18342500. METHOD AND ELECTRONIC DEVICE FOR HANDLING SECURE VIRTUAL EVENT IN VIRTUAL ENVIRONMENT simplified abstract (SAMSUNG ELECTRONICS CO., LTD.)

From WikiPatents
Jump to navigation Jump to search

METHOD AND ELECTRONIC DEVICE FOR HANDLING SECURE VIRTUAL EVENT IN VIRTUAL ENVIRONMENT

Organization Name

SAMSUNG ELECTRONICS CO., LTD.

Inventor(s)

Vishwanath Pethri Kamath of Bengaluru (IN)

Madhushree Suresha Gowda of Bengaluru (IN)

Vaibhav Ittan of Bengaluru (IN)

Sushant Kumar of Bengaluru (IN)

Jayantha Gowda Sarapanahalli of Bengaluru (IN)

Sudhansu Ranjan Acharya of Bengaluru (IN)

METHOD AND ELECTRONIC DEVICE FOR HANDLING SECURE VIRTUAL EVENT IN VIRTUAL ENVIRONMENT - A simplified explanation of the abstract

This abstract first appeared for US patent application 18342500 titled 'METHOD AND ELECTRONIC DEVICE FOR HANDLING SECURE VIRTUAL EVENT IN VIRTUAL ENVIRONMENT

Simplified Explanation

The abstract describes a method for handling secure virtual events in a virtual environment using an electronic device. Here is a simplified explanation of the abstract:

  • The method involves receiving input from a user avatar to create virtual events in a virtual environment.
  • Based on the input and the nature of the virtual event, the method identifies other user avatars to participate in the event.
  • The method also determines security policies for actions associated with the participating user avatars and parameters within the virtual event.

Potential Applications

This technology has potential applications in various industries and scenarios, including:

  • Virtual conferences and meetings: It can be used to organize secure virtual conferences and meetings, ensuring that only authorized participants can join and interact.
  • Virtual training and education: The method can facilitate secure virtual training sessions and educational events, allowing for controlled access and monitoring of participants.
  • Virtual entertainment events: It can be utilized to create secure virtual concerts, shows, and other entertainment events, ensuring that only authorized users can attend and participate.

Problems Solved

The technology addresses several problems related to secure virtual events, including:

  • Unauthorized access: By implementing security policies and controlling participant selection, the method prevents unauthorized users from joining virtual events.
  • Data protection: The method ensures that sensitive information shared during virtual events is protected by defining security policies for user actions.
  • Event management: It simplifies the process of organizing and managing virtual events by automating participant selection and security policy implementation.

Benefits

The use of this technology offers several benefits, including:

  • Enhanced security: By implementing security policies and controlling participant selection, the method ensures that virtual events are secure and protected from unauthorized access.
  • Improved user experience: The method simplifies the process of organizing and participating in virtual events, providing a seamless and user-friendly experience.
  • Efficient event management: By automating participant selection and security policy implementation, the method streamlines event management, saving time and effort for organizers.


Original Abstract Submitted

An example method for handling a secure virtual event in a virtual environment by an electronic device includes receiving at least one input from a first user avatar to create at least one virtual event within the virtual environment. The method further includes identifying at least one second user avatar for participating the at least one created virtual event based on the received input from the first user avatar and a nature of the virtual event and determining at least one security policy corresponding to at least one action associated with the at least one second user avatar and at least one parameter within the at least one created virtual event.