The present disclosure relates generally to an augmented reality interactive system and more generally to an augmented reality interactive system used for digital authentication.
This section is intended to introduce the reader to various aspects of art, which may be related to various aspects of the present invention that are described and/or claimed below.
This discussion is believed to be helpful in providing the reader with background information to facilitate a better understanding. Accordingly, it should be understood that these statements are to be read in this light, and not as admissions of prior art.
As computer use becomes more prevalent, concerns over maintaining data security grows increasingly. Data security measures need to be provided to protect privileged information from access, use, disclosure, disruption, modification, and destruction by unauthorized individuals and entities. Loss of important information can be detrimental to both individuals and businesses. Security attacks may be software based and include uses of viruses and worms. Equipment theft and hardware driven destruction of components have also been used to access sensitive information.
Financial institutions such as banks are very concerned about such attacks and the associated loss of privileged data. Consequently, these institutions have developed different techniques to ensure a more secure interaction with their customers. For example, some banks demand a security code before a user session is initiated to ensure that the transaction is conducted by an authorized person. Nonetheless, the integrity of such security codes still remains subject to both hardware and software attacks. A number of attacks have been made recently using spying devices that intercept some of the physical card information of a credit card or a mobile device using methods such as video captures, magnetic sensing devices and others in seemingly secure locations. In other cases, where credit card payments are made at a merchant location, altered card readers and keyboard capture software have been used to access confidential information or obtain authorization from the user's card or account surreptitiously. Mobile devices, such as smart phones, have also been successfully integrated in some of these attacks to obtain account information from bank branches and automated teller machines (ATM)s.
Consequently, it is important to develop technology that maintains both data integrity and security especially in instances where sensitive data is being stored or exchanged via, a computer or mobile device.
An augmented reality (AR) interactive system and method is provided. In one embodiment the AR interactive system comprises a user interface configured to receive user input and a processor configured to manage data based user input. A camera and a display are also provided that are in processing communication with one another and the user interface via the processor. The processor is operative to initiate a user session and to display graphical images and textual information in overlying registration using the camera and display so that the images and textual information appear as part of a plurality of computer keys of a computer keyboard. The processor is configured to display the computer keys in random order each time the keys are displayed.
In a different embodiment, a method of providing authentication using an augmented reality interactive system is provided. The method comprises initiating via a processor communication to authenticate a user session. It also comprises displaying via the processor graphical images and textual information in overlying registration with imagery from a camera to a user, such that the images and textual information appear as part of a computer key from a computer keyboard on a rendering surface of a head mounted user device. The method further comprises registering via the processor user key selection through user movements or voice captured by a motion sensor and/or microphone. The motion sensor and microphone is in processing communication with the processor. The processor authenticates the user session
In another embodiment, an augmented reality (AR) interactive system is provided that comprises a head mounted user interface configured to receive user input. The head mounted user interface has a motion sensor, a microphone and a touch interaction area for capturing user input in form of voice, movement or touch. A display is also provided that is in processing communication with one another and the user interface via the processor. The processor is operative to start a user session and to display graphical images and textual information in overlying registration using the video camera and the display so that the images and textual information appear as part of a plurality of computer keys of a computer keyboard. The computer keys appear in random order each time the keys are displayed.
In yet another embodiment, an augmented reality (AR) interactive system is provided comprising user interface means configured to receive user input in form of voice, movement or touch. It also comprises display means in processing communication with a processor (140). The processor is operative to perform the following functions: initiate a user session; and display graphical images and textual information in overlying registration using said display means so that said images and said textual information appear as a plurality of computer keys of a computer keyboard, wherein said processor is configured to display said computer keys in random order each time said keys are displayed.
Additional features and advantages are realized through the techniques of the present disclosure. Other embodiments and aspects of the invention are described in detail herein and are considered a part of the claimed invention. For a better understanding of the invention with advantages and features, refer to the description and to the drawings.
The invention will be better understood and illustrated by means of the following embodiment and execution examples, in no way limitative, with reference to the appended figures on which:
In
Wherever possible, the same reference numerals will be used throughout the figures to refer to the same or like parts.
It is to be understood that the figures and descriptions of the present invention have been simplified to illustrate elements that are relevant for a clear understanding of the present invention, while eliminating, for purposes of clarity, many other elements found in typical digital multimedia content delivery methods and systems. However, because such elements are well known in the art, a detailed discussion of such elements is not provided herein. The disclosure herein is directed to all such variations and modification.
The user interface in the embodiment of
In the example depicted in
Augmented reality (AR) systems such as the one depicted in
In one embodiment as shown in
As indicated,
Furthermore, the head mounted user interface 160 can be one of many alternatives that embed or allow the user to see a private screen through specialty lenses and may be a part of a head-mounted display (HMD), a headset, a harness, a helmet or other wearable and non-wearable arrangements as can be appreciated by those skilled in the art. In the alternative, none of the components may be connected physically or a subset of them may be physically connected selectively as can be appreciated by those skilled in the art.
Referring back to the embodiment of
The augmented reality system 100 of
Whether done in person or with assistance of cameras and other wireless or actual devices, many instances of security breach occur directly by viewing and replicating keystrokes and other gestures and then correlating them to location of keys on a keyboard. These efforts reflect the need for providing security at least in two important manners. One is to assure that the use of public keyboards are limited and second is to provide measures that ensure users body gestures do not provide a key to providing security breaches. In a typical secured payment scheme, the following elements are typically involved in a user's payment device (payment card, phone with payment application, etc.), a device to interact with a store or bank which involve interaction with the device through a user input such as a physical input. An application server is also provided that will work with a payment module application through a database transaction management system and one or more related networks.
In one embodiment as shown in
In
In
In one embodiment, to ensure security, when using a voice user interface and input, the system does not require that the user spells the code in case it may be heard by an unauthorized third party interceptor. In one embodiment, the user may instead provide the index of the keys corresponding to the value he wants to select. For instance, in the example provided by the embodiment of
In one embodiment, it may even be possible for the user to type in the code in a dark environment to increase security of transaction. The user does not need to touch a real physical surface or object (keyboard), especially one that is placed in a public environment. User's password remains safely secured from external users' gestures' analysis, by taking care of and managing possible presence of repeated numbers or characters in that code. Such repeated numbers, or characters, would not require the user to virtually type the same space location during the process. In another embodiment, that randomized layout of keys may be reset by the application when screen is changed, or even after each key stroke (less convenient for the user, but even more secure)
In another embodiment, the is not touch interaction area but the keyboard appears on one of the user's hand and the user can use his/her other hand to input the digits by pressing his other hand just as if the user is typing on a touch pad or keyboard with the exception that the numbers that appear on his/her hand are only visible to the user and to anyone else who is not viewing the augmented reality environment.
Using the example where the user initiates a banking transaction via the ATM, the head mounted interactive device 110, or even the glasses 120 are enabled and configured via the processor to directly establish a processing connection with the ATM device, either directly or through first establishing a web access. In one example an associated phone can be used via a Bluetooth device that can even establish a direct connection between the glasses and the ATM device. In one embodiment, a unique tag may even being displayed that can be either visible or visible through the glasses or other arrangement as can be appreciated by those skilled in the art. In this embodiment, tag allows to uniquely identify the ATM in the vicinity of the user or user device, or other such situation as the particular device or user to interact with. When the user of the previous example needs money, he or she can get sufficiently close to the ATM, that is displaying the unique tag. A variety of arrangements, such as bar codes or specialized codes like the Quick Response Code (QR) or other two and three dimensional codes can be used. Most of these codes, as can be appreciated by one skilled in the art, may include a machine-readable optical label and reader that conveys information about the item or device to which it is attached. The code may have applications that can include product tracking, item identification, time tracking, document management, and even general marketing (examples of visual ones can be one that has a barcode or tag like QR code and can be read using glasses with an associated camera). In another embodiment, the tag can also be operating with a radiofrequency such as one that used in near field communication (NFC) technology. The NFC technology, through its unique set of protocols, enables smartphones and other devices to establish radio communication with each other by touching the devices together or bringing them into proximity to a very close distance (typically less than 10 cm). In such an embodiment, the user can also be retrofitted to embedding a related technology, such as through the use of the user's mobile device or even the same head mounted device and/or glasses.
In yet another embodiment, the user's device (glasses, mobile device etc.) may even be further enabled to select or recognize which service to connect to for setting up a more unique transaction (such as for money delivery). A user's complementary tag, in such an embodiment, may provide for instance directly a secure web link to connect to and even include personalized information such as the user will never want to receive bills larger than a hundred dollar bill. In one embodiment, in this example, once a connection is established in a secure way to the bank cash machine managing system through the ATM, the user completing its transaction, such as requesting money or cash using the user interface being displayed—to his eyes only—through the see-through glasses, can remain confident of the security of the transaction. In one example, the user first may be asked to enter the amount of money he/she needs or wants to withdraw followed by his/her client or card identifier and a secret pin code or secure password.
It should be noted that a secured connection may be established between the user's device and an account manager (user's bank company) server when using certain equipment such as the ATM. In the example used, the ATM machine that is being used may belong to a different bank than where the user's account is located. In such a case, the ATM machine (hereinafter the host ATM) will then initiate the process by providing information required during the first user's request to indicate ATM coordinates (bank company, address of the host ATM). A transaction is then initiated with the user's bank via the host ATM. When the user verification is achieved, the account manager server can communicate with the ATM to inform the user is authorized to withdraw the requested amount of money, and to physically manage the delivery process and the money is then dispensed from the ATM.
The virtual keyboard can be selectively adjusted to the type of transaction. In one embodiment, it may even be personalized to only present a subset of keys but nevertheless these will be presented in different random orders each time. In either case, the virtual keys presented to the user have to be adequate to complete a particular transaction. The virtual keys may include a particular set of number(s) and/or character(s) that are required to fulfill the interaction(s) or may include the regular keys provided in a traditional keyboard but in other arrangements. The keys will be correlated to what is currently available in a physical transaction scenario, in one embodiment. While the required keys will be displayed to the user on the visual screen renderer, location of actionable virtual key(s) follows a random layout which is different than what is presented on a conventional physical display. For example, the number key(s) may be not look spatially ordered like on a basic numerical keyboard such as 7,8,9,4,5,6,1,2,3 but for instance such as 4,0,2,1 to selectively make visual selection more desirable and provide better access. In addition, in some embodiments, the virtual keys may include extra keys extending the apparent number of code combination the user may use.
At times, a trade-off may have to be made between the apparent visual complexity of the rendered keyboard and user-friendly interface requirements. In one embodiment, the user can selectively customize the keyboard. However, even in this embodiment, the duplication of identical keys in the virtual keyboard may be avoided. In a different embodiment, keys that get repeated or somehow are designated as having an important role, such as those used for validation purposes, back or cancel, correction keys, or even characters belonging to the user's personal code if the interfacing sufficiently with the system, could be repeated more than once as means of distraction. Their location may also be provided selectively, in one embodiment, such that while the random selection is adhered to still the most convenient location is picked as to help the user easier triggering function. This may mean that the keys are provided in a more convenient or closest location to the user's hand such that the virtual key is easy to access during the code entering process and/or final validation.
Referring back to
In
In a different embodiment, a method of providing authentication using an augmented reality system is provided. The method comprises initiating, via a processor, a user session. The processor displaying graphical images and textual information in overlying registration with imagery from a video camera to a user, such that the images and textual information appear as part of a computer key from a computer keyboard on a rending surface of a head mounted user device.
The method also comprises registering via the processor user key selection through user movements or voice captured by motion sensor and/or microphone. The motion sensor and microphone is in processing communication with said processor. The processor authenticates the user session by providing user input of selected keys in same order received to the at least third party computer.
In yet another embodiment, an augmented reality (AR) interactive system is provided that comprises a head mounted user interface enabled to receive user input. The head mounted user interface has a motion sensor, a microphone and a touch interaction area for capturing user input in forma of voice, movement or touch. A video camera and a display is also provided that are in processing communication with one another and the user interface via said processor. The processor is operative to initiate a user session and to display graphical images and textual information in overlying registration using the video camera and the display. The images and textual information appear as part of a plurality of computer keys of a computer keyboard. The computer keys appear in random order each time they are displayed.
In
In addition, detecting if the user is left or right handed (by video image analysis and left or right hand use detection), the virtual keyboard layout may be dynamically updated and being presented not as a usual keyboard grid, but instead as a curved aligned sequence of virtual keys, with minimal occlusion for the gesture analysis system and from the user point of view, even when user's hand is close to any virtual key(s). This is shown by the examples of
The embodiments shown in
Number | Date | Country | Kind |
---|---|---|---|
15306327.6 | Aug 2015 | EP | regional |