerecognition service and provide an access interface for the VR device toaccess the voice recognition service. After collecting the voice inputfrom the user, the VR device can construct a voice recognition requestbased on the collected voice input, and send the voice recognitionrequest through the access interface to the server.

After receiving the voice recognition request, the server can parse thevoice recognition request, identify the voice command, and recognize thevoice command using a voice recognition algorithm. After recognizing thevoice command, the server can convert the voice command to a characterstring instruction recognizable by the VR device, and send the characterstring instruction to the VR device. After receiving the characterstring instruction, the VR device can determine whether the characterstring instruction is an executable instruction corresponding to theservice. If yes, the VR device can initiate the service in response tothe instruction.

For example, when the service is a payment service based on a VRapplication, the user can send a voice command of “start to pay.” Afterperforming voice recognition, the server can convert the voice commandinto a character string instruction recognizable by the VR device, andthe VR device can initiate the payment process in response to theinstruction.

In addition to using voice command to initiate services, voice commandscan be used to perform other voice controls, such as cancellation of aservice, as long as those control functions are available to theservice. When the cancellation voice command is successfully recognizedand converted into a character string instruction, the VR device canrespond to the cancellation instruction and cancel the service. Forexample, when the service is a payment service based on a VRapplication, the user can cancel the payment service after the servicebeing initiated by the voice command “start to pay.” The user candictate a voice command “cancel payment.” After the voice command“cancel payment” is recognized by the server and converted to acharacter string instruction, the VR device can respond to theinstruction and terminate the payment process.

The VR device user can also use voice command to control how the serviceis performed. Using again the payment service based on a VR applicationfor example, a user can switch the payment method from debit card tocredit card by dictating “switch to credit card,” and sending theadditional voice command “please pay by credit card” to perform thecredit card payment. From 110, method 100 proceeds to 120.

At 120, one or more eye physiological characteristics of the VR deviceuser are obtained for user identity authentication. After a service isinitiated, the VR device can present a UI in a virtual scenario for useridentity authentication. In some cases, the VR device can include eyerecognition function to facilitate user identity authentication. The eyerecognition function can be performed based on eye physiologicalcharacteristics sampling algorithm. The eye physiologicalcharacteristics sampling algorithm can use one or more of the user's eyephysiological characteristics gathered by an eye sensor to verify theuser's identity. Example eye physiological characteristics can includeeye print and iris characteristics. The eye physiologicalcharacteristics sampling algorithm can include an eye print samplingalgorithm and iris sampling algorithm.

The eye sensor can be built-in to the VR device, separate from, butcommunicably coupled to, the VR device, or integrated on a mobile devicesuch as a smartphone. In some cases, the VR device can be a slide-intype VR headset, which can function by inserting or sliding in asmartphone that can communicate with the headset, and convert the imagesdisplayed on the cell phone to VR scenarios. In such cases, the VRdevice can rely on the built-in eye sensor to perform eye recognition.

The eye sensor can include an optical lens, installed relative to thepositions of the VR device user's eyes, and one or more camerasdistributed around the optical lens. In some cases, the cameras can beuniformly distributed around the lens. The cameras can be positioned onan external surface of the lens, or in other suitable places, to ensurethat the lens is located between the user's eyes and the cameras.

In some cases, the physiological characteristic of the eye is the user'siris. The user's iris can be imaged under an infrared light source. Thecameras distributed around the lenses can then be infrared cameras. Insome cases, the physiological characteristic of the eye is an eye printof the user, in such cases, the cameras can be RGB cameras.

In some cases, when invoking the eye sensor to collect the eyephysiological characteristics, the VR device can be affected by theinternal ambient light of the VR device. The eye sensor can furtherinclude one or more LED light sources that have a one-to-onecorrespondence with the one or more cameras uniformly distributed aroundthe lenses. In some cases, when the iris is used as the physiologicalcharacteristic of the eye, the LED light source can be an infrared LEDlight source.

The VR device can also include a light sensor to detect the brightnessof the ambient light inside the VR device. If the brightness is lowerthan a predetermined value that can affect the imaging of eyephysiological characteristics, the VR device can turn one or more of theLED light sources on, to perform one-to-one light compensation to theone or more cameras, to compensate for relatively poor light conditioninside the VR device.

In some cases, the physical dimension of the VR device can causeinsufficient depth of field between the cameras and the user's eyes,such that the cameras cannot be accurately focused on the iris or eyeprint. In such cases, one or more macro lens cameras can be used.Alternatively, to adaptively adjust the focal length, one or moreadditional, optical lenses can be installed at a position between theuser's eyes and the lens to reflect or refract light rays coming fromthe user's eyes, based on the internal shape of the VR device (forexample, the cavity of a VR headset). In some cases, special lenses,such as an endoscope, can be used to collect the user's iris or eyeprint features. In some cases, a user can manually adjust the focallength of the cameras to obtain accurate iris or eye print images. From120, method 100 proceeds to 130.

At 130, the obtained one or more eye physiological characteristics arecompared with one or more pre-stored eye physiological characteristicssamples. In some cases, the user can use the VR device to obtain one ormore eye physiological characteristics samples during service accountregistration. The one or more eye physiological characteristics samplescan be saved locally for applications that allow offline biometricauthentication or included in an authentication request to be sent to aservice server for online authentication. For example, when the serviceis a VR payment service, the service account of the user can be apayment account. The VR device can use an integrated eye sensor toobtain the user's eye physiological characteristics sample duringpayment account registration and save the sample locally, or on thepayment server. The eye physiological characteristics sample isassociated with the user's payment account.

In some cases, the user can log into the user account to use the VRdevice. The VR device can send the eye physiological characteristicssample and VR device user account login information as a registrationmessage to the service server. The server can use the receivedinformation to associate the user's eye physiological characteristicssample to its service account and save the eye physiologicalcharacteristics sample to a biometric characteristics database. In somecases, the user account can be the same as the service account.

In some cases, after eye physiological characteristics is collected bythe VR device, the VR device can generate a biometric recognitionrequest to the service server. The biometric recognition request caninclude the user's user or service account information and eyephysiological characteristics obtained by the eye sensor. The serviceserver can provide a biometric recognition interface to the VR devicefor receiving the request and submit the request to the server. In somecases, the service server can cooperate with a biometric recognitionserver and the biometric recognition interface can be provided by thebiometric recognition server. From 130, method 100 proceeds to 140.

At 140, the VR device user is authenticated if the one or more eyephysiological characteristics match at least a portion of the one ormore pre-stored eye physiological characteristics samples. Afterreceiving the biometric recognition request, the service server canparse the request, acquire the eye physiological characteristics and theuser account information, and compare the eye physiologicalcharacteristics with eye physiological characteristics samples stored ina biometric characteristic database. In some cases, if the eyephysiological characteristics match at least a portion of the eyephysiological characteristics samples, the service server can furtherverify whether the received user account information matches the accountassociated with the matching biometric sample. After comparing thebiometric information and user account information with thecorresponding information stored in the biometric characteristicdatabase, the service server can return an authentication result to theVR device. The authentication result can be returned as a Boolean-typereturn value (that is, false or true). If one or both the biometricinformation and user account information match the correspondinginformation stored in the biometric characteristic database, a “true”value can be returned to indicate that the biometric authenticationsucceeded. Otherwise, a “false” value can be returned to indicate thatthe biometric authentication failed.

In some cases, the VR device can perform biometric authenticationlocally. The user's eye physiological characteristics can be saved inthe VR device during biometric information registration (for example,registering eye print information to the user account on the VR device).After the user initiates the service in the VR scenario, the VR devicecan collect the eye physiological characteristics of the user, andcompare the eye physiological characteristics with the eye physiologicalcharacteristics samples saved during biometric information registration.If the eye physiological characteristics match at least a portion of thesaved information, the biometric authentication for the servicesucceeds. Otherwise, the biometric authentication fails.

In some cases, the VR device can perform additional biometricauthentication before sending the registration message to the serviceserver for enhanced security. For example, the VR device can prompt theuser to input a password or other security information to verify theuser's identity before sending the user's registration message to theservice server. This process can prevent unauthorized users fromfraudulently registering their biometric information to bind with theauthorized user's user account. After service registration, the VRdevice can initiate biometric authentication based on the user's eyephysiological characteristics sample, after the user initiates theservice.

In some cases, the VR device can perform a bioassay process, beforecollecting biometric information, to ensure that the VR device iscurrently used by a real person. This process can prevent unauthorizedusers from using eye print or iris images of the authorized user forbiometrical authentication and illegally accessing the authorized user'sservice account. Example bioassay processes can include eye-blinking orheartbeat recognition.

After a real user is detected using the bioassay process, the VR devicecan prompt the user to perform biometric authentication for accessingthe service account. Using again a VR payment service for example, theVR device can present a text prompt in the VR scenario such as “Pleasescan your iris for payment authentication.” After 140, method 100proceeds to 150.

At 150, a server is communicated with to perform the service. If thebiometric authentication is successful (for example, a returned value is“true”), the VR device can present the service interface correspondingto the service to gather data related to the service, establish aservice request, submit the service request to the service serverthrough a service access interface, and perform further interactionswith the service server, if needed, to perform the service.

Using again the VR payment service for example, the VR device canpresent a payment interface to gather payment related data, such as username, order information, and price, and then generate a paymentprocessing request and send the payment processing request to theservice server. The service server can process the request and completethe payment.

The following example uses VR shopping to illustrate how biometricauthentication based on eye physiological characteristics can providesafer, faster, and simpler service experience to the user. It is assumedthat the physiological characteristic of the eye used is the eye print.The service for the VR shopping can be a payment service such as ALIPAY.The virtual element can be a virtual button presented in the VR shoppingscenario. The server for the payment service can be a payment serversuch as the ALIPAY platform based on a server cluster.

The user can first log in to the VR device using the user account orpayment account, and complete eye print registration on the VR device toassociate the user's eye print to the payment account. The user'saccount information and corresponding eye print information can bestored in a biometric characteristic database on a payment server. Aftereye print registration, the user can use their finger for biometricauthentication in a VR environment.

When wearing the VR device for VR shopping, the items for sale can bepresented to the user in the VR scenario and the user can flip throughthe item list, select items, or add items to the shopping cart usinggestures or head movements. In some cases, a virtual button (that is,the virtual element) for checkout or pay can be provided when an item isselected or added to the user's shopping cart. The user can, again, usegesture or head movements to move the operation focus (for example, acursor) to the virtual button and use a predetermined gesture or headmovement to select the virtual button.

The payment service can be initiated after the service is initiated bythe user's voice command. In some cases, The VR device can perform abioassay process to determine whether a real user of the VR device ispresent. If so, the VR device can prompt a message “Please keep youreyes open for payment authentication” in the VR scenario.

After the eye physiological characteristics are collected, the VR devicecan send a biometric authentication request including the collected eyeprint information and the user's user or payment account information tothe payment server. The payment server can compare the eye printinformation with the eye print information stored in the biometriccharacteristic database during eye print registration. If the receivedeye print information matches the eye print associated with the useraccount stored in the database, and the payment account information isconsistent with the stored user account information, the payment servercan return a Boolean-type “true” value to the VR device to indicate thatthe eye print authentication is successful.

After having acknowledged that the payment was successful, the VR devicecan present a payment interface for the user to input payment data, suchas user name, order information, and payment amount related to thepayment service, and generate and send a payment processing request tothe payment server. The payment server can process the payment andcomplete the purchase.

In some cases, an “authentication-free for small amount” payment processcan be used to further facilitate payment speed. For example, when theuser initiates the payment service using voice command, the VR devicecan check the price of the items and determine whether the paymentamount is less than a preset amount (for example, 20 USD). If thepayment amount is less than the preset amount, the VR device candirectly generate and send the payment processing request to the paymentserver without biometric authentication. Otherwise, the user may need toperform biometric authentication before the payment service can be used.After 130, method 100 ends.

FIG. 2 is a block diagram illustrating an example of acomputer-implemented System 200 used to provide computationalfunctionalities associated with described algorithms, methods,functions, processes, flows, and procedures, according to animplementation of the present disclosure. In the illustratedimplementation, System 200 includes a Computer 202 and a Network 230.

The illustrated Computer 202 is intended to encompass any computingdevice such as a server, desktop computer, laptop/notebook computer,wireless data port, smart phone, personal data assistant (PDA), tabletcomputer, one or more processors within these devices, another computingdevice, or a combination of computing devices, including physical orvirtual instances of the computing device, or a combination of physicalor virtual instances of the computing device. Additionally, the Computer202 can include an input device, such as a keypad, keyboard, touchscreen, another input device, or a combination of input devices that canaccept user information, and an output device that conveys informationassociated with the operation of the Computer 202, including digitaldata, visual, audio, another type of information, or a combination oftypes of information, on a graphical-type user interface (UI) (or GUI)or other UI.

The Computer 202 can serve in a role in a distributed computing systemas a client, network component, a server, a database or anotherpersistency, another role, or a combination of roles for performing thesubject matter described in the present disclosure. The illustratedComputer 202 is communicably coupled with a Network 230. In someimplementations, one or more components of the Computer 202 can beconfigured to operate within an environment, includingcloud-computing-based, local, global, another environment, or acombination of environments.

At a high level, the Computer 202 is an electronic computing deviceoperable to receive, transmit, process, store, or manage data andinformation associated with the described subject matter. According tosome implementations, the Computer 202 can also include or becommunicably coupled with a server, including an application server,e-mail server, web server, caching server, streaming data server,another server, or a combination of servers.

The Computer 202 can receive requests over Network 230 (for example,from a client software application executing on another Computer 202)and respond to the received requests by processing the received requestsusing a software application or a combination of software applications.In addition, requests can also be sent to the Computer 202 from internalusers (for example, from a command console or by another internal accessmethod), external or third-parties, or other entities, individuals,systems, or computers.

Each of the components of the Computer 202 can communicate using aSystem Bus 203. In some implementations, any or all of the components ofthe Computer 202, including hardware, software, or a combination ofhardware and software, can interface over the System Bus 203 using anapplication programming interface (API) 212, a Service Layer 213, or acombination of the API 212 and Service Layer 213. The API 212 caninclude specifications for routines, data structures, and objectclasses. The API 212 can be either computer-language independent ordependent and refer to a complete interface, a single function, or evena set of APIs. The Service Layer 213 provides software services to theComputer 202 or other components (whether illustrated or not) that arecommunicably coupled to the Computer 202. The functionality of theComputer 202 can be accessible for all service consumers using theService Layer 213. Software services, such as those provided by theService Layer 213, provide reusable, defined functionalities through adefined interface. For example, the interface can be software written inJAVA, C++, another computing language, or a combination of computinglanguages providing data in extensible markup language (XML) format,another format, or a combination of formats. While illustrated as anintegrated component of the Computer 202, alternative implementationscan illustrate the API 212 or the Service Layer 213 as stand-alonecomponents in relation to other components of the Computer 202 or othercomponents (whether illustrated or not) that are communicably coupled tothe Computer 202. Moreover, any or all parts of the API 212 or theService Layer 213 can be implemented as a child or a sub-module ofanother software module, enterprise application, or hardware modulewithout departing from the scope of the present disclosure.

The Computer 202 includes an Interface 204. Although illustrated as asingle Interface 204, two or more Interfaces 204 can be used accordingto particular needs, desires, or particular implementations of theComputer 202. The Interface 204 is used by the Computer 202 forcommunicating with another computing system (whether illustrated or not)that is communicatively linked to the Network 230 in a distributedenvironment. Generally, the Interface 204 is operable to communicatewith the Network 230 and includes logic encoded in software, hardware,or a combination of software and hardware. More specifically, theInterface 204 can include software supporting one or more communicationprotocols associated with communications such that the Network 230 orhardware of Interface 204 is operable to communicate physical signalswithin and outside of the illustrated Computer 202.

The Computer 202 includes a Processor 205. Although illustrated as asingle Processor 205, two or more Processors 205 can be used accordingto particular needs, desires, or particular implementations of theComputer 202. Generally, the Processor 205 executes instructions andmanipulates data to perform the operations of the Computer 202 and anyalgorithms, methods, functions, processes, flows, and procedures asdescribed in the present disclosure.

The Computer 202 also includes a Database 206 that can hold data for theComputer 202, another component communicatively linked to the Network230 (whether illustrated or not), or a combination of the Computer 202and another component. For example, Database 206 can be an in-memory,conventional, or another type of database storing data consistent withthe present disclosure. In some implementations, Database 206 can be acombination of two or more different database types (for example, ahybrid in-memory and conventional database) according to particularneeds, desires, or particular implementations of the Computer 202 andthe described functionality. Although illustrated as a single Database206, two or more databases of similar or differing types can be usedaccording to particular needs, desires, or particular implementations ofthe Computer 202 and the described functionality. While Database 206 isillustrated as an integral component of the Computer 202, in alternativeimplementations, Database 206 can be external to the Computer 202.

The Computer 202 also includes a Memory 207 that can hold data for theComputer 202, another component or components communicatively linked tothe Network 230 (whether illustrated or not), or a combination of theComputer 202 and another component. Memory 207 can store any dataconsistent with the present disclosure. In some implementations, Memory207 can be a combination of two or more different types of memory (forexample, a combination of semiconductor and magnetic storage) accordingto particular needs, desires, or particular implementations of theComputer 202 and the described functionality. Although illustrated as asingle Memory 207, two or more Memories 207 or similar or differingtypes can be used according to particular needs, desires, or particularimplementations of the Computer 202 and the described functionality.While Memory 207 is illustrated as an integral component of the Computer202, in alternative implementations, Memory 207 can be external to theComputer 202.

The Application 208 is an algorithmic software engine providingfunctionality according to particular needs, desires, or particularimplementations of the Computer 202, particularly with respect tofunctionality described in the present disclosure. For example,Application 208 can serve as one or more components, modules, orapplications. Further, although illustrated as a single Application 208,the Application 208 can be implemented as multiple Applications 208 onthe Computer 202. In addition, although illustrated as integral to theComputer 202, in alternative implementations, the Application 208 can beexternal to the Computer 202.

The Computer 202 can also include a Power Supply 214. The Power Supply214 can include a rechargeable or non-rechargeable battery that can beconfigured to be either user- or non-user-replaceable. In someimplementations, the Power Supply 214 can include power-conversion ormanagement circuits (including recharging, standby, or another powermanagement functionality). In some implementations, the Power Supply 214can include a power plug to allow the Computer 202 to be plugged into awall socket or another power source to, for example, power the Computer202 or recharge a rechargeable battery.

There can be any number of Computers 202 associated with, or externalto, a computer system containing Computer 202, each Computer 202communicating over Network 230. Further, the term “client,” “user,” orother appropriate terminology can be used interchangeably, asappropriate, without departing from the scope of the present disclosure.Moreover, the present disclosure contemplates that many users can useone Computer 202, or that one user can use multiple computers 202.

Described implementations of the subject matter can include one or morefeatures, alone or in combination.

For example, in a first implementation, a computer-implemented method,comprising: detecting one or more user interactions from a virtualreality (VR) device user for initiating a service in a VR scenario of aVR application; obtaining one or more eye physiological characteristicsof the VR device user for user identity authentication; comparing theobtained one or more eye physiological characteristics with one or morepre-stored eye physiological characteristics samples; authenticating theVR device user if the one or more eye physiological characteristicsmatch at least a portion of the one or more pre-stored eye physiologicalcharacteristics samples; and communicating with a server that providesand performs the service.

The foregoing and other described implementations can each, optionally,include one or more of the following features:

A first feature, combinable with any of the following features, whereinthe one or more user interactions include a gesture, a body movement, ora body posture.

A second feature, combinable with any of the previous or followingfeatures, wherein the one or more user interactions include a voicecommand.

A third feature, combinable with any of the previous or followingfeatures, wherein the one or more eye physiological characteristicsinclude iris characteristics or eye print characteristics.

A fourth feature, combinable with any of the previous or followingfeatures, further comprising: performing a bioassay process fordetecting the user; and presenting a notification in the VR scenario tonotify the user to perform biometric authentication if the user isdetected based on the bioassay process.

A fifth feature, combinable with any of the previous or followingfeatures, wherein the bioassay process includes eye-blinking recognitionor heartbeat recognition.

A sixth feature, combinable with any of the previous or followingfeatures, further comprising presenting virtual guidance in the VRscenario to obtain the one or more eye physiological characteristics.

A seventh feature, combinable with any of the previous or followingfeatures, wherein the one or more eye physiological characteristics areobtained by an eye sensor and wherein the eye sensor includes a lens andone or more cameras.

An eighth feature, combinable with any of the previous or followingfeatures, wherein the lens is a macro lens.

A ninth feature, combinable with any of the previous or followingfeatures, wherein the one or more cameras are infrared cameras.

A tenth feature, combinable with any of the previous or followingfeatures, wherein the one or more cameras are paired with one or moreLED lights.

In a second implementation, a non-transitory, computer-readable mediumstoring one or more instructions executable by a computer system toperform operations comprising: detecting one or more user interactionsfrom a virtual reality (VR) device user for initiating a service in a VRscenario of a VR application; obtaining one or more eye physiologicalcharacteristics of the VR device user for user identity authentication;comparing the obtained one or more eye physiological characteristicswith one or more pre-stored eye physiological characteristics samples;authenticating the VR device user if the one or more eye physiologicalcharacteristics match at least a portion of the one or more pre-storedeye physiological characteristics samples; and communicating with aserver that provides and performs the service.

The foregoing and other described implementations can each, optionally,include one or more of the following features:

A first feature, combinable with any of the following features, whereinthe one or more user interactions include a gesture, a body movement, ora body posture.

A second feature, combinable with any of the previous or followingfeatures, wherein the one or more user interactions include a voicecommand.

A third feature, combinable with any of the previous or followingfeatures, wherein the one or more eye physiological characteristicsinclude iris characteristics or eye print characteristics.

A fourth feature, combinable with any of the previous or followingfeatures, further comprising: performing a bioassay process fordetecting the user; and presenting a notification in the VR scenario tonotify the user to perform biometric authentication if the user isdetected based on the bioassay process.

A fifth feature, combinable with any of the previous or followingfeatures, wherein the bioassay process includes eye-blinking recognitionor heartbeat recognition.

A sixth feature, combinable with any of the previous or followingfeatures, further comprising presenting virtual guidance in the VRscenario to obtain the one or more eye physiological characteristics.

A seventh feature, combinable with any of the previous or followingfeatures, wherein the one or more eye physiological characteristics areobtained by an eye sensor and wherein the eye sensor includes a lens andone or more cameras.

An eighth feature, combinable with any of the previous or followingfeatures, wherein the lens is a macro lens.

A ninth feature, combinable with any of the previous or followingfeatures, wherein the one or more cameras are infrared cameras.

A tenth feature, combinable with any of the previous or followingfeatures, wherein the one or more cameras are paired with one or moreLED lights.

In a third implementation, a computer-implemented system, comprising:one or more computers; and one or more computer memory devicesinteroperably coupled with the one or more computers and havingtangible, non-transitory, machine-readable media storing one or moreinstructions that, when executed by the one or more computers, performone or more operations comprising: detecting one or more userinteractions from a virtual reality (VR) device user for initiating aservice in a VR scenario of a VR application; obtaining one or more eyephysiological characteristics of the VR device user for user identityauthentication; comparing the obtained one or more eye physiologicalcharacteristics with one or more pre-stored eye physiologicalcharacteristics samples; authenticating the VR device user if the one ormore eye physiological characteristics match at least a portion of theone or more pre-stored eye physiological characteristics samples; andcommunicating with a server that provides and performs the service.

The foregoing and other described implementations can each, optionally,include one or more of the following features:

A first feature, combinable with any of the following features, whereinthe one or more user interactions include a gesture, a body movement, ora body posture.

A second feature, combinable with any of the previous or followingfeatures, wherein the one or more user interactions include a voicecommand.

A third feature, combinable with any of the previous or followingfeatures, wherein the one or more eye physiological characteristicsinclude iris characteristics or eye print characteristics.

A fourth feature, combinable with any of the previous or followingfeatures, further comprising: performing a bioassay process fordetecting the user; and presenting a notification in the VR scenario tonotify the user to perform biometric authentication if the user isdetected based on the bioassay process.

A fifth feature, combinable with any of the previous or followingfeatures, wherein the bioassay process includes eye-blinking recognitionor heartbeat recognition.

A sixth feature, combinable with any of the previous or followingfeatures, further comprising presenting virtual guidance in the VRscenario to obtain the one or more eye physiological characteristics.

A seventh feature, combinable with any of the previous or followingfeatures, wherein the one or more eye physiological characteristics areobtained by an eye sensor and wherein the eye sensor includes a lens andone or more cameras.

An eighth feature, combinable with any of the previous or followingfeatures, wherein the lens is a macro lens.

A ninth feature, combinable with any of the previous or followingfeatures, wherein the one or more cameras are infrared cameras.

A tenth feature, combinable with any of the previous or followingfeatures, wherein the one or more cameras are paired with one or moreLED lights.

Implementations of the subject matter and the functional operationsdescribed in this specification can be implemented in digital electroniccircuitry, in tangibly embodied computer software or firmware, incomputer hardware, including the structures disclosed in thisspecification and their structural equivalents, or in combinations ofone or more of them. Software implementations of the described subjectmatter can be implemented as one or more computer programs, that is, oneor more modules of computer program instructions encoded on a tangible,non-transitory, computer-readable medium for execution by, or to controlthe operation of, a computer or computer-implemented system.Alternatively, or additionally, the program instructions can be encodedin/on an artificially generated propagated signal, for example, amachine-generated electrical, optical, or electromagnetic signal that isgenerated to encode information for transmission to a receiver apparatusfor execution by a computer or computer-implemented system. Thecomputer-storage medium can be a machine-readable storage device, amachine-readable storage substrate, a random or serial access memorydevice, or a combination of computer-storage mediums. Configuring one ormore computers means that the one or more computers have installedhardware, firmware, or software (or combinations of hardware, firmware,and software) so that when the software is executed by the one or morecomputers, particular computing operations are performed.

The term “real-time,” “real time,” “realtime,” “real (fast) time (RFT),”“near(ly) real-time (NRT),” “quasi real-time,” or similar terms (asunderstood by one of ordinary skill in the art), means that an actionand a response are temporally proximate such that an individualperceives the action and the response occurring substantiallysimultaneously. For example, the time difference for a response todisplay (or for an initiation of a display) of data following theindividual's action to access the data can be less than 1 millisecond(ms), less than 1 second (s), or less than 5 s. While the requested dataneed not be displayed (or initiated for display) instantaneously, it isdisplayed (or initiated for display) without any intentional delay,taking into account processing limitations of a described computingsystem and time required to, for example, gather, accurately measure,analyze, process, store, or transmit the data.

The terms “data processing apparatus,” “computer,” or “electroniccomputer device” (or an equivalent term as understood by one of ordinaryskill in the art) refer to data processing hardware and encompass allkinds of apparatus, devices, and machines for processing data, includingby way of example, a programmable processor, a computer, or multipleprocessors or computers. The computer can also be, or further includespecial purpose logic circuitry, for example, a central processing unit(CPU), an FPGA (field programmable gate array), or an ASIC(application-specific integrated circuit). In some implementations, thecomputer or computer-implemented system or special purpose logiccircuitry (or a combination of the computer or computer-implementedsystem and special purpose logic circuitry) can be hardware- orsoftware-based (or a combination of both hardware- and software-based).The computer can optionally include code that creates an executionenvironment for computer programs, for example, code that constitutesprocessor firmware, a protocol stack, a database management system, anoperating system, or a combination of execution environments. Thepresent disclosure contemplates the use of a computer orcomputer-implemented system with an operating system of some type, forexample LINUX, UNIX, WINDOWS, MAC OS, ANDROID, IOS, another operatingsystem, or a combination of operating systems.

A computer program, which can also be referred to or described as aprogram, software, a software application, a unit, a module, a softwaremodule, a script, code, or other component can be written in any form ofprogramming language, including compiled or interpreted languages, ordeclarative or procedural languages, and it can be deployed in any form,including, for example, as a stand-alone program, module, component, orsubroutine, for use in a computing environment. A computer program can,but need not, correspond to a file in a file system. A program can bestored in a portion of a file that holds other programs or data, forexample, one or more scripts stored in a markup language document, in asingle file dedicated to the program in question, or in multiplecoordinated files, for example, files that store one or more modules,sub-programs, or portions of code. A computer program can be deployed tobe executed on one computer or on multiple computers that are located atone site or distributed across multiple sites and interconnected by acommunication network.

While portions of the programs illustrated in the various figures can beillustrated as individual components, such as units or modules, thatimplement described features and functionality using various objects,methods, or other processes, the programs can instead include a numberof sub-units, sub-modules, third-party services, components, libraries,and other components, as appropriate. Conversely, the features andfunctionality of various components can be combined into singlecomponents, as appropriate. Thresholds used to make computationaldeterminations can be statically, dynamically, or both statically anddynamically determined.

Described methods, processes, or logic flows represent one or moreexamples of functionality consistent with the present disclosure and arenot intended to limit the disclosure to the described or illustratedimplementations, but to be accorded the widest scope consistent withdescribed principles and features. The described methods, processes, orlogic flows can be performed by one or more programmable computersexecuting one or more computer programs to perform functions byoperating on input data and generating output data. The methods,processes, or logic flows can also be performed by, and computers canalso be implemented as, special purpose logic circuitry, for example, aCPU, an FPGA, or an ASIC.

Computers for the execution of a computer program can be based ongeneral or special purpose microprocessors, both, or another type ofCPU. Generally, a CPU will receive instructions and data from and writeto a memory. The essential elements of a computer are a CPU, forperforming or executing instructions, and one or more memory devices forstoring instructions and data. Generally, a computer will also include,or be operatively coupled to, receive data from or transfer data to, orboth, one or more mass storage devices for storing data, for example,magnetic, magneto-optical disks, or optical disks. However, a computerneed not have such devices. Moreover, a computer can be embedded inanother device, for example, a mobile telephone, a personal digitalassistant (PDA), a mobile audio or video player, a game console, aglobal positioning system (GPS) receiver, or a portable memory storagedevice.

Non-transitory computer-readable media for storing computer programinstructions and data can include all forms of permanent/non-permanentor volatile/non-volatile memory, media and memory devices, including byway of example semiconductor memory devices, for example, random accessmemory (RAM), read-only memory (ROM), phase change memory (PRAM), staticrandom access memory (SRAM), dynamic random access memory (DRAM),erasable programmable read-only memory (EPROM), electrically erasableprogrammable read-only memory (EEPROM), and flash memory devices;magnetic devices, for example, tape, cartridges, cassettes,internal/removable disks; magneto-optical disks; and optical memorydevices, for example, digital versatile/video disc (DVD), compact disc(CD)-ROM, DVD+/−R, DVD-RAM, DVD-ROM, high-definition/density (HD)-DVD,and BLU-RAY/BLU-RAY DISC (BD), and other optical memory technologies.The memory can store various objects or data, including caches, classes,frameworks, applications, modules, backup data, jobs, web pages, webpage templates, data structures, database tables, repositories storingdynamic information, or other appropriate information including anyparameters, variables, algorithms, instructions, rules, constraints, orreferences. Additionally, the memory can include other appropriate data,such as logs, policies, security or access data, or reporting files. Theprocessor and the memory can be supplemented by, or incorporated in,special purpose logic circuitry.

To provide for interaction with a user, implementations of the subjectmatter described in this specification can be implemented on a computerhaving a display device, for example, a CRT (cathode ray tube), LCD(liquid crystal display), LED (Light Emitting Diode), or plasma monitor,for displaying information to the user and a keyboard and a pointingdevice, for example, a mouse, trackball, or trackpad by which the usercan provide input to the computer. Input can also be provided to thecomputer using a touchscreen, such as a tablet computer surface withpressure sensitivity, a multi-touch screen using capacitive or electricsensing, or another type of touchscreen. Other types of devices can beused to interact with the user. For example, feedback provided to theuser can be any form of sensory feedback (such as, visual, auditory,tactile, or a combination of feedback types). Input from the user can bereceived in any form, including acoustic, speech, or tactile input. Inaddition, a computer can interact with the user by sending documents toand receiving documents from a client computing device that is used bythe user (for example, by sending web pages to a web browser on a user'smobile computing device in response to requests received from the webbrowser).

The term “graphical user interface,” or “GUI,” can be used in thesingular or the plural to describe one or more graphical user interfacesand each of the displays of a particular graphical user interface.Therefore, a GUI can represent any graphical user interface, includingbut not limited to, a web browser, a touch screen, or a command lineinterface (CLI) that processes information and efficiently presents theinformation results to the user. In general, a GUI can include a numberof user interface (UI) elements, some or all associated with a webbrowser, such as interactive fields, pull-down lists, and buttons. Theseand other UI elements can be related to or represent the functions ofthe web browser.

Implementations of the subject matter described in this specificationcan be implemented in a computing system that includes a back-endcomponent, for example, as a data server, or that includes a middlewarecomponent, for example, an application server, or that includes afront-end component, for example, a client computer having a graphicaluser interface or a Web browser through which a user can interact withan implementation of the subject matter described in this specification,or any combination of one or more such back-end, middleware, orfront-end components. The components of the system can be interconnectedby any form or medium of wireline or wireless digital data communication(or a combination of data communication), for example, a communicationnetwork. Examples of communication networks include a local area network(LAN), a radio access network (RAN), a metropolitan area network (MAN),a wide area network (WAN), Worldwide Interoperability for MicrowaveAccess (WIMAX), a wireless local area network (WLAN) using, for example,802.11 a/b/g/n or 802.20 (or a combination of 802.11x and 802.20 orother protocols consistent with the present disclosure), all or aportion of the Internet, another communication network, or a combinationof communication networks. The communication network can communicatewith, for example, Internet Protocol (IP) packets, Frame Relay frames,Asynchronous Transfer Mode (ATM) cells, voice, video, data, or otherinformation between network nodes.

The computing system can include clients and servers. A client andserver are generally remote from each other and typically interactthrough a communication network. The relationship of client and serverarises by virtue of computer programs running on the respectivecomputers and having a client-server relationship to each other.

While this specification contains many specific implementation details,these should not be construed as limitations on the scope of anyinvention or on the scope of what can be claimed, but rather asdescriptions of features that can be specific to particularimplementations of particular inventions. Certain features that aredescribed in this specification in the context of separateimplementations can also be implemented, in combination, in a singleimplementation. Conversely, various features that are described in thecontext of a single implementation can also be implemented in multipleimplementations, separately, or in any sub-combination. Moreover,although previously described features can be described as acting incertain combinations and even initially claimed as such, one or morefeatures from a claimed combination can, in some cases, be excised fromthe combination, and the claimed combination can be directed to asub-combination or variation of a sub-combination.

Particular implementations of the subject matter have been described.Other implementations, alterations, and permutations of the describedimplementations are within the scope of the following claims as will beapparent to those skilled in the art. While operations are depicted inthe drawings or claims in a particular order, this should not beunderstood as requiring that such operations be performed in theparticular order shown or in sequential order, or that all illustratedoperations be performed (some operations can be considered optional), toachieve desirable results. In certain circumstances, multitasking orparallel processing (or a combination of multitasking and parallelprocessing) can be advantageous and performed as deemed appropriate.

Moreover, the separation or integration of various system modules andcomponents in the previously described implementations should not beunderstood as requiring such separation or integration in allimplementations, and it should be understood that the described programcomponents and systems can generally be integrated together in a singlesoftware product or packaged into multiple software products.

Accordingly, the previously described example implementations do notdefine or constrain the present disclosure. Other changes,substitutions, and alterations are also possible without departing fromthe spirit and scope of the present disclosure.

Furthermore, any claimed implementation is considered to be applicableto at least a computer-implemented method; a non-transitory,computer-readable medium storing computer-readable instructions toperform the computer-implemented method; and a computer systemcomprising a computer memory interoperably coupled with a hardwareprocessor configured to perform the computer-implemented method or theinstructions stored on the non-transitory, computer-readable medium.

What is claimed is:
 1. A computer-implemented method, comprising:detecting one or more user interactions from a virtual reality (VR)device user for initiating a service in a VR scenario of a VRapplication determining that the VR device is worn by a real personbased on eye-blinking recognition; invoking eye recognition hardware toobtain, as obtained one or more eye physiological characteristics, oneor more eye physiological characteristics of the VR device user for useridentity authentication, wherein the eye recognition hardware comprisesa light sensor, a plurality of lenses, and a plurality of cameras,wherein the plurality of cameras are paired with a plurality of LEDlights in a one-to-one correspondence, and wherein invoking the eyerecognition hardware includes: detecting, using the light sensor,brightness of ambient light inside the VR device; and in response todetermining that the brightness of ambient light inside the VR device islower than a predetermined value, turning on one or more of theplurality of LED lights; and authenticating the VR device user if theobtained one or more eye physiological characteristics match at least aportion of one or more pre-stored eye physiological characteristicssamples.
 2. The computer-implemented method of claim 1, wherein the oneor more user interactions include a gesture, a body movement, or a bodyposture.
 3. The computer-implemented method of claim 1, wherein the oneor more user interactions include a voice command.
 4. Thecomputer-implemented method of claim 1, wherein the one or more eyephysiological characteristics include iris characteristics or eye printcharacteristics.
 5. The computer-implemented method of claim 1, furthercomprising: performing a bioassay process for detecting the VR deviceuser; and presenting a notification in the VR scenario to notify the VRdevice user to perform biometric authentication if the VR device user isdetected based on the bioassay process.
 6. The computer-implementedmethod of claim 5, wherein the bioassay process includes eye-blinkingrecognition or heartbeat recognition.
 7. The computer-implemented methodof claim 1, further comprising presenting virtual guidance in the VRscenario to obtain the one or more eye physiological characteristics. 8.The computer-implemented method of claim 1, comprising comparing theobtained one or more eye physiological characteristics with one or morepre-stored eye physiological characteristics samples.
 9. Thecomputer-implemented method of claim 8, wherein the plurality of lensescomprise a macro lens.
 10. The computer-implemented method of claim 8,wherein the plurality of cameras are infrared cameras.
 11. Thecomputer-implemented method of claim 8, wherein the plurality of camerasare paired with one or more LED lights.
 12. A non-transitory,computer-readable medium storing one or more instructions executable bya computer system to perform operations comprising: detecting one ormore user interactions from a virtual reality (VR) device user forinitiating a service in a VR scenario of a VR application determiningthat the VR device is worn by a real person based on eye-blinkingrecognition; invoking eye recognition hardware to obtain, as obtainedone or more eye physiological characteristics, one or more eyephysiological characteristics of the VR device user for user identityauthentication, wherein the eye recognition hardware comprises a lightsensor, a plurality of lenses, and a plurality of cameras, wherein theplurality of cameras are paired with a plurality of LED lights in aone-to-one correspondence, and wherein invoking the eye recognitionhardware includes: detecting, using the light sensor, brightness ofambient light inside the VR device; and in response to determining thatthe brightness of ambient light inside the VR device is lower than apredetermined value, turning on one or more of the plurality of LEDlights; and authenticating the VR device user if the obtained one ormore eye physiological characteristics match at least a portion of oneor more pre-stored eye physiological characteristics samples.
 13. Thenon-transitory, computer-readable medium of claim 12, wherein the one ormore user interactions include a gesture, a body movement, or a bodyposture.
 14. The non-transitory, computer-readable medium of claim 12,wherein the one or more user interactions include a voice command. 15.The non-transitory, computer-readable medium of claim 12, wherein theone or more eye physiological characteristics include irischaracteristics or eye print characteristics.
 16. The non-transitory,computer-readable medium of claim 12, further comprising: performing abioassay process for detecting the VR device user; and presenting anotification in the VR scenario to notify the VR device user to performbiometric authentication if the VR device user is detected based on thebioassay process.
 17. A computer-implemented system, comprising: one ormore computers; and one or more computer memory devices interoperablycoupled with the one or more computers and having tangible,non-transitory, machine-readable media storing one or more instructionsthat, when executed by the one or more computers, perform one or moreoperations comprising: detecting one or more user interactions from avirtual reality (VR) device user for initiating a service in a VRscenario of a VR application determining that the VR device is worn by areal person based on eye-blinking recognition; invoking eye recognitionhardware to obtain, as obtained one or more eye physiologicalcharacteristics, one or more eye physiological characteristics of the VRdevice user for user identity authentication, wherein the eyerecognition hardware comprises a light sensor, a plurality of lenses,and a plurality of cameras, wherein the plurality of cameras are pairedwith a plurality of LED lights in a one-to-one correspondence, andwherein invoking the eye recognition hardware includes: detecting, usingthe light sensor, brightness of ambient light inside the VR device; andin response to determining that the brightness of ambient light insidethe VR device is lower than a predetermined value, turning on one ormore of the plurality of LED lights; and authenticating the VR deviceuser if the obtained one or more eye physiological characteristics matchat least a portion of one or more pre-stored eye physiologicalcharacteristics samples.
 18. The computer-implemented system of claim17, wherein the one or more user interactions include a voice command.19. The computer-implemented system of claim 17, wherein the one or moreeye physiological characteristics include iris characteristics or eyeprint characteristics.
 20. The computer-implemented system of claim 17,further comprising: performing a bioassay process for detecting the VRdevice user; and presenting a notification in the VR scenario to notifythe VR device user to perform biometric authentication if the VR deviceuser is detected based on the bioassay process.